You are on page 1of 52

I

SSNPrint
: -
Vol
ume
: . I
ssue
: , J
une
International Journal of Communication and Networking System (IJCNES)
ISSN: 2278-2427
Volume: 01. Issue: 01, June 2012

Contents

1. Performance Evaluation using STP Across Layer 2 VLANs 01-08


1
Nada Al-Balushi, 2Rahma Al-Klabani 3Faizal Hajmohideen

2. A Critical Study of Data Security in Selected Co-Operative Units of 09-15

Warana Udyog Samuha

Prof. Babasaheb J. Mohite

3. Innovative Method of Software Testing Environment Using Cloud Computing Technology 16-22

S. Ravichandran

4. An Efficient Approach for Using the Wireless Sensor Networks in Mobile Computing 23-30

1
V.khanaa, 2 Krishna Mohanta

5. Low Cost Communication Link for Intelligent Public Transport System with Dynamic Protocol 31-35
Ranjana Dinkar Raut,Vineet Kumar Goyal, Nikhil Arora

6. Comparison of Propagation Models for Small Urban Cells in GSM Network 36-42

Naima Bouzera1,Abdelkrime Kheirddine2

7. Multiuser Interface Optical Code Division Multiple Access System 43-45

Shweta Patel1, Mukesh Tiwari 2, Jaikaran Singh 3

8. Wireless Information Security System Via Role Based Access Control Pattern Use Case Design 46-48

K.Subramanian1, V.Kanhaa
International Journal of Communication and Networking System (IJCNES)
ISSN: 2278-2427
Volume: 01. Issue: 01, June 2012

Editor-In-Chief

Dr. A. Clementking,
Associate Professor, Department of Computer Science, King Khalid University, Abha, Kindom of Saudi Arabia

Associate Editor

Albert Alexander S,
Professor, Department of Electrical and Computer Engineering,
Northeastern University, Boston, MA, USA

Editorial Board Members

Dr. K. P. Yadav
Director (Academic & Research), IIMT College of Engineering , Greater Noida, U.P.

Dr. Angel Latha Mary S


Karpagam College of Engineering(Autonomous),Coimbatore,India

Dr. Kulandaivel M.P,


Al Musanna College of Technology, Oman

Dr. Liau Vui Kien,


UCSI University, Malaysia

Dr. Hoang Do Thanh Tung,


Head of Management Systems Vietnam Academy of Science and Technology, Vietnam

Dr. Kyun-Yong Chung,


Deportment of Computer Information Engineering, Sangji University, Korea

Dr. Tzung-Pei Hong,


National University of Kaohsiung, Taiwan

Dr. Thamer M. Jamel,


University of Technology, Baghdad, Iraq
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.1-8
ISSN: 2278-2427

Performance Evaluation using STP Across Layer 2


VLANs
1
Nada Al-Balushi, 2Rahma Al-Klabani 3Faizal Hajmohideen
1,2
Undergraduates,3Lecturer, Salalah College of Technology, Oman
1
njaalb20@hotmail.com, 2gazal117.ka@gmail.com, 3faizal.h@gmail.com

Abstract-The network security and performance are the major


factors to be considered for end user at usage level in a hybrid
communication network. In terms of security and performance
of network are studied in many cases but it requires being
explored more based on the size of the network and the end
user handling at lower layer of OSI model. There are
voluminous steps taken to consider the issues such as Layer - 2
Exploitation, the inability of a device to perform the required
services at time due to redundant switch loops. This study
evaluates the security issues and the performance issues
VLAN is a virtual LAN and it is a broadcast domain created by
together with the trial of VLAN (Virtual LAN) security
switches. Because switches can talk to each other, you need to
perspective and STP (Spanning Tree Protocol) loop free
configure VLAN when your network gets so large and has so
performance aspect. The real time devices such as router,
much traffic. VLAN logically divide a switch into multiple,
switches are used to carry out experiment and the network
independent switches at Layer-2. They enhance network
behavior observed using wireshark. The different CLI outputs
security by keeping sensitive devices on a separate VLAN.
generated are evaluated the security and performance issues
They increase the number of broadcast domains while
coherently using show commands. This project experiments
decreasing the size of the broadcast domains to reduce
security and performance issues together with help of VLAN
overhead. There are VLAN protocols VTP(VLAN Trunking
and STP and suggests the best practice of VLAN and STP in
Protocols) and its parameters for instance VTP mode, VTP
typical hybrid network environment.
Domain, VTP password, Port security, BPDU guard, STP port
fast and IEEE 802.1q tagging are as considered as security
Keywords: STP, PVST, RPVST, Security, VLAN, Layer-2,
perspectives in this study and evaluated accordingly. The
wireshark
Spanning Tree Protocol (STP) is a network protocol that
ensures a loop-free topology for any bridged Ethernet local
I. INTRODUCTION
area network. STP solves the performance issue in the network
by allowing a network design to include standby links to
In a communication network the security and performance
provide automatic backup paths if an active link fails, without
aspects are the major factors to be considered for usage level.
the danger of bridge loops, or the need for manual
The network security and the performance are the major
enabling/disabling of these backup links. This paper analyses
impact in organizational usage concern. This study carried out
types of STP in relations with PVST (Per VLAN Spanning
in many cases as basic security measures and performance
Tree) and PVST+(Per VLAN Spanning Tree Plus) are
evaluation but it requires being explored more based on the
considered for network performance in a switch based
size of the network and the functional usage at lower layer of
network. The BPDU(Bridge Protocol Data Unit) are monitored
OSI model. There are voluminous steps taken to consider the
between and the data path. It is a message that is exchanged
issues such as Layer-2 Exploitation such as MAC Flooding
across the switches within an extended LAN that uses a
Attack, ARP Attacks, Multicast Brute Force Attack and
spanning tree protocol topology. The figure-1 shows the
Random Frame Stress Attack [1]. These attacks meant for Data
topology used for the experiment.
link Layer. It has to be prevented in a way the network is
giving uninterruptible services to the users. The inability of a
The following are the STP process occur in the switched
device to perform the required services at time due to
network are normally a root bridge is elected and each switch
redundant switch loops. This project is trying to give solution
uses the Spanning Tree Algorithm to determine the shortest
for the basic security issues and the performance issues
path to the root bridge, each switch takes into consideration of
together with the analysis of VLAN (Virtual LAN) security
the port speed against the bandwidth for which port to block
perspective and STP (Spanning Tree Protocol) loop free
and unblock; path cost is calculated using port speeds against
performance aspect.
1
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.1-8
ISSN: 2278-2427
bandwidth also, so if there are two paths to single destination, exposes several degenerate designs. The feasibility of adopting
the path with the lowermost cost is selected, finally port roles a systematic approach is shown in the VLAN design of green
are assigned based on the Spanning Tree Algorithm calculated field networks that are yet to be deployed[6]. Other works
path to use for converge into networks. The default IEEE port include the use of traffic data [7, 8] to expose degenerate
costs are 10Gbps = 2, 1Gbps = 4, 100Mbps = 19 and 10Mbps design patterns, understand VLAN traffic patterns, and
= 100. The lower the path cost leads the better /shorter the path correlate cross-layer faults. By contrast, this work focuses on
to the destination [2]The following passage brings the designing systematic algorithms for automating common
fundamental concepts of Layer – 2 VLAN in terms of VLAN operational tasks. Further, the experience of designing
performance and security. It includes mainly the STP switch and implementing the VLAN configuration toolkit, and the
port states such as blocking, listening learning, forwarding and insight from its initial deployment are also unique. QoS-aware
disable. There are commands used in the experiment to verify Multiple Spanning Tree Mechanism over a Bridged LAN
the spanning tree port states. And also the states indicate the Environment, the significant use of use the Multiple Spanning
performance at Layer -2 switch port status. It creates overall Tree protocols with regard to QoS, voice and video data
involvement in security as it blocks the unwanted traffic in the comparison have studied. The Diffserv framework and propose
entry level as ingress filter. a novel, simple and yet highly effective enhancement to the
Multiple Spanning Tree protocol to achieve high degree of
The STP blocking states are the state in which a port that QoS by keeping in perspective the different characteristics of
would reason behind a switching loop, no user data is sent or the various straffic types. The Multiple spanning tree protocol
received. Actually this port may go into forwarding mode if the achieves only geographical load balancing, and doesn’t take
other links in use were to fail and the spanning tree algorithm into account the varied characteristics of the traffic passing
determines the port may transition to the forwarding state. through it apart from the simple priority queuing
BPDU data is still received in blocking state.The STP listening technique[9].To manage with the inadequacy of the inheritance
states make BPDUs and await possible new information that in IEEE 802.1D/W standard, the IEEE 802.1S [10] working
would cause it to return to the blocking state. It is as group investigated the overlay mechanism of multiple trees
considered as inert state but it heed and does not populate the instead of a singles panning tree. This additional approach
MAC address table and it does not forward frames.The STP enhances the facility for IEEE802.1Q encapsulation standard
learning states are the port that does not yet forward frames it and tagging method [11] VLAN (Virtual LAN) bridges to use
does learn source addresses from frames received and adds multiples panning trees, providing for traffic belonging to
them to the filtering the switch database. It does populate the different VLANs to flow over hypothetically different paths
MAC Address table.The STP forwarding states that are within the virtual bridged LAN and give more security. A
receiving and sending data through a switch port and monitors VLAN is a group of end stations with a common set of
incoming BPDUs that would indicate it should return to the requirements and it segments a broad cast domain which is the
blocking state to prevent a loop. Finally the disable state extent that a broadcast frame propagates through a layer –
indicates STP is not concerned as the port can be disabled at 2networks, independent of physical location. There also exist
any stage of Layer – 2 transactions [3].The real time devices industry efforts like the Cisco VLAN Trunk Protocol [11] to
ensured the network security and performance in this study. manage VLANs; however such efforts are limited in
Initially this study used cisco simulator packet tracer for the functionality.This paper diverges from the view of other study,
learning the objectives as shown in the figure -1 to carryout here it discusses and experiments the VLAN and STP
experiment with network behavior. Due to the limitation in the performance in a real time network topology. This
simulator this study has been experimented with real time paperrecommends the best possible PVST and the basic
devices The different CLI outputs generated are evaluated security always required to be installed in the Layer – 2
security purposes and for performance coherently using wire VLAN.
shark as a tool for observing and monitoring packet flow. This
project assesses security and performance by implementing II. METHODOLOGY
STP types PVST and PVST+ then suggests the best possible This section discusses the environment and procedures in
basic security features and STP types for the security enhanced which the experiment was carried out.
Layer – 2 VLANs.
A. Related work A. Experimental setup
The network giant cisco has already progressed with layer – 2 The core topology designed and configured for the experiment
security issues in many aspects. They considered VLAN is one using the real time high end cisco devices, such as the Switch
among the major thread involving security weakness such as C3750 with IOS SoftwareC3750-IPBASE-M, Version
VLAN related attacks explained in cisco documents and 12.2(25), ROM Bootstrap 3750 Boot Loader C3750-HBOOT-
portraits the importance of those attacks [4]. Several works M, Processor WS-C3750G-24PS (PowerPC405), Processor
have studied VLAN design in enterprise networks [5]. board ID FOC1041Y13Z with 118784K/12280K bytes of
Characterizes of VLAN usage in one operational network and memory; the Switch C2960 with IOS Software C2960-
2
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.1-8
ISSN: 2278-2427
LANBASE-M, Version 12.2(25),ROM Bootstrap C2960 boot a trunk link should handle. Configuring a VLAN also requires
loader C2960-HBOOT-M, ProcessorWS-C2960G-24TC- configuring the gateway router to announce the associated IP
LPowerPC405,processor board's IDs FOC1130W5KV and prefixes into the routing protocol; each host interface must be
FOC1108U1V3 with 61440K/4088K bytes of memories; the assigned an IP address from the prefix associated with its
Router 2800 with IOS Software C2800NM-IPBASE-M, VLAN.The Cross over cables used between the switches to
Version 12.4(3h), ROM Bootstrap Version 12.4, Processor create loops for the STP to control its performance over the
board ID FCZ114473FH with 251904K/10240K bytes of physically created loop. The virtual interfaces or the sub
memory, NVRAM 239K bytes of non-volatile configuration interfaces are created as part of VLAN tagging mechanism
memory, 62720K bytes of ATA Compact Flash (Read/Write), usage and gateway to the end user systems.
DRAM configuration is 64 bits wide with parity enabled.
These devices are interconnected using UTP CAT-6 CABLES. C. Implemented STP Types
The PuTTY is used for consoling the router and switches via
management interfaces. PuTTY is a free and open source The Spanning Tree Protocols used for the analysis purposes are
terminal emulator application which can act as a client for the listed below in detail and the configuration method in each
SSH, Telnet, rlogin, and raw TCP computing protocols and as analysis also stated in order to understand the performance in
a serial console client for the cisco router and switches [12]. such network. Initially the switch S1, S2 and S3 are configured
Figure-2 shows below the configuration of STP and VLAN. with PVST, MST and RPVST at time each mode. The
observation is done on each time the STP mode is configured.
The mixed STP mode strategy used for all the switches S1, S2
and S3 in which switch S1 is used PVST, S2 is used RPVST,
S3 is used MST vice versa. The performance of all the modes
are observed and details of each transaction using FTP is
studied. Based on the performance of each STP mode the best
STP mode is suggested to use for a particular network.

Per-VLAN Spanning Tree Protocol (PVST), it maintains a


spanning-tree instance for each VLAN configured in the
network. It uses ISL trunking protocol that allows a VLAN
trunk to be forwarding for some VLANs while blocking for
other VLANs. Because PVST treats each VLAN as a separate
network, it can load balance traffic at Layer 2 by forwarding
some VLANs on one trunk and other VLANs on another trunk
without causing a loop. For PVST, Cisco developed a number
B. The Logical Topology
of proprietary extensions to the original IEEE 802.1D STP,
such as Backbone Fast, Uplink Fast, and Port Fast.Multiple
The logical topology is mull over for the configuration of
STP (MSTP), it enables multiple VLANs to be mapped to the
secured VLAN and the purpose of analyzing the STP
same spanning-tree instance, reducing the number of instances
performance. The VLANs are named VLAN10, VLAN20 and
needed to support a large number of VLANs. MSTP was
VLAN30 with VLAN ID 10, 20, 30 respectively. The access
inspired by the Cisco-proprietary Multiple Instances STP
ports are configured between the pcs and the switches. An
(MISTP) and is an advancement of STP and RSTP. It was
access port typically transports traffic for a single VLAN; the
introduced in IEEE 802.1s as amendment to 802.1Q, 1998
VLAN associated with a port may be either statically
edition. Standard IEEE 802.1Q-2003 now includes MSTP.
configured or dynamically assigned when the host connects,
MSTP provides for multiple forwarding paths for data traffic
based on the host’s MAC address. In either case, the access
and enables load balancing. [14]Rapid Per-VLAN Spanning
port can tag incoming frames with the 12-bit VLAN identifier
Tree (R-PVST): It is Cisco's proprietary protocol that
and removes the tag from outgoing frames, obviating the need
combines the functionalities of RSTP and PVST. It is based on
for the hosts to support VLANs.The switches and the router the
a per VLAN instance that creates a tree for each VLAN [15].
trunk ports are configured for the Inter VLAN communication.
In contrast, a trunk port may carry traffic for multiple VLANs;
D. Spanning-Tree Interoperability and Backward
for example, switch S1’s port connecting to S2,S3 must
Compatibility
forward traffic for both VLAN10, VLAN20 and VLAN30 and
participate in each VLAN’s spanning tree protocol. The
The interoperability and the backward compatibility are
administrators either manually configure each trunk port with a
considered for the experiment to pronounce performance in a
list of VLAN identifiers, or run a protocol like VTP (VLAN
better approach. The table-1 lists the interoperability and
Trunking Protocol) [13] to manually determine which VLANs
compatibility among the supported spanning-tree modes in our
3
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.1-8
ISSN: 2278-2427
network. The table reveals that the cisco has balanced to is used for network troubleshooting, analysis, software and
provide all the three STP modes together with minor communications protocol development, and education. It
restrictions which are not as considered as major impact in this allows the user to put the network interfaces in order to see all
study. traffic visible on that interface. However, when capturing with
Table 1 a packet analyzer in different STP modes on a port on a
network switch performance via the type of STP, not all of the
Parameters PVST MSTP RST traffic traveling through the switch will necessarily be sent to
PVST Yes Yes Yes the port on which the capture is being done. This help the
MSTP Yes Yes Yes switched network performance vivaciously observed using
RST Yes Yes Yes STP protocols [20]

The few restrictions are further discussed here as a basic I. Security Testing Scenarios
requirement for the switch based network. In a mixed MSTP The cisco switches and routers built into Intelligent Gigabit
and PVST network, the common spanning-tree (CST) root Ethernet Switch Module which comprised Bridge protocol data
must be inside the MSTP backbone, and a PVST switch cannot unit (BPDU) guard for shutting down a Port Fast configured
connect to multiple MST regions.When a network contains port when an unenforceable configuration has been
switches running Rapid PVST and switches running PVST, we experienced during the transaction. The protected port enables
recommend that the Rapid-PVST switches and PVST switches the forwarding of traffic to restrict to the designated ports on
be configured for different spanning-tree instances. In the the same switch. The Password-protected access such as read-
Rapid-PVST spanning-tree instances, the root switch must be a only, write-only access to management console interfaces. The
Rapid-PVST switch. In the PVST instances, the root switch Port security option for limiting and identifying MAC
must be a PVST switch. The PVST switches should be at the addresses of the station allowed accessing the port. Port
edge of the network[16]. security aging to set the aging time for secure addresses on a
Multi-level port security for a choice of security level,
E. VLAN Trunking Protocols notification, and resulting actions MAC-based, port-level
In this study, VTP is used as part of managing all VLANs security for restricting the use of a switch port to a specific
configured in the switch S1, S2 and S3. When you configure a group of source addresses and preventing switch access from
new VLAN on one VTP server, the VLAN is distributed unauthorized stations IEEE 802.1X port-based authentication
through all switches in the domain. This reduces the need to to prevent unauthorized devices from gaining, access to the
configure the same VLAN everywhere. It made an network, IEEE 802.1X port-based authentication with VLAN
administration in a switched network easy. The VTP Domain assignment for restricting802.1X-authenticated users to a
ZU and VTP password ZU configured as security measures. specified VLAN, IEEE 802.1X port-based authentication with
The VTP modes server and client are configured in the switch port security for authenticating the port and managing network
S1 and S2, S3 respectively and the VTP domain. [17][18] access for all MAC addresses, including that of the client IEEE
802.1X port-based authentication with voice VLAN to permit
F. End User an IP phone access to the voice VLAN irrespective of the
The core topology is conduit with IBM Lenovo pcs for authorized or unauthorized state of the port[12][21][22]Test
windows based FTP server, client installed with Core FTP suites were constructed using basic commands for basic
software for huge file transactions and a personal computer security measures. Three Cisco Catalyst switches namely S1,
with wires hark software installed for monitoring and S2, S3 used in the VLAN configurations supported security
observing the packet while the packets are transferred between several test configurations, including running difference STPs
the FTP server and client. The amount of file transfer in the of VLAN, VLANs with and without trunk ports enabled. Tests
network nearly 4 GB size and the packets observed were were conducted with acquaintance of existing weaknesses, and
pragmatically taken for analysis purpose. were focused on identifyinglayer-2 potential vulnerabilities
outside of well-understood issues, such as VLAN hopping
G. The Transfer Tools through enabled trunk ports. The following are the basic
The software Core FTP is used as client for transferring the security features learned in this study Port Security, 802.1q and
huge file as it is free, secure FTP client gives you a fast, easy, ISL Tagging, Spanning Tree Port fast, Native VLAN
reliable way to maintain FTP transaction between server and elimination, BPDU Guard, VLAN 1,VTP.
client. It also affords a secure method (via SSL, TLS, or SFTP)
to upload / download files to and from FTP server [19]. III. RESULT INTERPRETATION

H. The Observation Tool A. Spanning Tree Performance


Spanning tree protocols performance observed using Wires This section discusses observed and verified experimental
hark, which is a unrestricted and open-source packet analyzer results on Layer – 2 VLAN. To begin with the spanning tree
4
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.1-8
ISSN: 2278-2427
performance as observed through wires hark packet analyzer in Bytes
on trendy topology using 100 mb archive files between the Data Transfer Min Size 3180 3172 3178 3158
FTP server and client on each STP modes. The statistics of in Bytes
data experimented on PVST, RPVST, MST and mixed modes % Data Transfer Max 95.65 95.65 95.66 95.66
of STP. The table-2 below recorded the observed packets Size in Bytes 235 366 025 673
analyzed based on number of transaction(req, res), time, no of % Data Transfer Min 4.344 4.342 4.334 4.315
packets, no of loops, no of FTP loops, size and percentage of Size in Bytes 915 242 281 505
data used during the file transfer.

Figure - 5

The observed results are considered for the performance


analysis on which the following charts are depicted. The
Figure–3 shows the number of transactions in each STP mode
with regard to time duration between the first requests and to
the last response as the FTP completes 100 mb transactions.
The result inclined as PVSTis marking with less number of
packet transactions and less time taken to complete the FTP
data transfer. The no of packets taken to process in each STP
modes were more than 100 thousand packets as whires hark
tool observed. The variation is depicted on the figure - 4. Still
in all aspects the STP modes covered by PVST are the best to
suggest small as well large scale hybrid network. The scale
measures the network based on the size and device integration
upon its sensitivity.

The Figure - 5 reflects how many loops occur during the


packets transfer from transaction to others. As observed that
Table -2 :STP Protocols Performance Observation
less number of loops occurs in PVST as compare with RPVST,
Parameters PVST RPVS MST MIX MST and MIXED mode. The advantages over each others are
T ED as described in earlier section the implemented STP types. The
No of Transaction(Req, 4 16 12 7 number of loops show the mode that the efficient transactions
Res)) on 100mb archive file between VLANs are using FTP server
Time 9.102 15.18 16.00 24.24 and FTP clients which are assumed functionally different
503 397 644 095 areas. This analysis again goes with PVST as minimum loop
No of Packets(First, 10984 10987 10984 10993 generated STP mode. RPVST has the advantage that it detects
Last) 8 6 7 0 its STP loop at the hasty age of transactions particularly one
No of Loops(Over All 5 6 6 7 loop at 78428 during the course of 109876 packets
Transaction) transactions. Whereas other STP modes conceded at later
FTP Loops (FTP 1 1 1 1 stages of transaction such as RPVST concedes one loop at
Transaction) 11116 during the course of 109876 and MST concedes a loop
Data Transfer Max Size 70007 70008 70007 70007 at 93857 during the course of 109847 packets of transactions.

5
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.1-8
ISSN: 2278-2427
In all aspects, the PVST's performance is interpreted as the best amongst the STP modes.

Table – 3: Data transfer on each STP modes hand shake approach the STP performance shows variations in
Size of PVST RPVST MST Mixed transferring bytes. In this analysis, during the FTP data transfer
the Data the transport layer used TCP for sending data in different sizes
1296 1 3 2 12 such as 1460, 1296, 975 and 648. The PVST mode used more
975 1 1 1 1 of actual 1460 bytes of data than the other STP modes.
648 3180 3172 3178 3158 B. Layer – 2 VLAN Security Mechanism applied and verified
1460 70007 70008 70007 70007 Certain VLAN configurations result in conditions where it is
Total pkts 73189 73184 73188 73178 practicable for frames to be relayed from one VLAN to another
The table – 3 shows the data sizes used for transaction at each by a malicious party influencing frame tags or address tables at
STP modes. Figure – 6&7 shows the comparison results of the switch level. And also there are other threats such as flood
data transfer among the STP modes when 100mb data attack [23], VLAN hopping occur under any circumstances due
transactions made between VLANs across FTP server and to unwanted VTP advertisement. This study suggests some
client. The FTP-DATA size usually ongoing transaction sets basic and effective Layer – 2 VLAN securities mechanism
1460 bytes. Due to the fluctuation on the network and TCP which allows the network runs away from vulnerabilities [24].

Table – 4 : Security Configuration at Layer – 2 VLAN


Experimental Objective to accomplish Important Commands Used for the Verification
Method experiment
Port Security Secure against a MAC flood attack S1(config)#interface fa1/0/1 show port-security
S1(config-if)#switchport mode access interface fa0/19
S1(config-if)#switchport port-security
vlan 10
S1(config-if)#switchport port-security
maximum 1
S1(config-if)#switchport port-security
mac-address sticky
S1(config-if)#switchport security
violation shutdown
802.1q Tagging Ingress filtering S1(config-if)#switchport mode dot1q- S1#show vlan dot1q
tunnel tag native
S1(config)#vlan dot1q tag native
BPDU Guard Provides a secure response to invalid S1(config)#spanning-tree S1#show spantree
configurations portfastbpduguard summary
VTP password Network Attack Mitigation by Avoiding S1(config)#VTP domain ZU S1#show vtp status
unwanted VTP advertisement S1(config)#VTP password ZU

The table – 4 shows the accomplished type of security status of the VLAN configured switch port fastethernet
mechanisms such as port security, 802.1q tagging, BPDU 0/19.The figure – 10 shows the
Guard and VTP password are verified the usage on Layer – 2
VLANs.The following section discusses one of the Layer – 2
VLAN security mechanism port security adopted in this study
as depicted as screenshots.

Intermediate state that the switch is flapping due the MAC


address changes on the specific port which was configured the
port security mechanism. The figure – 11 shows the port
The figure – 8 shows the configuration of port security in security is verified by seeing the port fa0/19 shutdown due to
Layer – 2 VLAN. The figure – 9 shows the initial state of port the MAC changes happened

6
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.1-8
ISSN: 2278-2427
Flooding Attack, ARP Attacks, Multicast Brute Force Attack
and Random Frame Stress Attack, DoS attack suggest the
aptness to be exercised at Layer - 3 VLAN.

ACKNOWLEDGMENTS

The authors express their sincere thankfulness to Dr.Maryam


Abdullah Al Awadi, The Head of the department, Department
of Information technology for encouragement and support
during this work.

REFERENCES
[1] Virtual LAN Security Best Practices, Cisco Systems,
Inc.http://www.cisco.com/warp/public/,cc/pd/si/casi/ca6000/prodlit/Pag
e 5 of 13
[2] Rufus Credle, Yoko Fujiwara, Matt Slavin, Kenichi Tanaka, Mark
Welch, Cisco Systems Intelligent Gigabit Ethernet Switch Module for
IBMEserverBladeCenter , http:// www. redbooks. ibm.com/redpapers/
pdfs/redp3869.pdf, April 2005
[3] Spanning Tree Protocol, Wiki online document, http://en.wikipedia.org/
wiki/ Spanning_ Tree_ Protocol
[4] http://resources.infosecinstitute.com/vlan-hacking/
[5] P. Garimella, Y.-W. E. Sung, N. Zhang, and S. Rao. Characterizing vlan
The figure – 12 shows the state of security Violation on layer – usage in an operational network.In ACM SIGCOMM workshop on
2 VLAN when the switches learned unknown MAC address Internet Network Management (INM’07), Kyoto, Japan, 2007.
via specific ports. It justifies the important of Layer – 2 VLAN [6] A. Mansy, M. B. Tariq, N. Feamster, and M. Ammar. Measuring vlan-
induced dependencies on a campus network.In Proc. ACM SIGCOMM
require a certain security mechanism implemented for flawless IMC, 2009.
communication. [7] K. Sripanidkulchai, C. Issariyapat, and K. Meesublak.Inference of
network-wide vlan usage in small enterprise networks.In Proc.Of IEEE
Workshop on Automated Network Management, 2008.
[8] Y.-W. E. Sung, S. G. Rao, G. G. Xie, and D. A. Maltz. Towards
systematic design of enterprise networks.In Proc. of the ACM CoNEXT
Conference, 2008.
[9] M. J. Karam and F. A. Tobagi.QoS-aware Multiple Spanning Tree
Mechanism over a Bridged LAN Environment, On traffic types and
service classes in the Internet. IEEE GLOBECOM, pp548-554, Nov.
2000.
[10] IEEE 802.1S/D15, Draft standard for local and metropolitan area
networks: amendment 3 to 802.1Q virtual bridged local area networks:
multiple spanning trees, 2002.
IV.CONCLUSION [11] IEEE 802.1Q, Standard for local and metropolitan area networks:
virtual bridged local area networks, 1998.
This study finds that PVST is the best in STP in terms of [12] PuTTY,OnlineDocumenthttp://www.chiark.greenend.org.uk/~sgtatham/
putty/faq.html#faq-meaning
performance based on the study conducted on STP modes, in [13] VLAN Trunking Protocol. Cisco Online Documents,
terms of Performance as per the evaluation of different http://www.cisco.com/en/US/tech/ tk389/ tk689/ technologies tech
parameters No of packet transaction, Time duration, No of note09186a 0080094c52. shtml
loops, FTP loops, Data transfer size in bytes, percentage of [14] Types of STP, Online document, http://www.orbit-computer-
solutions.com/Spanning-Tree-Protocol-Standards-Types.php
data transfer size in bytes, PVST was found to be the best. In [15] Spanning Tree Protocol (STP) is a Layer 2protocol,
security aspects, this study suggests best practices of network http://www.techiebird.com/netstp.html
security through the following techniques such as MAC Flood [16] Cisco,Online Document, http://www.cisco.com/en/US/docs/
Attack, 802.1q Tagging, BPDU Guard, and VTP Password at switches/lan/catalyst2950/ software /release/12.1_14_ea1/
configuration/guide/swstp.html#wp1150848
Layer – 2 VLAN The results are verified and justified at Layer [17] Xin Sun, Yu-Wei E. Sung, Sunil D. Krothapalli, and Sanjay G. Rao,
-2 VLAN. This research work motivates further to evaluate the Systematic Approach for Evolving VLAN Designs, Journal, Purdue
performance of hybrid network using other perspective in University
terms of QoS using different multimedia files and device [18] Understanding vlan trunk protocol (VTP). Cisco online
document.http://www.cisco.com/ application /pdf/ paws/10558/21.pdf,
utilizations. Additionally the implementation of VLAN 2007
performance and security evaluation can be done at Layer–3 [19] Core FTP, online Documents from http://www.coreftp.com/
switches. For the enhancement of Security, this research can be [20] Wireshark, Network packet analyzer and monitoring tool
extended to study and suggest with VACL, Private VLAN, and http://en.wikipedia.org/wiki/ Wireshark.
[21] Lucian Popa, Building Extensible and Secure Networks, Electrical
DHCP Snooping at Layer -2 VLAN. The preventions of MAC Engineering and Computer Sciences, University of California at
7
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.1-8
ISSN: 2278-2427
Berkeley Technical Report No. UCB/EECS-2011-105,
http://www.eecs.berkeley.edu/Pubs/TechRpts/2011/EECS-2011-
105.html, September 23, 2011
[22] IdoDubrawsky, SAFE LAYER 2 SECURITY IN-DEPTH— VERSION
2 Cisoc online document ,
http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/sfblu_wp.pdf
[23] Minlan Yu Rexford, J. ;Xin Sun ; Sanjay Rao ; Feamster, N., A
survey of virtual LAN usage in campus networks,Communications
Magazine, IEEEDate of Publication: July 2011, Volume: 49, Issue: 7
,Page(s): 98 - 103
[24] VLAN Security White Paper, Cisoc online document
http://www.cisco.com/warp/public/ cc/pd/ si/casi/ca6000/ tech/ stake
_wp.pdf

8
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.9-15
ISSN: 2278-2427

A Critical Study of Data Security in Selected Co-


Operative Units of Warana Udyog Samuha
Prof. Babasaheb J. Mohite
Sinhgad Institute of Business Management,Kamalapur, Sangola.
Email Id. bjmohite@gmail.com

Abstract-In todays rapidly changing scenario, individuals and unpunished.Therefore, organizing an appropriate defense
organizations are relying heavily on automated computer system is one of the major activities of any functional manager,
systems to store, retrieve, process and exchange information. who controls any system resources.
Organizations uses the information stored on these systems to
conduct vital business operations. Therefore, organizations II. OBJECTIVES OF THE STUDY
need to protect the information from unauthorized access and
potential destruction. Earlier, an organization, computer system Today‟s booming world is now referred as High Speed
was developed, used and maintained in isolation from other world due to storing data in digital form using computer
areas of business. The rapid growth and widespread use of system and accessing and processing the data with minimum
electronic data processing and electronic business conducted cost, effectively efficiently to generate different types of
through the Internet, along with numerous occurrences of information. So to preserve that data securely every IT user
international terrorism, fueled the need for better methods of must know the benefits and losses about the computer
protecting the computers and the information they store, security. Which are the different threats to computer data and
process and transmit. IT managers, Network Administrators which are the different security controls and policies
and Database Administrators face increasing challenges of required to maintain data security?
managing and protecting information and network resources In view of the above, the following has been setout as a
from unauthorized access. So to preserve data securely every prime objective of the present study.
IT user must know the benefits and losses about the computer
security. Which are the different threats to computer data and 1. To study and analyze the data security measures adopted
which are the different security controls and policies required by the organization.
to maintain data security? 2. To examine the awareness level among users about
In view of the above, the present research work entitled “A benefits or losses of data security.
Critical Study of Data Security in Selected Co-Operative Units 3. To suggest measures for efficient database & general
of Warana Udyog Samuha” has come up for further in-depth security measures.
study.
III. SCOPE OF THE STUDY
Keywords: Threats, Integrity, Virus, Password, Hacking,
Biometrics, Fire extinguisher. The research was focused on selected co-operative units of
Warana Udyog Samuha for collection of data. The sample
I. INTRODUCTION size was 69 comprising of three units of Warana Udyog
Samuha, Warananagar. Therefore the scope is limited.
Security is a measure or act to prevent any system from any
type of damage. Security measures were taken to prevent or IV. VALIDITY OF THE STUDY
minimize the loss after the attack of any type of danger with
minimum loss of assets [1].Knowing about major possible 1. Present research focus on the current situation of
threats to any system is important, but understanding ways to computerization and data security measures adopted at
defend against these threats is equally critical. Defending a different units of Warana Udyog Samuha.
system is not simple or inexpensive mission due to some 2. This research will help to know the fact that how
reasons [3] like-Hundreds of possible threats exist and the cost awareness of security plays an important role in
of preventing hazards can be very high,System resources may securing valuable assets of organization.
be situated in different locations,Many personal use system 3. This research helps the organization in deciding the
assets,Rapid technological changes make some control security policies regarding the Data security.
absolute/ unused as soon as they are installed,People tend to 4. This research is also the measurement of the present
violate security procedures because the procedures are scenario of the awareness level of data security to the
inconvenient,Many criminals who are caught go users and it will help to improve the same.
9
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.9-15
ISSN: 2278-2427
V. METHODOLOGIES ADOPTED The sample size is restricted to 69 IT users. The detail
breakup of the sample size is depicted in chart –
In order to study the selected problem in details, the
researcher has made use of different resources to collect the
reliable information pertaining to data security systems used
in following units of Warana Udyog Samuha.
 Warana Co-operative Sugar Factory Ltd. (Sakhar
Karkhana)
 Warana Co-operative Milk Produce Processing Society
Ltd. (Dudh Sangh)
 Warana region Co-operative Grahak Mandal (Bazaar)
The researcher has collected both primary and secondary
data regarding the present study [6].

Primary Data –
Data was collected by administrating two different sets of
VI. LIMITATIONS
questionnaire for Data Entry Operators and Programmers.
a. Conclusion drawn from the survey is limited for three
Researcher has personally conducted interviews with selected
units of Warana Udyog Samuha only.
respondents from the different units of Warana Udyog
b. Researcher was interested in covering more units of
Samuha. In order to obtain more relevant information which is
Warana Udyog Samuha but they have only two to
not covered in structured questionnaire, researcher has made
three stand-alone computers with only two-three
use of personal discussion with the respondents. To facilitate
users, they don‟t have network facility.
easy interpretation of data, multiple choice questions,
c. Many respondents were not able to answer the
Dichotomous questions and five point scales were used as
questions regarding the technical aspects of threats
required.
and measures of security. So the researcher had to
trace out the problem by using some technical
Secondary Data –
knowledge, skill, experience, and by questioning to
The secondary data related to data security was collected from
respondents regarding the required details.
various books, related journals, magazines and web sites. The
secondary data in respect of profile of the company etc.
VII. DATA ANALYSIS AND INTERPRETATION
collected from company files, magazines etc.
Following table and figure shows the current literacy level
5.1 Sampling Method-
regarding computer usage, the data security measures adopted
Presently, the Warana co-operative complex runs successfully
by the organization, awareness level among users about
25 co-operative societies. Out of this researcher has chosen
benefits or losses of data security and security measures
three co-operative societies namely- Warana Dudh Sangh,
adopted from selected units under study.
Warana Sakhar Karkhana, and Warana Bazaar.
Table 1: (Source – Primary Data collected from Operators)
These organizations have been selected on the 17basis of the
Computer Course Completed by Employees through
following parameters-
University/ Private Institutions.
 Organization having more than 20 computers.
 Organization having more than 80% computers in
network.
 Organization having different sections or sub-units. Table 2: (Source – Primary Data collected from Operators)
 Organization having more than 25 computer users.

5.2 Sampling technique-
For the present research work, proportionate convenient
sampling technique [6] is used and accordingly of the total
343 IT users‟ 69 users representing 20% of universe has
been considered as sample. As far as possible researcher has
covered all types of respondents under survey method to
collect the reliable information.

5.3 Breakup of sampling size-

10
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.9-15
ISSN: 2278-2427
From the table, it is observed that, out of total respondents
from Warana Dudh Sangh 26.67% of respondents have
completed computer course from different Universities and
73.33% respondents have completed computer course from
private computer institutes respectively.Similarly, out of total
respondents from Warana Sakhar Karkhana 34.62% of
respondents have completed computer course from different
Universities and 65.38% respondents have completed
computer course from private computer institutes respectively.
At the same time, out of total respondents from Warana Dudh
Sangh 33.33% of respondents have completed computer course Table 3: (Source – Primary Data collected from Operators)
from different Universities and 66.67% respondents have Antivirus Updation Status
completed computer course from private computer institutes
respectively.

It is also significantly noticed that, the proportion of employees


who have completed their computer courses from private
institutes is higher in Warana Dudh Sangh as compared to
other two units who are having near about equal proportion in
the range of 65 to 67%. Contrary to this, it is also noticed that
the proportion of employees who have completed their
computer courses from Universities is low in Warana Dudh
Sangh as compared to other two units who are having near
about equal proportion in the range of 33 to 34%.Table 2
At the same time, out of total respondents from Warana Bazaar
shows that, out of total respondents from Warana Dudh Sangh
66.67% of respondent‟s updates antivirus programs regularly
76.67% of respondents remembers password by memorizing,
and 33.33% respondent‟s updates antivirus programs regularly
20.00% of respondents remembers password by keeping in
up to some extent respectively. It implies that, majority of
written form and 3.33% respondents keeps password in text
respondent‟s updates Antivirus programs regularly.
file respectively.Similarly, out of total respondents from
Warana Sakhar Karkhana 84.62% of respondents remembers
Table 4 shows that, out of total respondents from Warana
password by memorizing, 15.38% of respondents remembers
Dudh Sangh 96.67% of respondents gives importance for
password by keeping in written form and 3.85% respondents
training on maintaining data security and 3.33% respondents
keeps password in text file respectively.At the same time, out
don‟t thinks it is necessary to get training on maintaining data
of total respondents from Warana Bazaar 83.33% of
security respectively.Similarly, out of total respondents from
respondents remembers password by memorizing, 16.67% of
Warana Sakhar Karkhana 96.15% of respondents gives
respondents remembers password by keeping in written form
importance for training on maintaining data security and 3.85%
and not a single respondents keeps password in text file
respondents don‟t thinks it is necessary.
respectivelyFrom the table, it is observed that, out of total
At the same time, all the respondents from Warana Bazaar give
respondents from Warana Dudh Sangh 50.00% of respondents
importance for training on maintaining data security. It implies
updates antivirus programs regularly, 13.33% respondents do
that, majority of employee‟s strongly agree for training on
not updates antivirus programs regularly and 36.67%
maintaining data security is very important and essential.
respondents updates antivirus programs regularly up to some
extent respectively. Similarly, out of total respondents from
Table 4: (Source – Primary Data collected from Operators)
Warana Sakhar Karkhana 61.54% of respondent‟s updates
Necessity of Training on Maintaining Data Security
antivirus programs regularly, 11.54% respondents do not
updates antivirus programs regularly and 26.92% respondent‟s
updates antivirus programs regularly up to some extent
respectively.

Method Used to Remember the Password

Table 5: Disaster Experienced by Employees

11
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.9-15
ISSN: 2278-2427
 Formal disciplinary process for staff that violates security
policies.
 Have not made security plan & policies.
 Use of any biometric measure, Testing of Security control
regularly

Table 7 : (Source – Primary Data collected from EDP heads)


Security Controls Used

Table 5 depicts that, out of total respondents from Warana


Dudh Sangh, Warana Sakhar Karkhana and Warana Bazaar
majority of respondents experienced Virus, Hardware fault and
Human Negligence as a major disaster in their
organizations.Similarly, out of total respondents from Warana
Dudh Sangh, Warana Sakhar Karkhana and Warana Bazaar
very few of respondents experienced Theft of hardware,
Environmental Hazard and data alteration as a major disaster in
their organizations.At the same time, not a single respondent
from Warana Dudh Sangh, Warana Sakhar Karkhana and
Table 8: (Source – Primary Data collected from EDP
Warana Bazaar experienced disaster like Hacking and Theft of
Head)Organisations using different Security facilities
software.

Table 6: (Source – Primary Data collected from


Operators)Media Used For Data Backup

From the table 6, it is observed that, out of total respondents


from Warana Dudh Sangh, Warana Sakhar Karkhana and
Warana Bazaar majority of respondents use CD/DVD as a
main backup media in their organizations.Similarly, out of total Hypothesis: Organizations do not differ significantly in
respondents from Warana Dudh Sangh, Warana Sakhar awareness of different security measures in the vicinity [8]
Karkhana and Warana Bazaar 10 to 25% of respondents use
Zip/USB disk, Pen drive as Backup server on Network as a Tj : T1=12, T2=12, T3=4 :
backup media in their organizations. At the same time, not a T=28
single respondent uses Magnetic tape as a storage media to nj : n1=11, n2=11, n3=11 :
store data backup in their organization.All units of Warana N=33
complex are having facility to validate input data through
: =1.090, =1.090, =0.3636 :
application programs.
=0.8484
On the other hand in all these units, there is negative response
towards the following aspects - SSC =
 Facility to intimate newly logged user, Maintain a log files
=11(1.090-0.8484)2+11(1.090-
for sensitive data.
.8484) +………………+11(0.3636-0.8484)2
2
 Background check on selection of IT staff, Data security
=0.6420+0.6420+2.58534
officer appointment.
=3.870177
12
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.9-15
ISSN: 2278-2427
SSC = 3.870177
Table value for F ratio for (2,30) d.f is 3.32
Sources of d.f s.s M.S.S F Test
Thus calculated value is less than given table value, gives the
Variance
conclusion that Organizations do not differ significantly.

Table 9: Parameters about the Security Measures implemented


Between 2 3.870177 1.935885 by the Users (Source – Primary Data collected from Operators)
1.7945
Error 30 32.3636 1.07878
Hypothesis: - Measurement of the present scenario of the
Total 28 52.2419
awareness level of the data security is not implemented by the
users.
2
SSE =

= (0-1.090)2 + (0-1.090)2+ (3- Using Yale‟s correlation, using the Pooling techniques [8]
1.090) +……………….+(1-0.3636) +(0-1.036)2
2 2

=14.9091+14.9091+2.5454
=32.3636 Table value for for 8 degrees of freedom at 5% level of
SSE = 32.3636
2 significance is 2.73.
SST =
We accept the hypothesis that, Measurement of the present
scenario of the awareness level of the data security is not
= (0-0.8484)2+(0-0.8484)2+……+(1- implemented by the users.
0.8484)2+…..(0-0….)2
=52.2419 VIII. FINDINGS
SST = 52.2419
1.
All the units under study do not have facilities like- Fire alarm
Degrees of Freedom system with emergency power off system, smoke detectors,
dfc = c-1 = 3-1 = 2 dfe = N-C = 33-3 = 30 fireproof ceilings, doors and furniture‟s, access control device,
dft = N-1 = 33-1= 32 motion detectors, intrusion alarms at all accessible openings,
watchman at server & backup room. Also they can‟t maintain
Mean Sum of Squares entry and exit records for visitors to department.
MSC= 2. Most of the organizations have installed Air conditioning,
humidity and dehumidification equipments. And also separate
M S C = 1.935885 arrangement for electricity and Network cable has made.
3. Antivirus programs are installed on almost all machines of
MSE =
different organization, but updation process is carried out
infrequently. Occasionally the secondary storage devices are
M S E = 1.07878
used before checking for viral infection.
Here we use ‘F’ test, since MSC > M SE
4. In most of the organization data from one terminal to
F test = at (2, 30) degrees of another terminal are copied through network as well as through
secondary storage devices.
freedom
5. In all organization only username and password method of
user identification is used, in which most of the user uses more
than 8 character passwords and remember their password by
memorizing. But no special training about importance and
privacy of password, access control rules and rights for each
user clearly stated and documented.
6. Not a single organization has security controls
implemented, such as–
 Auto logoff or lock capability after predetermined
time of inactive.
 Facility to intimate newly logged users.
 Log files for sensitive data.
 Staff signatures on confidential agreement 23 about data
security.
ANOVA Table [8]
13
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.9-15
ISSN: 2278-2427
 Background check on selection of IT staff. its updation facility, data backup facility programs and deletion
 Appointment of data security officer. of cookies etc.
 Any formal security plan and policies as well as g) Give training to select password and password
disciplinary process for staff that violates data security policies remembering method such that the selected password will be
and procedures. very difficult to trace for unauthorized user or intruder.
 Regularly test of security controls. h) Assign the fixed role and responsibility to the selected
 Staff attended any data security conference, trainings, user in organization.
refreshers and seminars. 3. To secure workstations and servers from intentional or
7. It is found that maximum employees from all organization accidental disclosure some suggestions on the basis of findings
agree that the knowledge and training of data security policies are-
and procedure is very necessary at the same time Information a) Install smoke detectors, air conditioning, humidity and
system audit is important for their organization. dehumidification equipments, access control devices, motion
8. All organizations having backup facilities and systems like detectors and Intrusion alarms on all accessible openings.
disk mirroring, and mainly uses CD/DVD as a backup media. b) Install Dry powder as well as CO2 type fire extinguishers.
c) Maintain entry and exit records for visitors to each
IX. SUGGESTIONS department and also escort the visitor up to the concern
personnel.
Success or failure of any business operation only depends upon d) Set auto logoff or lock pabilities after predetermined time
the different factors like- formal order chart, interdependence, of inactive.
interaction, integration of different components, planed e) Implement facility to intimate newly logged user or
approach and rigid aims or objective. Along with these attempts of unauthorized access.
characteristics some indirect characteristics are the faith and 4. Take daily backup of data in duplicates with encrypted
love on work and organization by fostering company form using standard cryptographic algorithm. Also retain
loyalty.From the overall observation it can be concluded that, minimum 2 generations of backups at offsite safe location
the majority of current work is running on the basis of faith on away from magnetic media and server room with relevant label
the corresponding employees rather than different application and number for easily identification.
or physical security controls to avoid or minimize the scope of 5.
the data alteration or loss due to any reason.
To carryout proper and rigid security plans some suggestions REFERENCES
[1] Thomas R.Peltier (Book) titled “Information Security Policies,
on the basis of findings are –
Procedures and Standards, Guidelines for Effective Information Security
1. From findings it is found that, all organizations are having Management”, Auerbach Publications [2002].
and installed antivirus, anti-spy ware and anti-span software‟s [2] Alfred Basta, Wolf Halton (Book) titled “Computer Security- Concepts,
on all machines. Hence to increase the security, accuracy and Issues and Implementation”, Cenage Learning India Edition [2009].
[3] Michael E.Whitman and Herbert J. Mattord (Book) titled “Principles of
work capacity some suggestions on the basis of findings are –
Information Security”, Thomson Learning- Course Technology, Second
a) Regularly schedule for updates to antivirus, anti-spy ware Edition [2007]
and anti-span software‟s against the latest viruses and spasm. [4] Information Security Roles and Responsibilities Made Easy (Book),
b) Install different latest patches and service packs of Version 2 by Charles Cresson Wood, CISSP, CISM, and CISA. Published
by information Shield, Inc., [2005].
system and application software‟s.
[5] Neena Godbole (Book) titled “Information Security”, Willey Publication,
c) Delete internet cookies after every visit of Internet. First Edition [2009]
2. Suggestions for selecting, training and creating user of [6] C.R. Kothari (Book) titled “Research Methodology , Methods and
system on the basis of findings are- techniques, New age International (p) Ltd, Second Edition [2004],
[7] Ron Weber (Book), Information Systems Control and Audit, Pearson
d) Conduct the background check on selection of IT staff.
Education, Fifth edition [2007]
a) Select IT staff that has completed at least 1 Years [8] S.C.Gupta and Indira Gupta (Book) titled “Statistical Techniques”,
University / private degree or certificate course in Computer Himalaya Publication House, New Delhi, Fifth Edition [2008].
b) Create separate logins for each user and allocate private [9] www.information-security-policies-and standards.com/compliance.html
[10] http://www.bitpipe.com/data/tlist?b=ka_bp_security.php
area for data storage.
[11] http://www.darkreading.com/security/attacks.html.
c) Make compulsory or arrange conferences, refreshers,
trainings or seminars on essentials of data security i.e. data BIOGRAPHIES
security policies and procedures.
d) Give training about appropriate use of password and the Mr. Babasaheb J. Mohite working
need to keep password private. as Assistant Professor at Sinhgad
e) Get signed on confidential agreement about data Institute of Business Management
security. (MCA), Kamlapur-Sangola (MS),
f) Give training to use different security or preventive India. His area of interest is
measures like fire extinguishers, use of antivirus program and Information Security Audit &
14
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.9-15
ISSN: 2278-2427
Control. Accordingly he has acquired the qualification of
B.Sc., MCM, MCA, M.Sc. (Sub.Com.), M.Phil. and currently
pursuing Ph.D. in Computer Applications from Shivaji
University, Kolhapur. He has more than thirteen years
experience in the field of Industry and Academics. He has
presented & published number of research papers in National
& International conferences and journals. He has authored four
books for BCA & BCS course.

Dr. Dilip M. Kumthekar is a professor


at V. P. Institute of Management Studies
and Research, Sangli (MS), India. He has
completed M.B.A., M.Com- R.M.-II,
M.Com(Sub.Com), Ph.D. He has more
than two decades of experience in the
field of academics. He is resource person
in the subject‟s area of Finance and Research Methodology. He
has coordinated and addressed in many programmes /
seminars/ workshops/ conferences at Regional and National
level. He is acting as a guide for M.Phil & Ph.D. He has
presented & published number of research papers in National
& International conferences and journals.

Dr. Milind J. Joshi is an experienced


Systems programmer in am
multidisciplinary university environment
working at Shivaji University Kolhapur
(MS), India, who can confidently work
across a variety of disciplines ranges from
Science, Social sciences, humanities,
education, engineering & technology, arts, medicine, and
pharmacy. He has having 24 years of experience in the field of
Industry and Academics. He has completed M.Com, MCM and
received Ph.D. in October 2002 from Shivaji University,
Kolhapur. His research area is „Use of Information Systems in
educational administration‟. He has authored book titled „Role
of MIS in University Administration‟ and also published many
research papers in National & International journals. He is
acting as a guide for M.Phil & Ph.D.

15
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.16-22
ISSN: 2278-2427

Innovative Method of Software Testing


Environment Using Cloud Computing Technology
S. Ravichandran
Associate Professor,Department of Information Technology,Sri Krishna Engineering College
Email: ravi17raja@gmail.com

Abstract—various information systems are widely used in as high-availability servers likely to form parallel and dis-
information society era, and the demand for highly dependable tributed systems, the testing of large-scale parallel and
system is increasing year after year. However, software testing for distributed system is troublesome job in real world after
such a system becomes more difficult due to the enlargement and deployment. When a failure occurs in parallel and distributed
the complexity of the system. In particular, it is too difficult to test systems, the reproducibility of the actual system is so poor that
parallel and distributed systems sufficiently although dependable the detection of the defective part has been serious problem. On
systems such as high-availability servers usually form parallel the other hand, a highly dependable system should be equipped
and distributed systems. To solve these problems, to propose a with the combination of multiple functions of fault tolerance
software testing environment for dependable parallel and against hardware faults. Even though testing of fault tolerant
distributed system using the cloud computing technology, named facilities should be done under hardware fault conditions or
D-Cloud. D-Cloud includes Eucalyptus as the cloud management anomaly loads, it is too difficult to destroy a specific part of
software, and FaultVM based on QEMU as the virtualization actual hardware or to concentrate an unrealistic overload in a
software, and D-Cloud frontend for interpreting test scenario. D- hardware device. To solve these problems, proposed a software
Cloud enables not only to automate the system configuration and testing environment for reliable distributed systems using cloud
the test procedure but also to perform a number of test cases computing technology, named ―D-Cloud‖ I n this paper, to
simultaneously, and to emulate hardware faults flexibly.I n this present the concept and design D-Cloud, discuss the description
paper, present the concept and design of D-Cloud, and describe of the system configuration and the test scenario, and report the
how to specify the system configuration and the test scenario. preliminary test example using D-Cloud.
Furthermore, the preliminary test example as the software testing
using D-Cloud was presented. Its result shows that D-Cloud
II. CONCEPT OF D-CLOUD
allows to set up the environment easily, and to test the software
A large-scale software testing environment using cloud
testing for the distributed system.
computing technology for dependable distributed systems,
named ―D-Cloud.‖ I n this section, describe the concept of D-
Keywords — D-Cloud, QEMU, Eucalyptus, FaultVM,
Cloud including the background of this research.In present
FAUmachine
information society, as the system scale enlarges and it
complicates the behavior of the system, sufficient software
I. INTRODUCTION
testing has become increasingly harder. Since each test
consumes the actual execution time depending on the software
According to shifting advanced information society, various
size and complexity, and the only way for speedup of software
information systems are used everywhere. Since such systems
testing process is that a lot of tests should be performed in
are closely related to daily life, they must employ highly
massively parallel. I n order to manage massive computing
dependable facilities to avoid undesirable behavior caused by
resources, introduce the cloud computing infrastructure to the
the underlying bugs and the interference from the external
software testing. Meanwhile, the demand for highly dependable
environment. I n order to certificate the depend-ability of such
system is increasing year after year. I n a highly dependable
systems, these should be tested sufficiently. However, as recent
system, fault tolerance is important capability so that the
information system becomes larger and more complicated,
system can tolerate hardware failures and anomaly behaviors.
software testing for such a system be-comes more difficult. I n
To realize fault tolerance, the system must be formed by the
order to check whether components work correctly, tremendous
redundant configuration. Parallel and distributed systems can
test cases are needed for various input patterns, and environment
provide the solution by the redundant resources because of
to execute a great number of tests immediately should be
multiprocessor and multiple nodes. However, in this case, the
provided. Especially, although highly dependable systems such
16
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.16-22
ISSN: 2278-2427
software testing has several serious problems. First, since each In providing various properties of dependability, since an
process runs in parallel independently, the behavior of the operating system plays a key role, to develop a dependable
software may become nondeterministic on the actual hardware. operating system, which is based on Linux with safe
I t means that it is too difficult to reproduce the same failure extension mechanism for adding dependable feature as kernel
after a failure occurred on such a system. Toward this problem, modules, and to provide several components as loadable
virtual machine technology helps the reproducibility by adding kernel modules, daemons, and tools. D-Cloud is also useful
the management mechanism for the time synchronization. for the testing of dependable systems using a dependable
Second, in the case of a large-scale distributed system, to build operating system.
the test environment becomes impossible. I n order to test such
a system, usually the preliminary test with restriction is done in III. D-CLOUDSOFTWARE TESTING
the small-scale system, and then the comprehensive test under ENVIRONMENT
the full-scale environment is conducted. However, it may
stretch the time and raise the cost for the system test unless the To develop a D-Cloud for software testing environment, D-
test system almost similar to the target environment is prepared. Cloud consists of multiple virtual machine nodes, which exe-
On this point, the cloud services based on IaaS (Infrastructure cute guest operating systems with fault injection, a controller
as a Service) also provide an answer, that is, they permit the use node, which controls all of the guest operating systems, and a
of huge number of computing nodes, and the emulation of frontend, which manages the hardware and software
entire system without the modification of the source codes configurations and the test scenarios. Figure 1 shows the
using a virtual machine on each node. Furthermore, although structure of D-Cloud.
testing of fault tolerant facilities is important in the highly A. Virtual machine with fault injection facility
dependable system, it is too difficult to make the specific In D-Cloud, it have been implementing FaultVM based on
hardware fault conditions or to generate anomaly loads in real QEMU as the virtualization software by adding the fault
world. The solution of this problem is to use virtual machine injection facility. The advantages of using QEMU are described
technology to provide the fault injection facility, and it can below.
emulate hardware faults of several devices within the virtual  QEMU is open-source software. This allows the
machine according to the request from the tester. modification to the emulation codes of the device for adding
the fault injection facility, and the improvement for the
reproducibility by adding the management of time
synchronization.
 QEU can support various processor architectures. Especially,
emulators for several embedded processors such as ARM and
SH are already available.
 QEMU can emulate a number of hardware devices. Thus
QEMU may treat several hardware faults in the guest OS.
B. Management of computing resources using Eucalyptus
Based on above discussions, D-Cloud aims for the realization I n order to execute many tests simultaneously, a large amount
of the software testing environment as follows: of resources must be managed efficiently and flexibly.
1) By the use of computing resource provided by the cloud Therefore, introduce Eucalyptus as the cloud management
computing system, a number of test case can be performed software. Eucalyptus is a cloud computing infrastructure that
simultaneously, thus software testing can be accelerated. manages machine resources flexibly using a virtual machine,
and an open-source implementation having the same API as
2) By the description of the system configuration and test AmazonEC2.
scenario, a series of complex test procedure can be
automated. The roles of Eucalyptus in D-Cloud are shown as follows:
3) Hardware fault and anomaly state can be emulated  Management of various guest OS images on the controller
flexibly as many times as needed. node
4) The target parallel and distributed system can be built  Transfer of the specified guest OS images from the
onto the cloud computing system, and the execution of the controller node to appropriate QEMU nodes
system on the cloud helps the detection of the timing bug  Beginning and completion of guest operating systems on
and the reproduction of the failure.
17
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.16-22
ISSN: 2278-2427
QEMU nodes Cpu Number of CPUs
By these features, the tester does not need to be aware of the Mem Size of memory
allocation for computing resources provided by D-Cloud. Nic Number of NICs
Id ID of the used OS image
C. Automated system configuration and testing
D-Cloud automates the system setup and the test process, Table I I - s y s t e m D e fi n i t i o n E L E M E N T
including the fault injection, based on a scenario written by a
tester. ―D-Cloud frontend‖ manages guest operating systems, Element name Meaning
configures system test environments, transfers various data system Delimiter for definition of
from the tester to guest operating systems for the execution of the software environment
testing, and collects testing results from guest operating name Name of the software
systems. host environment
Delimiter of the testing host
hostname Name of the host
D-Cloud frontend performs the following acts: machinename Name of the used machine
 Reception of a test scenario, a test program, input data, config element
Designation of the configuration
and a script including execution commands from a tester file
 Interpretation of the test scenario written in XML A. Configuration for the hardware environment
 Transfer of the test program, the input data, and the The description of the hardware configuration is given by the
script to the guest operating system ―machineDefinition‖ element. Table I lists the contents of the
 Issue of the request for the startup of a guest operating ―machineDefinition‖ element. All hardware components used
system to the Eucalyptus controller node in the test must be defined by each ―machine‖ element. The
 Issue of the fault injection command for the target guest ―machine‖ element must include five elements, ―name,‖ ―cpu,‖
operating system to the appropriate virtual machine ―mem,‖ ―nic,‖ and ―id.‖ The ―name‖ is refered in the
 Collection of the output data, logs, and snapshots from the ―systemDefinition‖ element described in the following sub-
guest operating system section. The ―cpu‖ and ―nic‖ indicate the number of CPUs and
NICs, respectively, and ―mem‖ represents the allocation size of
IV. DESCRIPTIONOFSYSTEM CONFIGURATION the main memory. The ―id‖ element designates the identifier
AND TEST SCENARIO for the system image to be used. Eucalyptus provides each
system image with a unique identifier in the cloud system, and
As described above, D-Cloud performs preparation and test the identifier is also used in D-Cloud.
according to a scenario written in XML. By providing
multiple scenario files, various systems can be tested simul- B. Setting for the software environment
taneously. Furthermore, since the cloud controller manages the
computing resources appropriately, the tester can submit the The description of the software environment is given by the
test items one after another regardless of available computing ―systemDefinition‖ element containing elements shown in
resources. Table II . A l l the software environment used in the test must
Testing scenario statement consists of four parts as follows. be defined by each ―system‖ element. The ―system‖ element
 m a c h i n e D e f i n i t i o n : Descriptions for the hard-ware must include two elements, ―name‖ and ―host.‖ The ―name‖ is
configuration referred in the ―testDescription‖ element. Moreover, the
―host‖ element contains three elements, ―host-name,‖
 systemDefinition: Descriptions for the software ―machinename,‖ and ―config.‖ The ―hostname‖ determines
environment the name of the host, the ―machine name‖ is selected from the
 injectionDefinition: Definitions of faults for ―name‖ of ―machine‖ within the ―machineDefinition‖
injection element. The ―config‖ designates a file containing the various
 t e s t D e f i n i t i o n : Procedures of the entire test kinds of parameters.

Table I-m a c h i n e D e f i n i t i o n E L E M E N T
TableIII- I n j e c t i o n D e f i n i t i o n E L E M E N T
Element Meaning
name
machine Delimiter for definition of the Element name Meaning
name hardwaredefinition
Name environment
of the hardware injection Delimiter for definition of the fault injection
environment
18
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.16-22
ISSN: 2278-2427
name Name definition of the fault injection ―script‖ element includes four elements, ―on,‖ ―putFile,‖
Fault Delimiter for configuration of the injection ―exec,‖ and ―inject‖ for each needed host. The ―on‖ specifies
location Designation of device type the host name defined in the ―systemDefinition‖ element. The
―putFile‖ and ―exec‖ specify the file name for the transfer to
target Designation of target device
the host and the execute command,
kind Type of fault
t i me Duration of the fault event Table V-T e s t D e f i n i t i o n E L E M E N T
Table IV-TY P E S O F F A U L T I N J E C T I O N Element Meaning
Device Fault Value name
Run Delimiter for definition of the test
Hard Specified sector returns badblock Name scenario
Name of the test scenario
disk error r ead o nly systemnam Name of the used system element
Specified sector is read- ecc e alt
H Ending time of the test
only corrupt Script Delimiter for definition of the execution
Error is detected by ECC slow On script
Execution host
Received data contains putFile File transmitted to the guest OS
Netwo error
1bit error of packet 1bit Exec Designation of the script file
rk Response
2bit error ofofpacket
disk becomes 2bit including the execution commands
slow
Error is detected by CRC crc Inject Execution of the fault injection
Packet loss loss
NIC is not responding nic Respectively, the ―inject‖ is selected from the name defined in
the ―injectionDefinition‖ element. The ―inject‖ element also
Memor Bit error Bit
has ―when‖ attribute, which specifies the duration of the fault
y Byte at specified address B yt e
incidence.I n addition to the description by XML, consider the
contains error
support for building the system environment and for the
execution of the system testing by introducing the dynamic
C. Definition of fault injection scripting language. This supplement helps the tester perform the
The definition of fault injection items is given in the desired test easily and flexibly. Moreover, by the use of the
―injectionDefinition‖ element containing elements shown in scripting language, the stylized description may improve the
Table I I I . I t may have multiple ―injection‖ elements, each of portability of the test process.
which has a ―name‖ element and multiple ―fault‖ elements.
The ―injection‖ element is assigned to each fault injection V. PRELIMINARY TEST EXAMPLE USING D-
event. The ―name‖ is referred in the ―testDescription‖ CLOUD
element. The ―fault‖ element must include four elements,
―location,‖ ―target,‖ ―kind,‖ and ―time.‖ The ―location‖ and Preliminarily evaluate D-Cloud by testing the actual
―target‖ specify the target device type and device name to dependable system. It have proposed and developed a fault
inject a fault, respectively. The ―kind‖ indicates the selection tolerant and high-performance interconnection network based
of fault injection elements listed in Table I V . The ―time‖ on the multi-link of Gigabit Ethernet (GbE) named RI2N
represents the duration of fault injection. (Redundant Interconnection with Inexpensive Network) Here,
to assume simplified system using RI2N. Client1 is connected
D. Description for the automatic test procedures with server1 by two Ethernet links, network0 and network1.
The execution of the test is described in the ―testDefinition‖ In this case, network0 and network1 form the RI2N logical
element using the contents shown in Table V. The ―run‖ link. Network2 is also available for issuing the command from
element is used for the independent test definitions, and D-Cloud frontend to each node and the collection of
multiple ―run‖ elements may exist in a ―testDefinition‖ measurement results to D-Cloud frontend. Moreover, to
element. The ―name‖ element defines the name of the system assume the test scenario as follows;
test to be performed. The output file containing test result is
created with the file name based on the content of ―name‖ 1) Client 1 performs burst data transfer to server 1 using
element. The ―systemname‖ indicates the name in the RI2N continuously. I n this case, throughput is expected
―systemDefinition‖ element. The ―halt‖ element with ―when‖ to be twice as high as single link.
attribute decides the finish time of the entire system test. The 2) After 200 seconds from the power-on, the network
19
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.16-22
ISSN: 2278-2427
interface ―eth0‖ of client1 is down during 60 seconds. and distributed software on a grid computing platform using
RI2N link will be down immediately, however, Condor as a workload management system. Unlike D-Cloud
throughput should recover to the level of the single link concept, uses a cloud computing environment, and enables to
after a few seconds. create and execute VM instances for program tests through a
web portal. Cloud is proposed as a cloud computing facility for
3) After that, ―eth0‖ interface on client1 is alive again.
software testing, and performs parallel symbolic execution
RI2N will detect the link recovery, and throughput
based on the source code.
should recover to the same level as in the beginning
condition.
1 <job Descriptio n>
4) Finally, the system is halted 300 seconds after the 2 <machineDefinition>
power-on. 3 <machine>
4 <name>server</name>
5 <cpu>1</cpu> <mem>512</mem>
<nic>3</nic>
6 <id>emi-1D8C0CAA</id>
7 </machine>
8 <machine>
9 <name>client</name>
10 <cpu>1</cpu> <mem>512</mem>
<nic>3</nic>
11 <id>emi-0ACC0C2D</id>
Figure 2. Simplified system example using RI2N
12 </machine>
Based on this scenario, the description by XML can be denoted.
13 </machineDefinitio n>
It is notable that step 2 can be expressed as the fault injection of
14 <systemDefinitio n>
the packet loss against eth0 of client1.To demonstrate the part
15 <system>
of the web interface for the management of test scenarios in D-
16 <name>systemA</name>
Cloud, and it shows that three test scenarios (nic0.xml,
17 <host>
nic1.xml, and nic2.xml) are running simultaneously on D-
18 <hostname>server1</hostname>
Cloud.To indicate the results obtained by the above scenario.
19 <machinename>server</machinename>
Red arrow indicates the duration of the fault injection (60 sec.).
20 <co n fi g >s er v. co nf</co n fig>
I n this result, when the fault is injected to eth0 of client1,
21 </ho st>
throughput falls transiently, and soon throughput recovers to
22 <host>
lower level than before. After eth0 is alive again, with a few
23 <hostname>client1</hostname>
seconds of delay, the throughput recovers to the same level as
24 <machinename>client</machinename>
in the original condition. The absolute values of the throughput
25 < c o n fi g > c l i e n t . c o n f< / c o n fi g >
are incorrect in current D-Cloud. I t is because each packet
26 </ho st>
transfer is performed via real network while the behaviors of
27 </system>
client1 and server1 are emulated within each virtual machine.
28 </s yste mDe finit io n>
Even though, confirm that the fault tolerant and recovery
29 < i n j e c t i o n D e f i n i t i o n >
detection capability of RI2N work correctly by relative
30 <injection>
tendency of the results.
31 <name>in jectionA</name>
32 <fault>
V I . RELATED WORKS
33 <lo catio n>net wo rk</lo c atio n>
34 <target>eth0 </target>
Recently, Large-scale software testing has been studied.
35 <kind>lo ss</kind >
GridUnit executes software tests automatically on the grid by
36 <time>60</time>
distributing the execution of JUnit test suites with minimum
37 < / f ault>
user intervention. GridUnit is naturally limited to the execution
38 </injection>
of JUnit test code by Java. When test nodes are crashed and
39 < / i n j e c t i o n D e f i n i t i o n >
stopped in GridUnit, they cannot execute remaining program
40 <te st De scr ip t io n>
tests. ETICS also provides automated test environments for grid
41 <run>
20
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.16-22
ISSN: 2278-2427

42 <name>testA</name>
43 <systemname>systemA</systemname>
44 <h al t when="300">down</halt>
45 <script>
46 <on>client1</on>
47 <putFile>test.sh</putFile>
48 <exec> test. sh</exec>
49 < i n j e c t when="2 00">injectio nA</inject>
50 </script>
51 </run> Figure 5. Test results obtained by D-Cloud
52 < / t e s t D e s c ri p t io n >
53 </j o b Desc rip t io n> V I I . CONCLUSION AND FUTURE WORK
To present the concept and design of the software testing
Figure 3. Example test scenario for RI2N by XML environment using the cloud computing technology, named D-
Cloud. D-Cloud permits the automatic configuration, testing
with fault injection along the description of the testing scenario.
On the other hand, fault injection techniques in program tests
It have been developing D - Cloud using Eucalyptus as a cloud
have been proposed. DOCTOR is a software fault injector,
management software and QEMU as a virtualization software.
which supports memory faults, CPU faults, and communication
As the software testing using D-Cloud, the preliminary test
faults. Although software fault injection needs modification of
example was denoted, and the result demonstrated that D-Cloud
the source codes to be tested, this approach need not modify the
allows to set up the environment easily, and to test the software
source codes at all for fault injection. FAUmachine performs a
testing for the distributed system. At present, D-Cloud can
software test using virtual machines for fault injection
obtain the testing results including the virtual console logs and
mechanism. However, since FAUmachine does not provide an
the syslog outputs by the running processes and operating
automated test environment, the tester must configure the test
system in FaultVM/QEMU on each node. In general use, it
environment manually.
should consider more sophisticated way to gather the results and
detect the fault from large amount of logs.In future work, it
should append the management mechanism to D-Cloud for
keeping reproducibility by time synchronization in coarse grain
among related virtual machines without sacrificing the
performance. Further, to intro-duce the model simulator written
by the system description language to D-Cloud in order to test
various systems including embedded systems with proprietary
hardware’s.In proposed DS-Bench as a dependability
benchmarking framework for a dependable operating system.
D-Cloud is so useful as the virtual platform for DS-Bench since
anomaly loads can be generated automatically from the request
given by the scenario file using D-Cloud.
Figure 4. Current management screen of D-cloud
REFERENCES
[1] Large-Scale Software Testing Environment using Cloud Computing
Technology for Dependable Parallel and Distributed Systems. Toshihiro
Hanawa, Takayuki Banzai, Hitoshi Koizumi, Ryo Kanbayashi, Takayuki
Imada, and Mitsuhisa Sato Department of Computer Science Center for
Computational Sciences University of Tsukuba
[2] T. Banzai, H. Koizumi, R. Kanbayashi, T. Imada, H. Kimura, T. Hanawa,
and M. Sato, ―D-Cloud: Design of a software testing environment for
reliable distributed systems using cloud computing technology,‖ in Proc.
2nd International Symposium on Cloud Computing (Cloud 2010) in
conjunction with CCGrid2010, May 2010, (To be appeared).

21
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.16-22
ISSN: 2278-2427
[3] Y. Ishikawa et al., ―Towards an open dependable operating system,‖ in
Proc. 12th International Symposium on Object/Component/Service-
Oriented Real-Time Distributed Computing, Mar. 2009, pp. 20–27.
[4] Nurmi et al., ―The eucalyptus open-source cloud-computing system,‖ in
Proc. 9th IEEE/ACM International Symposium on Cluster Computing and
the Grid (CCGrid ’09), 2009, pp. 124–131.
[5] Amazon elastic compute cloud (Amazon EC2). [Online]. Available:
http://aws.amazon.com/ec2/
[6] S. Miura, T. Hanawa, T. Yonemoto, T. Boku, and M. Sato, ―RI2N/DRV:
Multi-link Ethernet for high-bandwidth and fault-tolerant network on PC
clusters,‖ in Proc. The 9th Workshop on Communication Architecture for
Clusters (CAC) in IPDPS, May 2009, pp. 1–8.
[7] Duarte, W. Cirne, F. Brasileiro, and P. Machado, ―GridUnit: software
testing on the grid,‖ in Proc. 28th international conference on Software
engineering (ICSE ’06), 2006, pp. 779–782.
[8] M.-E. Begin et al., ―Build, configuration, integration and testing tools for
large software projects: ETICS,‖ in Proc. Rapid Integration of Software
Engineering Techniques, ser. Lecture Notes in Computer Science, vol.
4401, Sep. 2007, pp. 81–97.
[9] Open Solaris test farm. [Online]. Available: http://opensolaris.
Org/os/community/testing/testfarm

Author Profile:

S.Ravichandran- S.Ravichandran is an Associate Professor


in Department of Information Technology at Sri Krishna
Engineering College. He received the Master of Computer
Application in Bharathidhasan University at 1996, he received
the Master of Philosophy in Computer science in Madurai
Kamaraj University at 2007, he received the Master of
Engineering in Computer Science and Engineering from Anna
University at 2010 and now he is perusing Doctorate of
philosophy in Computer science at Bharathiar University. He
has 16.5 years of teaching experiences from various
Engineering Colleges. He has published 1 paper in
international journal (IJCSE) and he has presented in 12
International Conferences & presented in 15 National
Conferences in various Engineering Colleges. His area of
interest includes Cloud Computing, Artificial Intelligence,
Networks and Compilers.

22
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.23-30
ISSN: 2278-2427

An Efficient Approach for Using the Wireless


Sensor Networks in Mobile Computing
1
V.khanaa, 2 Krishna Mohanta
1
Research Scholar, Bharath University, Chennai – 600 073, INDIA,
2
Sri Sai Ram Engg. College Chennai 600 044., INDIA,
Email: drvkannan62@yahoo.com,krishnamohanta@gmail.com

Abstract-A sensor network typically comprises a large number of fast enough. A big challenge to sensor networks is a fast, reliable
low-power, low-cost, tiny embedded devices with sensing and fault tolerant channel during emergency conditions to sink
capabilities, which are networked together to collect, process, (base station) that receives the events. The main focus of this
and deliver information about a physical phenomenon of interest. thesis is to discuss and evaluate the performance of two different
The position of the nodes could be engineered or predetermined, routing protocols like Ad hoc On Demand Distance Vector
such as in structural health monitoring, where nodes are placed at (AODV) and Dynamic Source Routing (DSR) for monitoring of
optimal locations to maximize the fidelity of measured vibrations critical conditions with the help of important metrics like
for accurate and reliable diagnosis about the health of the throughput and end-to-end delay in different scenarios. On the
structure. On other occasions, nodes could be placed randomly, basis of results derived from simulation a conclusion is drawn on
allowing deployment of networks over inaccessible terrains or in the comparison between these two different routing protocols
disaster recovery operations. Wireless Sensor Networks (WSN) with parameters like end-to-end delay and throughput.
[1] have appeared as one of the most prominent enabling
technologies of Micro-Electro-Mechanical Systems I. MOBILE COMMUNICATION PRINCIPLES
(MEMS)MEMS, which combines automated sensing, embedded
computing, and wireless capabilities into tiny devices, bringing Each mobile uses a separate, temporary radio channel to talk to
promises of understanding and incrementing nature at scales that the cell site. The cell site talks to many mobiles at once, using
were unimaginable before. Just like the invention of microscope one channel per mobile. Channels use a pair of frequencies for
has let us see things that were previously invisible to the naked communication—one frequency (the forward link) for
eye, wireless sensor networks have enabled us not only to detect transmitting from the cell site and one frequency (the reverse
and measure a physical phenomenon with accuracy even at the link) for the cell site to receive calls from the users. Radio energy
microscopic level, but also to communicate the measured dissipates over distance, so mobiles must stay near the base
information across distances using the wireless medium. station to maintain communications. The basic structure of
Wireless Sensor Networks is focused on developing low-power mobile networks includes telephone systems and radio services.
sensing the devices to enable large-scale, distributed, networked Where mobile radio service operates in a closed network and has
sensor system through the sense-IT project. This Concept is used no access to the telephone system, mobile telephone service
for Data Communication as well as mobile computing is very allows interconnection to the telephone network
purpose to used for wireless sensor networks. Deployment of
sensor networks are increasing either manually or randomly to 1.2Early Mobile Telephone System Architecture
monitor physical environments in different applications such as Traditional mobile service was structured in a fashion similar to
military, agriculture, medical transport, industry etc. In television broadcasting: One very powerful transmitter located at
monitoring of physical environments, the most important the highest spot in an area would broadcast in a radius of up to 50
application of wireless sensor network is monitoring of critical kilometers. The cellular concept structured the mobile telephone
conditions. The most important in monitoring application like network in a different way.
critical condition is the sensing of information during emergency Instead of using one powerful transmitter, many low-power
state from the physical environment where the network of transmitters were placed throughout a coverage area. For
sensors is deployed. In order to respond within a fraction of example, by dividing a metropolitan region into one hundred
seconds in case of critical conditions like explosions, fire and different areas (cells) with low-power transmitters using 12
leaking of toxic gases, there must be a system which should be conversations (channels) each,

23
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.23-30
ISSN: 2278-2427

Figure-1: Basic Mobile Telephone Service Network

Figure-3: Mobile Telephone System Using a Cellular


the system capacity theoretically could be increased
Architecture
from 12 conversations—or voice channels using one
The cellular radio equipment (base station) can communicate
powerful transmitter—to 1,200 conversations
with mobiles as long as they are within range. Radio energy
(channels) using one hundred low-power transmitters.
dissipates over distance, so the mobiles must be within the
operating range of the base station. Like the early mobile radio
system, the base station communicates with mobiles via a
channel. The channel is made of two frequencies, one for
transmitting to the base station and one to receive information
from the base station.

1.2.2. Cellular System Architecture:


Figure-2: Telephone Network Transmitter Increases in demand and the poor quality of existing service led
mobile service providers to research ways to improve the quality
1.2.1 Mobile Telephone System Using the Cellular Concept: of service and to support more users in their systems. Because
Interference problems caused by mobile units using the same the amount of frequency spectrum available for mobile cellular
channel in adjacent areas proved that all channels could not be use was limited, efficient use of the required frequencies was
reused in every cell. Areas had to be skipped before the same needed for mobile cellular coverage. In modern cellular
channel could be reused. Even though this affected the efficiency telephony, rural and urban regions are divided into areas
of the original concept, frequency reuse was still a viable according to specific provisioning guidelines. Deployment
solution to the problems of mobile telephony systems. parameters, such as amount of cell-splitting and cell sizes, are
Engineers discovered that the interference effects were not due to determined by engineers experienced in cellular system
the distance between areas, but to the ratio of the distance architecture. Provisioning for each region is planned according to
between areas to the transmitter power (radius) of the areas. By an engineering plan that includes cells, clusters, frequency reuse,
reducing the radius of an area by 50 percent, service providers and handovers.
could increase the number of potential customers in an area
fourfold. Systems based on areas with a one-kilometer radius 1.1.4. Benefits of Cells using Sensor Networks:
would have one hundred times more channels than systems with A cell is the basic geographic unit of a cellular system. The term
areas 10 kilometers in radius. Speculation led to the conclusion cellular comes from the honeycomb shape of the areas into
that by reducing the radius of areas to a few hundred meters, which a coverage region is divided. Cells are base stations
millions of calls could be served.The cellular concept employs transmitting over small geographic areas that are represented as
variable low-power levels, which allow cells to be sized hexagons. Each cell size varies depending on the landscape.
according to the subscriber density and demand of a given area. Because of constraints imposed by natural terrain and man-made
As the population grows, cells can be added to accommodate that structures, the true shape of cells is not a perfect hexagon.
growth. Frequencies used in one cell cluster can be reused in
other cells. Conversations can be handed off from cell to cell to 1.1.5. Clusters
maintain constant phone service as the user moves between cells. Cluster computing is a form of computing in which a group of
computers are linked together so that they can act like a single

24
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.23-30
ISSN: 2278-2427

entity. There are a number of reasons for people to use cluster Unfortunately, economic considerations made the concept of
computers for computing tasks, ranging from an inability to creating full systems with many small areas impractical. To
afford a single computer with the computing capability of a overcome this difficulty, system operators developed the idea of
cluster to a desire to ensure that a computing system is always cell splitting. As a service area becomes full of users, this
available. The precise date at which this technique was approach is used to split a single area into smaller ones. In this
developed is unknown, and there are competing claims for the way, urban centers can be split into as many areas as necessary to
invention credit, with some people suggesting that individual provide acceptable service levels in heavy-traffic regions, while
users probably developed cluster computing independently to larger, less expensive cells can be used to cover remote rural
meet their computing needs long before the technique was used regions.
in industrial settings.A Cluster is a group of Cells. No channels
are reused within a cluster. Figure Illustrates a seven- cell cluster.

Figure-6 : Cell Splitting

1.1.8. Handoff
Figure-4: A Seven-Cell Cluster The final obstacle in the development of the cellular network
involved the problem created when a mobile subscriber traveled
1.1.6. Frequency Reuse: from one cell to another during a call. As adjacent areas do not
Only a small number of radio channel frequencies were available use the same radio channels, a call must either be dropped or
for mobile systems, engineers had to find a way to reuse radio transferred from one radio channel to another when a user
channels to carry more than one conversation at a time. The crosses the line between adjacent cells. Because dropping the call
solution the industry adopted was called frequency planning or is unacceptable, the process of handoff was created. Handoff
frequency reuse. Frequency reuse was implemented by occurs when the mobile telephone network automatically
restructuring the mobile telephone system architecture into the transfers a call from radio channel to radio channel as mobile
cellular concept. The concept of frequency reuse is based on crosses adjacent cells.During a call, two parties are on one voice
assigning to each cell a group of radio channels used within a channel. When the mobile unit moves out of the coverage area of
small geographic area. Cells are assigned a group of channels a given cell site, the reception becomes weak. At this point, the
that is completely different from neighboring cells. The coverage cell site in use requests a handoff. The system switches the call to
area of cells is called the footprint. This footprint is limited by a a stronger-frequency channel in a new site without interrupting
boundary so that the same group of channels can be used in the call or alerting the user. The call continues as long as the user
different cells that are far enough away from each other so that is talking, and the user does not notice the handoff at all.
their frequencies do not interfere. Cells with the same number II. DATA COMMUNICATION PATTERNS IN
have the same set of frequencies. Here, because the number of SENSOR NETWORKS
available frequencies is 7, the frequency reuse factor is 1/7. That
is, each cell is using 1/7 of available cellular channels Sensor networks are characterized by ad hoc multi-hop networks
that are capable of self-organizing without the help of any
external infrastructure. Once a network is deployed, the nodes
collect data about a physical phenomenon of interest, process it
locally, and send it toward a common sink node, which can
perhaps fuse all the received data and make intelligent decisions.
The sink node is typically high-powered, such as a laptop, with
larger memory and processing power. Although in small-scale,
Figure-5: Frequency Reuse single-hop networks, direct communication between the nodes
. and the sink is possible, the most common form of
1.1.7. Cell Splitting communication in large-scale, multi-hop networks is peer-to-
25
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.23-30
ISSN: 2278-2427

peer, i.e., among neighboring nodes. This peer-to-peer • Continuous/Periodic Delivery: This form of data collection
communication over short distances is ideal for low-power, is most relevant for real-time, mission-critical applications
short-range radios, and allows nodes to cooperate and where sensing and collection are performed synchronously, or
collectively work toward a common goal.There are three basic for applications where periodic notification of events is
data communication patterns in sensor networks: (i) required. Such data collection usually takes place over long
convergecast, (ii) unicast or local broadcast, and (iii) multicast. durations of time ranging from low data-rate scenarios, such as
We describe each of them in details below. in surveillance and habitat monitoring, to high data-rate
Convergecast: It is a many-to-one communication pattern [3, 4 scenarios, such as in structural health and permafrost
], where data flows from a set of nodes toward a common sink monitoring. Since the nodes need to continuously sense and
over a tree-based routing topology. This is the most common transmit data, energy efficiency is a big concern for continuous
form of data communication and constitutes a fundamental and periodic data collection.
operational primitive in sensor networks. When the sensor • Query-Driven Delivery: In this model [11], the nodes send
readings are correlated due to spatial/temporal proximity of the data only when triggered by an external query fed into the
nodes, or when the application requires summarized information, network by the sink node. Since the nodes could sleep most of
data is often combined or aggregated at each hop en route to the the time and wake up to collect data only when triggered by
sink. Data aggregation [5] has been put forward as an essential the queries, this delivery model is efficient in terms of energy
paradigm for wireless routing in sensor networks, where the idea consumption. Typical application scenarios for query-driven
is to combine the data coming from different sources before data delivery includes getting a snapshot view of the network,
transmitting to the upstream node toward the sink. It has been or sending back ack/acknowledgments in response to software
shown that aggregation can eliminate redundancy and minimize reconfigure/upgrade messages sent by the sink. Such data
the number of transmissions, thus saving energy. This paradigm delivery usually spans over short intervals.
shifts the focus from traditional address-centric approaches for • Event-Driven Delivery: The sensor nodes could be
networking (finding short routes between pairs of addressable programmed to deliver data whenever an event of interest
end-nodes) to a more data-centric approach, i.e., finding routes occurs within the network. This mode of data acquisition is
from multiple sources to a single destination that allows in- useful when the events are rare but critical. However, such
network consolidation of redundant data. We refer to the events could also trigger huge bursts of data that require
converge cast process under aggregation as aggregated immediate delivery. Since the nodes need to sense the
convergecast [6,7], and distinguish it from raw-data environment continuously for possible occurrence of the
convergecast [8,9 ] when there is no aggregation. events, but transmit only when an actual event occurs, energy
Unicast: It is a form of local broadcast where a node exchanges consumption is a lesser severe concern compared to the case of
data with its local neighbors, for instance, to perform continuous/periodic delivery.
collaborative data processing and fusion instead of transmitting
raw sensor readings 2.3Characteristics Wireless Network:
Multicast: It can be considered as opposite to converge cast, i.e., Routing in WSNs is very challenging due to the inherent
one-to-many communication pattern in which data is characteristics that distinguish these networks from other
disseminated from the sink to a set of nodes. Multicast could be wireless networks like mobile ad hoc networks or cellular
used, for instance, in reprogrammable sensor networks where the networks.
sink supplies automatic network-wide updates of system  First, due to the relatively large number of sensor nodes, it is
software or reconfiguration information to all the nodes. not possible to build a global addressing scheme for the
deployment of a large number of sensor nodes as the
2.2Data Acquisition Models in Sensor Networks: overhead of ID maintenance is high. Thus, traditional IP-
Converge cast or many-to-one communication being the most based protocols may not be applied to WSNs. Furthermore,
fundamental form of data collection in sensor networks, it is sensor nodes that are deployed in an ad hoc manner need to
natural to ask what triggers the data collection process; in other be self-organizing as the ad hoc deployment of these nodes
words, what are the data acquisition models in sensor networks. requires the system to form connections and cope with the
Here, we present a classification of the most common types of resultant nodal distribution especially that the operation of
data acquisition models [10] and give examples of applications to the sensor networks is un-attended. In WSNs, sometimes
which they are relevant. getting the data is more important than knowing the IDs of
which nodes sent the data.
26
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.23-30
ISSN: 2278-2427

 Second, in contrast to typical communication networks, energy because of limited battery power. They are also prone to
almost all applications of sensor networks require the flow failure because of random placement of nodes in a harsh
of sensed data from multiple sources to a particular BS. environment, presence of unexpected obstacles, unreliable nature
This, however, does not prevent the flow of data to be in of the wireless link, and nodes in a neighborhood might not be
other forms (e.g., multicast or peer to peer). able to reach each other occasionally. Redundancy and device
 Third, sensor nodes are tightly constrained in terms of density are exploited to ensure full coverage of the intended
energy, processing, and storage capacities. Thus, they terrain and allow the network to self reconfigure when
require careful resource management. communication links are disrupted.
 Fourth, in most application scenarios, nodes in WSNs are Data-Centric Routing: In the data-centric paradigm, sensor
generally stationary after deployment except for, may be, a nodes need not be identified by a unique ID. The querying unit
few mobile nodes. Nodes in other traditional wireless usually called a sink, identifies multiple responding sensors
networks are free to move, which results in unpredictable based on the required and collected data. The query is not
and frequent topological changes. However, in some addressed to any specific sensor, but is based on the data
applications, some sensor nodes may be allowed to move observed by the sensor and hence it is termed as the data-centric
and change their location (although with very low mobility). approach. Moreover, as nodes in a locality sense the same
Fourth, sensor networks are application specific, i.e., design phenomenon, the traditional end-to-end routing used in MANETs
requirements of a sensor network change with application. cannot be applied to sensor networks for query processing. Data-
For example, the challenging problem of low-latency centric routing is eminently suited to perform operations such as
precision tactical surveillance is different from that required data aggregation in sensor networks.
for a periodic weather-monitoring task. Data Aggregation: Data implosion and overlap are common
 Fifth, position awareness of sensor nodes is important since phenomenon in a sensor network as nodes in the proximity
data collection is normally based on the location. Currently, usually hold similar data. Energy is therefore wasted when the
it is not feasible to use Global Positioning System (GPS) same data value from multiple sources is individually routed to
hardware for this purpose. Methods based on triangulation the sink. It is desirable to process as much data locally as
[17], for example, allow sensor nodes to approximate their possible so as to reduce the number of bits transmitted in the air,
position using radio strength from a few known points. It is particularly over a long distance. Transmitting 1 Kb of data a
found in [17] that algorithms based on triangulation or distance of 100 m costs the same amount of energy as executing
multilateration can work quite well under conditions where 300 million instructions on a general purpose processor with a
only very few nodes know their positions apriori, e.g., using modest computing device rate of 100 million instructions per
GPS hardware. Still, it is favorable to have GPS-free second (MIPS).
solutions [18] for the location problem in WSNs. Localized Algorithms: These can be implemented in a
 Finally, data collected by many sensors in WSNs is typically distributed manner and are therefore attractive in environments
based on common phenomena, hence there is a high where the delay and communication overhead associated with
probability that this data has some redundancy. Such collection/dissemination of global information can adversely
redundancy needs to be exploited by the routing protocols to affect the overall performance. Local processing and
improve energy and bandwidth utilization. Usually, WSNs collaboration among sensor nodes are encouraged for filtering
are data-centric networks in the sense that data is requested and combining readings from sensor nodes in a neighborhood.
based on certain attributes, i.e., attribute-based addressing.
An attribute-based address is composed of a set of attribute- 2.5Routing Challenges and Design Issues in WSNs:
value pair query. For example, if the query is something like Despite the innumerable applications of WSNs, these networks
[temperature > 60F], then sensor nodes that sense have several restrictions, e.g., limited energy supply, limited
temperature > 60F only need to respond and report their computing power, and limited bandwidth of the wireless links
readings. Due to such differences, many new algorithms connecting sensor nodes. One of the main design goals of WSNs
have been proposed for the routing problem in WSNs. is to carry out data communication while trying to prolong the
lifetime of the network and prevent connectivity degradation by
2.4Challenges of wireless Sensor: employing aggressive energy management techniques.The design
There are many underlying characteristics of wireless sensor of routing protocols in WSNs is influenced by many challenging
networks and the most important ones are considered here. factors. These factors must be overcome before efficient
Exploiting redundancy: Sensor nodes are expected to run out of communication can be achieved in WSNs. In the following are
27
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.23-30
ISSN: 2278-2427

some of the routing challenges and design issues that affect on the application a sensor node can have different role or
routing process in WSNs. capability. The existence of heterogeneous set of sensors raises
many technical issues related to data routing. For example, some
2.5.1. Node Deployment: applications might require a diverse mixture of sensors for
Node deployment in WSNs is application dependent and affects monitoring temperature, pressure and humidity of the
the performance of the routing protocol. The deployment can be surrounding environment, detecting motion via acoustic
either deterministic or randomized. In deterministic deployment, signatures, and capturing the image or video tracking of moving
the sensors are manually placed and data is routed through pre- objects. These special sensors can be either deployed
determined paths. However, in random node deployment, the independently or the different functionalities can be included in
sensor nodes are scattered randomly creating an infrastructure in the same sensor nodes. Even data reading and reporting can be
an ad hoc manner. If the resultant distribution of nodes is not generated from these sensors at different rates, subject to diverse
uniform, optimal clustering becomes necessary to allow quality of service constraints, and can follow multiple data
connectivity and enable energy efficient network operation. reporting models. For example, hierarchical protocols designate a
Inter-sensor communication is normally within short cluster- head node different from the normal sensors. These
transmission ranges due to energy and bandwidth limitations. cluster heads can be chosen from the deployed sensors or can be
Therefore, it is most likely that a route will consist of multiple more powerful than other sensor nodes in terms of energy,
wireless hops. bandwidth, and memory. Hence, the burden of transmission to
the BS is handled by the set of cluster-heads
2.5.2. Energy Consumption without losing accuracy:
Sensor nodes can use up their limited supply of energy 2.5.4. Fault Tolerance:
performing computations and transmitting information in a Some sensor nodes may fail or be blocked due to lack of power,
wireless environment. As such, energy conserving forms of physical damage, or environmental interference. The failure of
communication and computation are essential. Sensor node sensor nodes should not affect the overall task of the sensor
lifetime shows a strong dependence on the battery lifetime [21]. network. If many nodes fail, MAC and routing protocols must
In a multihop WSN, each node plays a dual role as data sender accommodate formation of new links and routes to the data
and data router. The malfunctioning of some sensor nodes due to collection base stations. This may require actively adjusting
power failure can cause significant topological changes and transmit powers and signaling rates on the existing links to
might require rerouting of packets and reorganization of the reduce energy consumption, or rerouting packets through regions
network.Data Reporting Model: Data sensing and reporting in of the network where more energy is available. Therefore,
WSNs is dependent on the application and the time criticality of multiple levels of redundancy may be needed in a fault-tolerant
the data reporting. Data reporting can be categorized as either sensor network.
time-driven (continuous), event-driven, query-driven, and hybrid
[22]. The time-driven delivery model is suitable for applications 2.5.5. Scalability:
that require periodic data monitoring. As such, sensor nodes will The number of sensor nodes deployed in the sensing area may be
periodically switch on their sensors and transmitters, sense the in the order of hundreds or thousands, or more. Any routing
environment and transmit the data of interest at constant periodic scheme must be able to work with this huge number of sensor
time intervals. In event-driven and query-driven models, sensor nodes. In addition, sensor network routing protocols should be
nodes react immediately to sudden and drastic changes in the scalable enough to respond to events in the environment. Until an
value of a sensed attribute due to the occurrence of a certain event occurs, most of the sensors can remain in the sleep state,
event or a query is generated by the BS. As such, these are well with data from the few remaining sensors providing a coarse
suited for time critical applications. A combination of the quality.
previous models is also possible. The routing protocol is highly
influenced by the data reporting model with regard to energy 2.5.6. Network Dynamics:
consumption and route stability. Most of the network architectures assume that sensor nodes are
stationary. How-ever, mobility of both BS's or sensor nodes is
2.5.3. Node/Link Heterogeneity: sometimes necessary in many applications [23]. Routing
In many studies, all sensor nodes were assumed to be messages from or to moving nodes is more challenging since
homogeneous, i.e., having equal capacity in terms of route stability becomes an important issue, in addition to energy,
computation, communication, and power. However, depending bandwidth etc. Moreover, the sensed phenomenon can be either
28
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.23-30
ISSN: 2278-2427

dynamic or static depending on the application, e.g., it is combine the incoming signals and reducing the noise in these
dynamic in a target detection/tracking application, while it is signals.
static in forest monitoring for early ¯re prevention. Monitoring
static events allows the network to work in a reactive mode, 2.5.11 Quality of Service
simply generating traffic when reporting. Dynamic events in In some applications, data should be delivered within a certain
most applications require periodic reporting and consequently period of time from the moment it is sensed, otherwise the data
generate significant traffic to be routed to the BS. will be useless. Therefore bounded latency for data delivery is
another condition for time-constrained applications. However, in
2.5.7. Transmission Media: many applications, conservation of energy, which is directly
In a multi-hop sensor network, communicating nodes are linked related to network lifetime, is considered relatively more
by a wireless medium. The traditional problems associated with a important than the quality of data sent. As the energy gets
wireless channel (e.g., fading, high error rate) may also affect the depleted, the network may be required to reduce the quality of
operation of the sensor network. In general, the required the results in order to reduce the energy dissipation in the nodes
bandwidth of sensor data will be low, on the order of 1-100 kb/s. and hence lengthen the total network lifetime. Hence, energy-
Related to the transmission media is the design of medium access aware routing protocols are required to capture this requirement.
control (MAC). One approach of MAC design for sensor
networks is to use TDMA based protocols that conserve more 2.6Summary
energy compared to contention based protocols like CSMA (e.g., Wireless Sensor Networks (WSNs) have attracted significant
IEEE 802.11). Bluetooth technology [24] can also be used. attention over the past few years. A growing list of civilians &
border security force using wireless sensor networks for
2.5.8 Connectivity increased effectiveness; especially in hostile and remote areas.
High node density in sensor networks precludes them from being Examples includes disaster management, border protection,
completely isolated from each other. Therefore, sensor nodes are combat field surveillance. In these applications a large number of
expected to be highly connected. This, however, may not prevent sensors are expected, requiring careful architecture and
the network topology from being variable and the network size management of the network. Grouping nodes into clusters has
from being shrinking due to sensor node failures. In addition, been the most popular approach for support scalability in WSNs.
connectivity depends on the, possibly random, distribution of In this paper, we surveyed lot of research and classifications and
nodes. benefits of different schemes. We categorized the different
schemes according to their objectives, the desired cluster
2.5.9 Coverage properties and clustering process. We highlighted the effect of
In WSNs, each sensor node obtains a certain view of the the network model on the pursued approaches and summarized a
environment. A given sensor's view of the environment is limited number of schemes, stating their strength and limitations of
both in range and in accuracy; it can only cover a limited wireless sensor networks.
physical area of the environment. Hence, area coverage is also an
important design parameter in WSNs. REFERENCES
[1] F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A Survey on
SensorNetworks. IEEE Communications Magazine, 40(8):102–114, 2002.
2.5.10 Data Aggregation
[2] S. Gandham, Y. Zhang, and Q. Huang. Distributed Minimal Time
Since sensor nodes may generate significant redundant data, Convergecast Scheduling in Wireless Sensor Networks. In 26th IEEE
similar packets from multiple nodes can be aggregated so that the International Conference on Distributed Computing Systems (ICDCS),
number of transmissions is reduced. Data aggregation is the pages 50–57, July 2006.
[3] S. Gandham, Y. Zhang, and Q. Huang. Distributed time-optimal
combination of data from different sources according to a certain
scheduling for convergecast in wireless sensor networks. Computer
aggregation function, e.g., duplicate suppression, minima, Networks, 52(3):610–629,2008.
maxima and average. This technique has been used to achieve [4] DARPA. SensIT Project. http://dtsn.darpa.mil/ixo/sensit.asp
energy efficiency and data transfer optimization in a number of [5] S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. TAG: a Tiny
Aggregation service for ad-hoc sensor networks. SIGOPS Operating
routing protocols. Signal processing methods can also be used for
Systems Review,36(SI):131–146, 2002.
data aggregation. In this case, it is referred to as data fusion [6] A. Ghosh, O. D. Incel, V. S. Anil Kumar, and B. Krishnamachari. Multi-
where a node is capable of producing a more accurate output channel scheduling algorithms for fast aggregated convergecast in sensor
signal by using some techniques such as beam forming to networks. In 6th IEEE International Conference on Mobile Adhoc and
Sensor Systems (MASS),pages 363–372, October 2009

29
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.23-30
ISSN: 2278-2427

[7] A. Ghosh, O. D. Incel, V. S. Anil Kumar, and B. Krishnamachari. Multi-


Channel Scheduling and Spanning Trees: Throughput-Delay Trade-off for
Fast Data Collection in Sensor Networks (under submission). IEEE/ACM
Transactions on Networking, 2010.
[8] O. D. Incel, A. Ghosh, B. Krishnamachari, and K. Chintalapudi. Fast Data
Collection in Tree-BasedWireless Sensor Networks (under revision). IEEE
Transactions on Mobile Computing, 2009.
[9] O. D. Incel and B. Krishnamachari. Enhancing the Data Collection Rate of
Tree-Based Aggregation in Wireless Sensor Networks. In 5th Annual
IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc
Communications and Networks (SECON), pages 569–577, June 2008.
[10] S. Tilak, N. B. Abu-Ghazaleh, and W. Heinzelman. A taxonomy of
wireless micro-sensor network models. SIGMOBILE Mobile Computing
and Communications Review, 6(2):28–36, 2002.
[11] S. Chatterjea. Distributed and Self-Organizing Data Management
Strategies for Wireless Sensor Networks. A Cross-Layered Approach. PhD
thesis, University of Twente, Enschede, the Netherlands, September 2008.
[12] G. Lu and B. Krishnamachari. Minimum latency joint scheduling and
routing in wireless sensor networks. Ad Hoc Networks, 5(6):832–843,
2007.
[13] W. R. Heinzelman, J. Kulik, and H. Balakrishnan. Adaptive protocols for
information dissemination in wireless sensor networks. In 5th Annual
ACM/IEEE International Conference on Mobile Computing and
Networking (MOBICOM), pages 174–185, 1999.
[14] O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis. Collection
tree protocol. In 7th ACM Conference on Embedded Networked Sensor
Systems (SenSys), pages 1–14, November 2009.
[15] S. Upadhyayula and S. K. S. Gupta. Spanning tree based algorithms for
low latency and energy efficient data aggregation enhanced convergecast
(DAC) in wireless sensor networks. Ad Hoc Networks, 5(5):626–648,
2007.D. B. Johnson, D. A. Maltz, and J. Broch. DSR: The Dynamic Source
Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, pages 139–
172. Addison-Wesley, 2001.
[16] N. Bulusu, J. Heidemann, D. Estrin,\GPS-less low cost outdoor
localization for very small devices", Technical report 00-729, Computer
science department, University of Southern California, Apr. 2000.\
[17] A. Savvides, C-C Han, aind M. Srivastava,\Dynamic ¯ne-grained
localization in Ad-Hoc networks of sensors," Proceedings of the Seventh
ACM Annual International Conference on Mobile Computing and
Networking (MobiCom), July 2001. pp.166-179.
[18] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on
sensor networks," IEEE Communications Magazine, Volume: 40 Issue: 8,
pp.102-114, August 2002.
[19] S. Tilak, N. Abu-Ghazaleh, W. Heinzelman,A taxonomy of wireless
micro-sensor network models", ACM SIGMOBILE Mobile Computing
and Communications Review, Volume 6, Issue 2 (April 2002), pp 28-36.
[20] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-Efficient
Communication Protocol for Wireless Micro sensor Networks,"
Proceedings of the 33rd Hawaii International Conference on System
Sciences (HICSS '00), January 2000.
[21] ‘Y. Yao and J. Gehrke, The cougar approach to in-network query
processing in sensor networks", in SIGMOD Record, September 2002.
[22] F. Ye, H. Luo, J. Cheng, S. Lu, L. Zhang, \A Two-tier data dissemination
model for large-scale wireless sensor.

30
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.31-35
ISSN: 2278-2427

Low Cost Communication Link for Intelligent Public


Transport System with Dynamic Protocol
Ranjana Dinkar Raut,Vineet Kumar Goyal, Nikhil Arora
Associate Prof., SGBAU (Amravati) Amravati, Maharashtra, India
E&EC Dept. MJRPU (Jaipur) Jaipur, Rajasthan, India
Scientist/Engineer SD, ISRO (Bangalore) Bangalore, Karnataka, India
Email:rdr24164@rediffmail.com,vineet_eic@yahoo.com,nikhilele@gmail.com

Abstract—This paper is about research to provide the solution used to create a digital route map [2-5]. Most of the GPS based
for optimization of use of public transport, better services to intelligent public transport system not feasible in developing
users and various options to management to improve transport countries due to high cost GPS system. In fact, we need not to be
system with cost effective. Many existing models for bus arrival bothered about the movement process of buses, but focus on the
prediction system, based on vehicle motion tracking with high buses arrival time or the departure time at bus stations. In 2009, a
cost equipments. Bus arrival Prediction Technology (BAPT) is RFID based system purposed for Bus Management System. This
the key technology of designing and implementation with low system can monitor bus traffic inside spacious bus stations, and
cost communication link and specialized protocol. With the help can inform administrators whether the bus is arriving on time,
of GPRS based communication, the central station can connect early or late. This information is then displayed on the different
the each bus station, and receiving all information about the wireless displays inside and outside the bus station [6]. This real-
current status of the every vehicle. Based on analysis of traffic time schedule tracker system developed only for schedule bus
density at central stand, it will update all bus stands with updated timing within bus stand. In 2011, a GSM based system
predicted time within stations. Specialized protocol designs in purposed, in which GSM Machine fitted on buses, is used to
such a way that it communicate among buses, bus stands and transmit a 32-bit binary code, which is received by the receiver
central stand. It helps in bus failure detection system which which encodes it. People density value and other data, is
improves transport management. collectively transmitted to the computer connected to server via
SMS system [7]. This system is expensive due to using GSM
Keywords- Bus Stand Module (BSM), Central Stand Module machine on all buses and SMS service used for data
(CSM), Global Position System (GPS), Bus arrival Prediction transmission.
Technology (BAPT).
II. SYSTEM ARCHITECTURE
In the research, develop a cost-effective model to predict the bus
I. INTRODUCTION
arrival time at stops using historical and analytical bus travel
Intelligent Transportation Systems is an application of current
time information which receives from all bus stands. For
information and communications technologies to the
fulfilling this aim, implemented a wireless communication
transportation area. Public transport faces severe problems in
network, based on low cost and low range RF receiver and
almost all countries of the developing world, perhaps most
transmitter module.
important, the lack of efficient transport system resources due to
high investments involves. Developing countries transport A. Software Implementation
systems desperately lacking the necessary financial resources for The main contribution in this paper is to design the
investment in infrastructure, vehicles and new technologies [1]. communication protocol and software which helps to
There are several studies and researches in this field. Most of the communicate among all BAPT modules. The objective of this
existing system use advances communication system in software is to interface between stand to bus, bus to bus, stand to
technologies like wireless communication, Global Positioning stand, stand to GPRS device and display.
System (GPS). Automatic Vehicle Location (AVL) systems and
Automatic Passenger Counters (APC) based on global 1) Protocol implementation – In proposed system, one dynamic
positioning systems (GPS) have been adopted by many transit communication protocol implemented as shown in figure 1. This
systems to monitor the movements of buses on real time basis. protocol is able to communicate all BAPT modules which is
The geographic information system (GIS) or GPS tools used in a based on type of communication, to make the system more
transit system for monitoring the movement of buses can also be reliable. According to type of communication and command
31
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.31-35
ISSN: 2278-2427
field, system will respond. Protocol field descriptions are
following:
 SF (Start Flag): It is used in all data packet at the beginning,
to indicate the start of some data to be sent. Based on
communication between different modules, the start of frame
can be of either type with unique address as listed table 1:
 Source/Destination Address: Based on the communication the
source/address can either \be a bus or stand. There will be
specific addresses fixed for bus and the stand. This is
necessary for the packets to reach the exact address, and the
destination should know from whom it’s receiving the data
packet. Table 2: Command field description
 Command Field: The command in the data packet of BAPT
determines the type of information being sent to either stand
or bus. The command information being sent from source to
destination can be of types table 2:

Figure 1: BAPT Protocol

Table 1: Start Flag field

 Bytes Field and Check Sum Field: Byte 1, byte 2 and byte 3, a) Stand to Stand: Contains new time predicted
which can be used if necessary in future enhancement of estimation value
BAPT. It is XOR of Command and its data bytes (If Command b) Bus to Stand: Add/remove any Bus/Stand ID
has no data then checksum is not required).
B. Hardware Implementation
 EF (End of Frame): This frame is used in the data packet of The systems have three major parts: Bus module, Bus Stand
BAPT to indicate the end of information being sent from any Module and Central station module. All modules contain one
source and destination. If the EF frame is not received by the 89V51RD2 microcontroller. Bus module have switches panel
destination within thespecified time then the data packet will with specific problem ID, low cost 433.92/315 MHz RF
be sent again by the source. transmitter and receiver with 318 series of encoders and decoders,
tactical sensors switches for count number of seated persons in a
2) Packet information: In the system following messages are bus. In the bus stand module, SIM300 GPRS module use for
using for communication: stand to stand communication, LCD for display, 433.92/315
i. Info Message: MHz RF transmitter and receiver with 318 series of encoders. In
a) Bus to Stand: Contains polling stand ID Bus ID Central Bus station, apart from bus station requirements, only
and seats vacant RTC, EEPROM and server connectivity RS232 are used.
b) Stand to Stand: Contains Destination stand ID Bus
ID and seats vacant Bus Module: This module is mounted at each bus of the
ii. Fail Message: transportation system with unique ID. Bus driver is provided
a) Bus to Bus: Contains failed Bus-ID and problem with switch panel, if any predefine problem (like tyre puncture,
ID fuel empty and engine failure etc) occurs in the bus then driver
b) Bus to Stand: Contains polling stand ID, failed can press the corresponding switch for help. In the failure case,
Bus-ID and problem ID failure bus blinks alert signal and it starts broadcasting the id and
c) Stand to Stand: Contains Destination stand ID, problem for help, once any bus that has same module, comes
failed Bus-ID, Nearest Stand ID and problem ID nearitsrange it will receive the fail message and provide
iii. Maintenance/service message: acknowledge message immediately.

32
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.31-35
ISSN: 2278-2427
and sends all this information in a queue one by one to MSM.
Serially receiving bus arrival of failed bus info from the BCC,
updating bus status for display and pass info packet to next stand
using GPRS device as shown in figure 3. The principle is it sends
a polling/interrogation packet with a low range (150-200meters)
transmitter, and then waits for reply from the buses. If any bus is
in the range then it will send reply with bus-id and other
information like vacant seats. This reply is buffered in the
internal queue as multiple buses may send reply. Once buses
have replied, it starts transmitting the bus information serially to
MSM, which further processes the information, does display
management and pass info to next stand with its exclusive GPRS
Figure 2: Bus Module Flow Diagram packet switching Tx-Rx interface with next stand for updating
current bus information.

After receiving the acknowledge message the fail bus will stop
blinking alert signal and move to the non-working state. Now 3) Central Station Module: This module is placed at central
passing bus will store the fail message in its memory and when station where most of the buses start and end. And here all the
any bus stand polls for buses, bus will send it is own information messages from the various routes, various stands, and buses are
and fail message also. Bus will wait for acknowledge from the collected and stored in the server, this server will run special
stand if acknowledge comes it will delete the message from the software which will do statists analysis to find out the traffic
memory else during next polling cycle it will send again as pattern and will update bus stands accordingly. For this task, it is
shown in figure 2. Bus module receiver is used to receive polling equipped with RF interface to receive messages from stands, and
packets from stand and fail messages from bus. If polling packet RTC to keep track of time, max232 to interface to RS232 port of
is received bus module, software reads the vacant seats the server and microcontroller for reading incoming packets from
information, own id and sends both to the polling stand. the stands and then process it.

III OPERATION OF SYSTEM

IN THE SYSTEM, BUS ARRIVAL TIME ESTIMATION USING TRAFFIC


DENSITY MODELLING IN CCM SERVER, WHICH CAN ESTIMATED
TIMES FROM ONE STOP TO NEXT STOP ARE AUTOMATICALLY
UPDATED USING WIRELESS COMMUNICATION IN ALL THE BUS
STANDS AS SHOWN IN FIGURE 4.
All bus stands are connected to each other using GPRS wireless
communication network and all data including number of
passengers information of bus arrival at particular stop will
finally stored in central station for future statistical analysis like
change of route to avoid traffic congestions, adding of buses if
Figure 3: Bus Stand Module Flow Diagram arrival frequency is too low, deletion of route if it is very slow
moving route. Based on this statistical data, central bus stand unit
2) Bus Stand Module: Bus Stand Module consists of two parts: can take decision on certain time line basis. Information of seats
Main Stand Module (MSM) and Bus Communication Controller vacant, filling, and getting emptied will be send to central station
(BCC). MSM is main module which controls all the and based on this data transport management can take an action
communications in the network. It has direct interface with and buses will be order from bus depot if buses are running full
or extra buses can be remove from route if buses running empty.
buses, adjacent bus stands and users. It is equipped with display
which use for showing user the information of buses arrival time, Table 3: Bus Lookup Table
stops away, seats vacant, cancelled, delayed. It has separate
GPRS device to communicate with previous and next stand and
for getting information of buses near stand or arrived at stand it
uses specialized communication controller using UART link, it is
called bus communication controller (BCC) it scans all buses
near stand communicate with them get information from them
33
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.31-35
ISSN: 2278-2427
with specific reason ID will broadcast. Any ongoing bus which
will having same Tx & Rx module, will receive fault message
Bus Arrival Prediction system:- When BCC gets the information packet and this bus will update it to next bus stop with faulty
of the Bus arrival and after updating bus status in their memory, reason, bus number and bus stop ID where last time it detected.
MSM propagate the bus information from current stop to next
Bus stand will connect to display of predicted bus arrival time for
stand MSM and this will go on and finally the bus info will reach
user notification. Display management - After Bus stand get
to central station’s CSM where it will be stored in server information from Bus about its ID and seats it declares to the
database. As seen example of the system in table 3, bus takes 50 users via display that respective bus has arrived and vacant seats
minutes to travel from stand1 to stand2 and so on. If packet is info is provided. And bus stand also passes this bus information
reaching Stand6, contains the information that Bus1 is at stand2
to next bus stand which on receiving this info inform users that
then Stand6 will add up all times from its location to bus
bus is one stop away and coming is some x1 minutes which is
stoppage location. predefined. Now this bus stand send info of same bus to next bus
stand on getting this info the bus stand displays bus is two stop
away and coming in x2 minutes in both the bus stand timers are
there and countdown goes on which keeps in decrementing
arrival times once it reaches zero in first stop bus status is
changed to arriving soon instead of coming in x minutes. But in
subsequent stops if countdown reaches to zero then bus info is
changed to bus is delayed as it has not reached to next stop itself
target stop is at least one stop after that, from previous stops info
is going to come once bus reaches to those stops. And if bus fail
message is reached to stand, bus stand will display bus is
cancelled. The designed system is first verified via sending
communication protocol packets among all modules as
communication example show in table 4

Figure 4: Bus Arrival Prediction Technology Table 4: Protocol communication example

Let suppose 40+70+60+80 = 250 minutes, and it will display the


Bus1 is four stops away and arriving in 250 mins (4hour
10mins). This lookup table is prefixed and stored prior to the
installation or at first boot up time. This traffic density model is a
statistical model which will be based on bus information data
stored at central station. This data will contain bus arrival time at
all stands in the given route so management can be found out
how much actual time bus is taking to travel using multiple bus
data on same route and refine the model at the end of every day
once the difference between mean travel time between the stands
and newly calculated travel times between the stand will be
greater than some threshold value then it will recommended to
update lookup table at all the stands of the given route. As it is
already known that Bus travel time between the stands, is mainly
dependent on the many traffic conditions.

Bus failure detection system- If bus fails in some route that time
driver will have provision to intimate to next bus stop with
failure reason. Failure bus will broadcast a help/information
packet with failure information and any ongoing bus will listen it
and convey to next bus stop for avoiding delay in help and alert
for passengers. Whenever bus will fail with some reason then bus
driver will press specific reason button and fault message packet
34
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.31-35
ISSN: 2278-2427
IV. SYSTEM EVALUTION AND RESULTS

All modules received messages successfully within time line.


Bus stand to adjacent bus stand communication verification done
with AT command request and response in GPRS module at both
the end. In the test bench (shown in figure 5) performed the first
testing and verification procedure. Bus failure detection system,
bus cancelled, delayed, arrival soon, bus number and seat vacant
in arrival bus information displayed successfully according to
current scenarios. Bus failure detected and informed via passing
bus to near bus station also successful.

Figure 5: System Test Bench

V. CONCLUSION

In this project, the result of the designed system with log cost RF
link and specialized protocol, has accomplished the target. The
proposed system provides the fleet an ability to take decisions
according to real-time information, in addition to historical data.
It ensures that the tracking process is within an accurate and
acceptable range, failure bus detection happened with failure
reason.

REFERENCES
[1] John Pucher and Nisha Korattyswaroopam “The Crisis of Public Transport
in India: Overwhelming Needs but Limited Resources” Rutgers University.

[2] Wei-Hua Lin and Robert L Bertini, “Modeling Schedule Recovery Processes
in Transit Operations for Bus Arrival Time Prediction” IEEE 5, 2002.

[3] Amer Shalaby, Ali Farhan, University of Toronto, Canada, “Bus Travel
Time Prediction Model for Dynamic Operations Control and Passenger
Information Systems” TRB 2003.

[4] Wei-Hua Lin and Jian Zeng, “A Experimental Study On Real time Bus
Arrival Time Prediction With GPS Data” Center for Transportation
Research and Department of Civil and Environmental Engineering.

[5] Bratislav Predic, Dejan Rancic and Aleksandar Milosavljevic “Impacts of


Applying Automated Vehicle Location Systems to Public Bus Transport
Management, May 2010.

[6] Ben Ammar Hatem and Hamam Habib, University of Moncton, NB,
Canada, “Bus Management System Using RFID In WSN” European and
Mediterranean Conference on Information Systems 2010.

[7] KV Natarajan, “GSM Based Bus location tracking and passenger density
detection system” IACSIT,2011.

35
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.36-42
ISSN: 2278-2427

Comparison of Propagation Models for Small Urban


Cells in GSM Network
Naima Bouzera1,Abdelkrime Kheirddine2
1
Geni electric laboratory, faculty of technology,University of Bejaia (06000), Algeria
2
Geni electric laboratory, faculty of technology,University of Bejaia (06000), Algeria
Email:bouzera307@hotmail.com,khier_2000@yahoo.fr

Abstract— It was summed up purpose of this work is to compare models are the least accurate but require the least information
the models of spread for the small urban cells in GSM, with about the environment and use much less processing power to
objective to test their behaviour. Engineering radio constitutes generate predictions. Empirical models can be split into two
one of the most important aspects during the deployment of a cell subcategories namely, time dispersive and non-time dispersive
network as much as it is responsible for the quality level of [2,5].
service given to the subscribers. In environment to indoor, the
sign is subjected to different weakening that can attain 30 dB. In II. CELL CONCEPT
effect, the spread in this middle depends on several
characteristics to know the architectural data of buildings, in A cell network divides the zone to be covered, in general a whole
other words types of used building materials, the size of the country, in small zones called cells. Each of the cells is served by
windows, etc. We are interested in this paper to introduce a basic station (BS: Base Station) which accepts a party of
different models of prediction of urban spread in environment. available frequencies.It is with these basic stations that
After different comparisons, we concluded that the model of communicate all active mobile phones being in the concerned
COST-CNET is the most appropriate to make a prediction of cell. Since two communications radio using the same frequency
weakening for a local zone with strong concentration. interfere the one with other one when they are between both
transmitters, what puts in an obvious place that the same
Keywords—prediction, propagation model, propagation frequencies cannot be used by two neighbouring basic stations.
measurements, radio propagation, urban area
Two cells using the same frequencies

I. INTRODUCTION

In wireless communication the losses occurred in between


transmitter and receiver is known as propagation path loss. Path
loss is the unwanted reduction in power single which is
transmitted. We measure this path loss in different area like rural,
urban, and suburban with the help of propagation path loss Cluster of 7 frequencies
models. Wireless communications provide high-speed high-
quality information exchange between portable devices located Figure1. Theoretical example of cellular coverage
anywhere in the world. These models can be broadly categorized
into three types; empirical, deterministic and stochastic. III. MECHANISMS OF SPREAD
Empirical models are those based on observations and
measurements alone. These models are mainly used to predict the The mechanisms of radio-mobile spread in circles Indoor are
path loss, but models that predict rain-fade and multipath have principally linked to cogitation, transmission, and diffraction,
also been proposed [3]. The deterministic models make use of broadcasting and basic structure of scenario. All these
the laws governing electromagnetic wave propagation to phenomena are at the origin of the distorsion and at the
determine the received signal power at a particular location. alleviation of the sign. For any receivers, displacements with
Deterministic models often require a complete 3-D map of the small ladders generate at the level of the potency accepted from
propagation environment. An example of a deterministic model fluctuations since this last is the result of several elements caused
is a ray tracing model [4]. Stochastic models, on the other hand, by the various mechanisms of spread [1].
model the environment as a series of random variables. These
36
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.36-42
ISSN: 2278-2427
IV. SPREAD RADIO
Engineering radio constitutes one of the most important aspects
The radio electrical wave is subject to numerous changeability of the deployment of a cell network in quality of service given to
of temperature, to humidity, electromagnetic characteristics, etc. the subscribers.In urban environment, the sign is subjected to
In other words of in fluctuations at time and in space. With this different weakening. In effect, the spread in this middle depends
effect, we have the most persistent three phenomena in spread on several characteristics: the height of LOW VOLTAGES
radio as an environment Indoor: cogitation, diffraction and (foundation transmitter station), their sites, the height of
broadcasting. It is to maintain at this stadium that the mass media buildings, the breadth of streets etc. The radioelectrical wave is
of communication is uncontrollable. In effect, three types of subjected of it made to numerous distortions caused by physical
variations of the radio-mobile channel come to light. In a first obstacles (building, transports, tree). In the field of
place, they find variations on a large scale or weakening of radiocommunications, there are several models of spreads which
courses (Pathloss) which are losses of spread owed to the can be used for the dimensionnement of the radioelectrical
distance gone through by the wave radio. Then, they differentiate coverage. We are interested in this chapter to introduce different
the effect of mask (Shadowing effect) which comes as being models of prediction of spread in urban environment; where we
alleviations of potency of the sign owed to meet obstacles. The shall itemize the model of course more. Comprehension and
last type of variation of the channel mobile radio is linked to installation of a mobile network such as GSM network require a
numerous itineraries. definite characterization of the radio-mobile channel, In effect,
In what follows, we introduce different models of prediction of the modelling of the channel radio can be assured by
spread in middle indoor but we remind of spread in free space mathematical models which allow to predict the variation of the
before. level of accepted sign. These models are also used to help us to
determine the optimum positions of antennae and in the analysis
V. THE SPREAD IN FREE SPACE of the quality of service. So, we can differentiate three big
families:The empirical models (called still model statistical)
Spread in free space is a theoretical case which, in practice, is which are based on analyses statistics a big number of
only seldom proved. In effect, it is cases where no obstacle is experimental measurements and that take into account different
present between the transmitter and the receiver, they speak then parameters such as the height of buildings, basic stations, the
about direct visibility which is determined from the terminal while taking into consideration various influence of
ellipsoidsofFresnel. The equation of the weakening in free space environment.
is given by following expression [4]: -The determinist models which are based on the fundamental
L  32.4 + 20 log (f) + 20 log(d) laws of physics, and call complex mathematical relations which
(II.1)
are difficult to use.

-Models semi determinists which combine both approaches. Au


cours de ce papier, nous allons étudier les différents modèles déjà
existants, pour la prédiction en milieu urbain.In the course of this
paper, we are going to study the different already existent
models, for prediction in urban middle. Of such models rest on
the collection of a number mattering enough from data. After a
statistical analysis of these data they extrapolate equations giving
an average pathloss at a given distance. Equations which are
deducted include there in general less dozen parameters. They
are therefore easy to implement and express in implementer in a
program. Their main advantage is that we not need a presentation
Withf:thefrequencyexpressedinMhz d: distance between the specifies of the zone to be covered. [4]
transmitter and the receiver, expressedinKm. The principle of the VII. OKUMURA-HATA model [6]
models of spread is to calculate alleviation in free space and add
it a corrective factor. We are interested in what follows in It is the most used empirical model, it acts as foundation in a big
different models of spread but we limit ourselves to those of variety of more refined models, he is based on measurements
circles indoor as much as our interest aims at environments made by Okumura in Tokyo. The model of Hata was spread in
inside. 2GHz to allow planning radio of networks DCS on 1800.
Medium losses are expressed according to: - the height of the
VI. MODELS OF SPREAD antenna of program (basic station) hsb (there m);
37
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.36-42
ISSN: 2278-2427
- the height of the antenna of reception motive) h m (there m);-
Distance D between the basic station and the motive - frequency
in MHz. The domain of validity is given as follows: And :

30m hsb 200m


1m hm 10m
1km D 20km Where:
1500MHz f 2000MHz D:distanceinKm.
The weakening is given by following expression: f: frequency in MHz.
d: distance between buildings in (m).
1. In urbain area : hb: the medium height of buildings in (m).
Lu = 46.3 + 33.9 Log (f) – 13.82 Log (hsb) – a (h m) + (44.9 – hsb: the height of the basic station.
6.55 Log (hsb) Log (d) + Cm hm: height of the motive in (m).
A factor of correction is used to take into account the height of This model is applicable to urban areas and suburban. It assumes
the antenna of mobile reception and the environment in which it that the antenna heights of base stations are quite high and
is: a (hm) = (1.1 Log (f) – 0.7) h m – (1.56 Log (f) – 0.8 for a surrounded by rows of buildings of similar height and
city of medium size regularlyspaced apart by a distance d. In other words, it assumes
that streets are perpendicular to the incident rays.
a (hm) = 3.2 (log1.54 h m) 4.97 for a big city (f
>400 MHz) IX. IKEGAMI model[1]

0 dB for the cities of medium size It is based on the theory of geometric perspective, where they
Cm= consider the spread of the wave restricted in two rays. He
3 dB for the big cities assumes moreover, an ideal structure of a city with an uniform
2. Suburbain area : height of buildings. It is expressed by following relation:
Lsu = Lu 2
Aff = Aff0 + Aff1
3. Rural area : With:
Lr = Lu 4.78 (Log f) ² 18.33 Log f 40.94 Aff0: free-space loss given previously (model of BERTONI-
WALFISCH).
VIII. BERTONI-WALFISCH model [1] Aff1: weakening of reflection, diffraction, it is given by:

The model of BERTONI-WALFISCH takes into account


positionings of buildings l 'influence on a communication mobile
radio. He assumes that spread is made in most cases by With: φ: orientation of the street in comparison with the
diffraction at the top of buildings being in the neighbourhood of incidental ray (in degree)
the mobile receiver. It considers that attenuation of course am hb: medium height of buildings.
composed of three parties: L: the coefficient of cogitation of buildings is. Ikegami assumes
•Attenuation between two antennae in free space. that buildings introduce weakening of 6dB.
• Attenuation sudden by the field at the top of building, who is
owed to the losses of diffraction across a series of rows building. X. SAKAGAMI-KUBOI model [3]
• The losses of diffraction at the top of building neighbour of the
motive. This analysis is based on measurements performed in the Japan
The total attenuation is expressed as follows: in urban circles. These measurements are analysed by the
procedure of numerous declines to find the influence of
Aff = Aff0 +Aff1 parameters characterizing urban middle on the weakening of
With: Aff0: is the attenuation in free space given by relation spread, such

Aff0 = 32.4 + 20 log (f) + 20 log (D) Aff  100 - 7,1 Log (w)  0.023   1,4 Log (hmt)  6,1log(hb)  20 Log (f)
Aff1: correction term which takes into account the curvature of
13 f 3.23  2
hst 
  24.37  3.7  logdh   43.42  3.1logdh logD
the earth and the urban environment.
e
 hsb 
38
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.36-42
ISSN: 2278-2427
Where : hsb : height of the basic station..
hb : the medium height of buildings. Ka=
hm : height of the motive.
D : distance between the motive and the basic station.
hst : the height of the building in quoted by the basic
station The first two terms represent losses caused according to the
hmt : height of building along the road. height of the basic station to be known: Ka represents the
W : breadth of roads. increase of weakening when the antenna of the basic station is
located under the niveaudes roofs of the adjacent buildings.Both
terms K d and Kf control the dependency of weakening owed to
With : dh = hsb - hm w = 5- 50 m.
numerous diffraction in function respectively of distance and
hmt = 5-80 m dh = 20- 100 m. frequency.
h st < hsb D = 0.5 -5 Km. .

XI. Model of COST-CNET : [1]

The method of counting of the weakening comes from jobs of


WALFISH and BERTONI on numerous diffraction by lined up
bones and uniformly divided and on those of the IKEGAMI for
  hsb - h b 
the taking into account of the last diffraction at the level of the 18  15   if h s b  h b
motive. Acquired complete losses decompose into four terms Kd    hb 
main representatives successively: 18 if hs b  h b

• losses linked to distance between the transmitter and the
3. Osses from the last scattering and reflection on buildings
receiver.
and behind the mobile (Aff rts)
• losses linked to numerous diffraction on bones.
• losses linked to the last diffraction and to cogitation
Aff rts  -16.9 - 10 log (w)  10 log (f)  20 log (hb - hm)  A
respectively on buildings and behind the motive.
• losses linked to diffraction on a main bone. With :
 -100354 for 0    35
The total attenuation is modeled by the following formula: 
A  250075( - 35) for5    55
Aff  Aff0  Aff msd  Aff rts  Aff deg 40114( - 35)  for55    90

1. Losses linked to distance between the transmitter and Where : w : the breadth of the street
the receiver (Aff0): f : frequency
It is an alleviation owed to spread in free space between the φ : the orientation of the street from the radius.
broadcasting antenna and the motive spaced out by a
distance D. (weakening in free space given before (model of 4. losses due to diffraction of the main stops(Affdeg):
BERTONI-WALFISCH).  h'
0 if 0.5
2. losses linked to numerous diffraction on bones (Aff msd) : r

The counting of this alleviation is based on the method of 612 h'  if
h'
0.5   0.5
 r
BERTONI and WALFISH reviewed by COST-231 [7]:  r
Affdeg  
88  ' 
 h
if
h'
0.5  1
Affbsh =  r r

1620 h'  if 1
h'
 r r

With : h : the height of clearing of the ellipsoid of Fresnel


Aff  Aff  ka  k logD   K logf   9log d  r : the ray of the ellipsoid of Fresnel..
msd bsh d f
These losses augment proportionately with distance between the
basic station and the mobile receiver, and height of buildings.

39
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.36-42
ISSN: 2278-2427
With the intention of making a comparison of the different
XII. RESULTS AND SIMULATIONS models studied in the previous chapter, we are going to take
consideration the parameters of town planning there. So we Shall
To implement the models of prediction of spread chosen, our Compare the models which take count of these parameters to be
approach consists in assuming data which characterize the zone known: Bertoni-Walfish, Ikegami, Sakagami and Cost-Cnet.
nearly to study, to know the height of buildings, the breadth However the model of Hata does not take into account it there,
averages of streets and medium distance which separates two but he can be to apply to the babies or in the big cities, which we
adjacent buildings are going to use as mailman of comparisonconcerningthismodel.
For the work we performed, we will use the following data
Comparison of propagation models according to our prediction:
Table.1 parameter values used in the simulation
Frequency of program f=1880Mhz
Height of antenna of program hub=30 m
Height of antenna of reception hm=2m
Distance between the transmitter and receiver D=3 à 5 km
medium Breadth of streets w=10m
medium Height of buildings hb=15 m
Height of building along the street hmt=20 m
Height of building quoted of the basic station hst=15m
medium Spacing out of buildings d= 12m
Height antenna basic station of the motive h=28.5 m
Coefficient of cogitation L=6 dB
Orientation of the street in comparison with l 'axe principal of the beam Φ=55°

We are going to start the first simulation by the simplest model, such as the orientation of streets, the height of buildings and
that of HATA . spacing out between buildings.
 Comparison without taking into account factors of town
planning 1. Influence of the orientation of streets
165
For this first comparison interest us to us to the first mailman
who is the orientation of streets in comparison with the incidental
160
wave coming from the basic station. Three models take into
155 account this mailman to know COST-CNET, SAKAGAM and
affaiblissement en dB

IKEGAMI.
150

160

145
150

140 140
moyennes villes
grandes villes
affaiblissement en dB

130
135
0 50 100 150 200 250 300 350 400 450
distance(x 0.01 Km)
120

Comparison between the small and big cities in the model of 110

Hata Figure3. Model of OKUMURA HASTENED, (level of 100 20°


55°

variation of the weakening according to distance MS-BTS) 90


75°
100°

0 50 100 150 200 250 300 350 400 450 500


distance(x 0.01 Km)

Comparison by taking into account factors of town planning Figure4.Influence orientation of the street in the model
The models of Bertoni-Walfish, Ikegami, Sakagami and Cost- IKEGAMI
Cnet take into account certain characteristics of the studied city

40
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.36-42
ISSN: 2278-2427
180
Figure8. Influence of distance between buildings in the model
160
BERTONI-Walfish
140

2. Influence of distance between buildings


affaiblissement en dB

120

The second mailman to be taken into account is distance


100
between buildings. It is considered in two models, that of
80
20°
55°
BERTONI-WALFISH and COST-CNET.
75°
60 100°
200 d=10m
d=50m
40 d=100m
0 50 100 150 200 250 300 350 400 450 500 d=200m
distance(x 0.01 Km) 180

Figure5.Influence orientation of the street in the model

affaiblissement en dB
160

SAKAGAMI 140
220

120
200

100
180
affaiblissement en dB

80
0 50 100 150 200 250 300
160
distance(x 0.01 Km)

140

120 20°
55°
75°
150°
Figure9. Influence of distance between buildings in the model
100
0 50 100 150 200 250 300 350 400 450 500
distance(x 0.01 Km)
COST- CNET
Figure6. Influence orientation of the street in the model COST-
3. Influence of the height of roofs
CNET.
The third mailman in considered is the height of buildings, It is
220 introduced into two models which are: COST-CNET and
200 IKEGAMI.
180 240
hb=30m
220
160
hb=15m
affaiblissement en dB

200
affaiblissement en dB

140
180

120 160 hb=30m

140
100 hb=15m
120
80
IKEGAMI
IKEGAMI 100
COST-CNET COST CNET
60
SAKAGAMI 80
0 50 100 150 200 250 300
distance(x 0.01 Km)
40
0 50 100 150 200 250 300 350 400 450 500
distance(x 0.01 Km)

Figure7. Comparison between models SAKAGAMI, IKEGAMI Figure10. Influence of height of buildings in the models of
et COST-CNET(Φ=55°) COST-CNET and IKEGAMI
XIII. CONCLUSION
140
d=10m
120 These results allowed us to assess the models of prediction of the
d=50m
d=100m
studied weakening, which we can divide into two categories,
100
d=200m those who take into account parameters of town planning; And
affaiblissement en dB

80 those who do not take into account it.This last category is not
very dependable owing to the lack of data characterizing
60
environment. On the contrary the first one, due to a better
40 description of the middle of spread across different parameters
introduced into each of the models, gives a better estimate of the
20
weakening. After different comparisons we concluded that the
0 model of COST-CNET is the most appropriate to make a
0 50 100 150 200 250 300
distance(x 0.01 Km) prediction of weakening for a local area with strong
concentration, since it gives A more definite estimate than other

41
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.36-42
ISSN: 2278-2427
models studied in this job, It characterizes at best the
environment of spread.

REFERENCES

[1] R.Charle House, Electronique appliquée : les antennes fondamentaux, 3éme


édition, Dunod, Paris, 2006.
[2] H.R.Anderson,Fixed Broadband Wireless System Design.John Wiley &
co.2003
[3] R.K.Crane ˝Prediction of attenuation by rain,˝ IEEE Transactions on
communications,vol.COM-28,pp.1727-1732,seotember 1980
[4].E.Athanasiadou,A.R.Nix,and, L.P.MeGeehan,˝A Microcellular raytracing
propagation model and evaluation of its narrowband and wideband predictions,˝
IEEE journal on selected areas in comm..,wireless comm., series,vol.18 pp.322-
355,march 2000
[5] Purnima K Sharma, R.K.Singh, ―Comparative Analysis of Propagation Path
Loss Models With Field Measured Data‖ IJEST, Vol.2(6)in 2010 at 2008-2013.
[6] M. Hata, ―Empirical formula for propagation loss in land mobile radio
services,‖ IEEE Trans. Vehic. Technol., Vol VT-29, No. 3, pp.
317–325, Aug. 1980.
[7] COST Action 231, ―Digital mobile radio towards future generation systems,
final report,‖ tech. rep., European Communities, EUR18957, 1999.

42
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.43-45
ISSN: 2278-2427

Multiuser Interface Optical Code Division


Multiple Access System
Shweta Patel1, Mukesh Tiwari 2, Jaikaran Singh 3
Department of Electronics and Communication
Sri Satya Sai Institute of Science and Technology, Sehore M .P. India
Shwetadpatel@gmail.com,mukeshtiari_79@yahoo.co.in,jksingh81@yahoo.co.in

Abstract— CDMA and FIBER OPTICS individually are the II. SYSTEM DESCRIPTION
best technologies in their respective zones. We all know that
CDMA (multiple access technology) is the best as compared to The broadband signal from the light source is ON-OFF keying
TDMA & FDMA & similar is the case with FIBER OPTICS (OOK) modulated through the binary data. The transmitter
also. Fiber optic technology is best compare to all other sends a pulse through spectral distribution changing with time
communication technologies. In this Paper, the comparative if the data bit rate is “1”; otherwise no power is transmitted.
analysis of a fibre optics CDMA system using Matlab The encoder is a fast TOF controlled with an electrical signal
simulation. By varying numerous parameters of the systems, that signifies the Functional code. Signals transmitted from all
we compare the systems in terms of BER. As the number of synchronized users will be mixed up in the network before
active users increases the BER increases. received by all users.At the receiver, the composite signal is
decoded by a matched TOF. Then, the signals go through a
Keywords— CDMA, BER, FIBER OPTICS photo detector, an integrator and a threshold decision to
recuperate the data transmitted.
I. INTRODUCTION

FO-CDMA or OCDMA systems are offer keys to multiple


access in all optical communication networks. OCDMA
systems make available for users with high security by coding
the data before transmission and recover the data at the
receiver using this coding. Initially, OCDMA systems coded
the incoherent pulses in the time domain and recovered the
Fig 1: Block Diagram of Optical CDMA system
data using taped delay lines. Then OCDMA system
performance is reduced because of the correlation properties of
The Signal to Noise ratio is :-
the special unipolar codes used.In these system use the optical
summation that causes significant losses. CONSTANTLY-
INCREASING demand for higher data-rates and data security SNR (K) =
has moved great interest in optical code-division multiple
access (OCDMA) technology. here we can try to focus on
increased the BER(Bit Error Rate) and reduces the The Probability of Error is thus
MUI(Multiuser Interference) and PIIN(Phase Induced
Intensity Noise). BER(K) = erfc ( )
The performance of OCDMA systems is mainly affected by
interference from other simultaneous users called Multiuser III. PROPOSED SYSTEM
Interference (MUI) or Multiple Access Interference(MAI).MUI
can be negated by using code sequences with fixed in-phase The broad band signal from the light source is ON-OFF keying
cross correlation. Spectral Amplitude Coded-OCDMA (SAC- (OOK) controlled through the binary data. The transmitter
OCDMA) systems have presented extra attention because delivered a pulse with spectral distribution varying with time if
spectral coding can be completely eliminated the MUI. the data bit value is “1”; otherwise, no power is transmitted. So
Another way to reduce the MUI, used Code sequences with the electronic data are changed to broadband optical pulses.
fixed in phase cross correlation such as Hadamard Codes.Then Then, these optical pulses are sends to the two sets of FBGs
the rate of the in phase cross correlation between code and the splitter used for encoding.The spectral coding and the
sequences is large, the phase induced intensity noise (PIIN) spatial encoding are done by using the two sets of FBGs and
caused by non-Coherent broadband light sources of the SAC- splitters, respectively. When the optical pulse is entered into
OCDMA systems, which is decreases the system performance.
43
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.43-45
ISSN: 2278-2427
FBG1, the spectral components matched to “1s” of the spectral
code sequence are returned back and the remaining are filtered
out. However, the matched spectral components are returned
by different gratings. Once spectral encoding done, then the
optical pulses are delivered to the splitter for spatial encoding.
The splitter similarly splits each optical pulse and passed these
split portions to the star couplers according to the spatial code
sequence. The encoder is a fast TOF modulated with an
electrical signal that signifies the functional code. The spectral
and spatial codes are modulated through the Functional codes
by Optical Multiplier. Signals transmitted from every Fig 4:Normalised System
synchronized users will be mixed up in the network before
received through all users. The composite signal is decrypted
through a matched TOF at the receiver. In each balanced
etector have two groups of FBGs and two p-i-n photodiodes.

Fig 2: Block Diagram of Proposed Optical CDMA


system The BER of the proposed system can well be
Fig 5: Proposed System
approximated as
BER= (0.5 erfc (iSNR(k)/2)).(0.5 erfc(iSNR/8))

IV.SIMULATION TOOLS

MATLAB is used as a simulation tools.

V.SIMULATION RESULTS

Parameters Used For Calculation PD quantum efficiency =0.6,


Spectral width of broadband light source= Δλ=30nm, Electrical
Bandwidth=320 MHz, Receiver load resistor= RL=1030 Ω,k1= Fig 6: Proposed System
5,k2=.6,number of active users=1000.
VI.CONCLUSIONS

In this paper, we can conclude from the simulation results


that in the first system transmission the bit error rate first
decreases and than it remains constant for further
users .And for the proposed system the bit error rate is
almost zero for the first 900 users than it starts increasing .
In addition, DOCDMA and Proposed optical CDMA
systems are tested under different effective power from each
user, and it is shown that the system with Proposed scheme
still has a much better performance than the first one
scheme.

REFERENCES
[1] Pooja Yadav, Ravindra Prakash Gupta “WEIGHTED CODE
Fig 3:Normalised System
TRANSMISSION IN OPTICAL CMDA “ International Journal of
Soft Computing and Engineering (IJSCE) ISSN: 2231-2307,
Volume-2, Issue-1, March 2012.

44
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.43-45
ISSN: 2278-2427
[2] István Frigyes, Senior Member, IEEE Budapest University of
Technology and Economics, Budapest, Hungary “CDMA IN
OPTICS” 2006 IEEE Ninth International Symposium on Spread
Spectrum Techniques and Applications.
[3] Chao-Chin Yang and Jen-Fa Huang “Two-Dimensional M-Matrices
Coding in Spatial/Frequency Optical CDMA Networks”, Ieee
Photonics Technology Letters, Vol. 15, No. 1, January 2003.
[4] TAWFIG Eltaifa*, HOSSAM M. H. Shalabyb, SAHBUDIN Shaaria,
MOHAMMAD M. N.H Amarshehc “Interference Mitigation Using
Successive Interference Cancellation in Optical CDMA Systems”
Proceedings of the 8th WSEAS
InternationalConferenceonMicroelectronics, Nanoelectronics,
Optoelectronics
[5] “Principles of Communication Systems Simulation with Wireless
Applications” by William H. Tranter, K. Sam Shanmugan , Theodore
S Rappaport, Kurt L. Kosbar.

45
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.46-48
ISSN: 2278-2427

Wireless Information Security System Via Role


Based Access Control Pattern Use Case Design
K.Subramanian1, V.Kanhaa2,
1
Faculty , Indian Business Academy , Bangalore,
2
Head, Depr of IT ,Bharath University , Chennai
Email: onsubbu@gmail.com, drvkannan62@yahoo.com

Abstract- Business delivery value added more via security Security of the devices: “How to protect the physical device in
services to the service providers and service users. Organization case it is lost or stolen.”
system developing various models to achieve the security system Security of the Wireless Technology: “How to protect messages
according to the modern development and technology; which in transit. “
they requires for their own operations and for their interactions Security of the server that connects to the Internet or other wired
within departments, customers and partners. Business securities network. After this server the information goes to a network with
pattern will be aid to establish a powerful methodology to the usual security problems of a wired network.
identify and understand these relationships to maximize the value
of security system. This paper presents a study of important III. WIRELESS APPLICATION ON WEB
business patterns in Roles Right Definition Model Use Cases
linking to Object oriented Analysis and Design approach for There are two common approaches for user applications in
Secured Internet Information access. wireless devices: WAP (Wireless Application Protocol), and
applications based on the two standard component approaches,
Keywords: Internet Information Security, RBAC Pattern, Use J2ME and .NET. The latter include standard object-oriented
case Model applications or applications using web services. Middleware
software supports wireless applications at both the client and
I. INTRODUCTION server sides. Devices using Bluetooth can use Java or.NET.

In Modern communication system, all applications are being 3. 1 Wireless Application Protocol (WAP)
accessed through wireless systems which includes commerce, WAP is a thin-client (micro browser) development protocol,
medical, manufacturing, and others. Wireless devices have specifically designed for development of user applications. WAP
become an extension of corporate databases and individuals. uses WML (Wireless Markup Language) and WML Script to
Their security compromises are as serious as any attack to the develop applications that can be interpreted at the browser and
corporate database and may have damaging effects on the accessed at the server using HTTP. WAP requires a gateway to
privacy of individuals and the protection of assets of an the wired Internet, and cannot store and process data locally.
enterprise. Wireless devices include cellular phones, two-way WAP uses WTLS (Wireless Transport Layer Security). This
radios, PDAs, laptop computers and similar. These are normally protocol provides confidentiality, integrity, and authentication
portable devices with limitations of weight, size, memory, and and uses RSA cryptography, but can also use Elliptic Curve
power. The increase in functions in cellular devices creates new Cryptography. It is based on the IETF SSL/TLS protocols.
possibilities for attacks in the service system. Standard attacks WTLS provides security for communications between the WAP
against the Internet may now take new forms. Lists of wireless device and the WAP gateway (discussed later). Current
vulnerabilities are already available, showing flaws in many WAP devices use Class 2 WTLS, which enforces server-side
existing products. Communicating in the wireless environment authentication using public key certificates similar to the
has its own issues and challenges. It is characterized by relatively SSL/TLS protocol. Future Class 3 devices will also allow
low bandwidth and data rates, as well as higher error rates, and client–side authentication using certificates. This level will use a
the need for low power consumption (for mobile devices). The WAP Identity Module (WIM), with mandatory support for RSA
mobility of the nodes in cases such as ad hoc networks adds public keys and optional support for elliptic curve cryptography.
another significant layer of complexity and unpredictability.
3.2 Web services
II. COMMUNICATION SYSTEM SECURITY Web service is a component or set of functions accessible
through the web that can be incorporated into an application.
The security of communication systems can be divided into four Web services expose an XML interface, can be registered and
sections: located through a registry; communicate using XML messages
Security of the application: This means the security of user using standard web protocols, and support loosely coupled
applications and standard applications such as email. connections between systems. Web services represent the latest
approach to distribution and are considered an important

46
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.46-48
ISSN: 2278-2427
technology for business integration and collaboration.Wireless iv.We may need to have hierarchies of roles, with inheritance of
devices can access web services using SOAP (Simple Object rights.
Access Protocol). Web services are still not widely used in v.A role may be assigned to individual users or to groups of
portable devices. The limited processing power of portable users.
devices and the lack of network reliability is a serious obstacle
for a full implementation. There are several toolkits that simplify 4.2 Role-Based Access Control (RBAC) pattern use case
the process of building applications using web services. For design
example, Java-based client systems can use Sun ONE and This model developed based on the current role and
kSOAP . While server-side systems can be built with Sun or responsibilities of the users. Classes User and Role described in
IBM toolkits. There are similar tools for. NET-based systems. In the registered users and the predefined roles are described here
addition to the specific designs used, security also depends on respectively. Users are assigned to roles; roles are given rights
the security of these component platforms [Fer04a].It is according to their functions. The association class Right defines
important to develop systems where security has been considered the access types that a user within a role is authorized to apply to
at all stages of design, which not only satisfy their functional the protection object. In fact, the combination Role, Protection
specifications but also satisfy security requirements. To do this Object, and Right is an instance of the Authorization pattern.
we need to start with high- level models that represent the Roles may correspond to job titles, e.g., manager, secretary. A
security policies of the institution. finer approach is to make them correspond to tasks, e.g., a
professor has the roles of thesis advisor, teacher, committee
IV. USE CASE FOR WIRELESS APPLICATION member, researcher, etc. There are many possible ways to
DESIGN implement roles in a software system. considers the
The following models are used to design the use cases in general implementation of the data structures needed to apply an RBAC
for business application development model. The model also includes a constraint to enforce a
a) Access matrix separation of duties. The administrator has the right to assign
b) Role-Based Access Control (RBAC) model, roles to groups and users; he is a special user who can assign
users to roles and rights to a role. Rights for security
4.1 Access Matrix Model administration usually include:
These models define security constraints at the highest i. Definition of authorization rules for roles.
architectural level for the applications, which are enforced by the ii. Creation/deletion of user groups.
lower levels. These models have been extensively studied by the iii. Assignment of users to roles.
security community and we do not attempt here to add new
Our pattern represents in object-oriented form a model described
the accepted models as object-oriented patterns that can be used in set terms in [San96]. That model has been the basis of most
as guidelines in the construction of secure systems. There are research papers and implementations of this idea . RBAC is
other security models, based on other policies or combinations of implemented in a variety of commercial systems, including
policies. Two important models are the Clark-Wilson model and Sun’s J2EE, Microsoft’s Windows 2000, IBM’s Web Sphere,
the Chinese Wall model .There is a pattern for the Clark-Wilson and Oracle, among others. The basic security facilities of Java’s
model, but none for the Chinese Wall model. When we have a JDK 1.2 have been shown to be able to support a rich variety of
question of “How do we describe who is authorized to access RBAC policies. When a problem arises in deciding access in an
specific resources in a system?”, then we wish to solve these by environment with security classifications, the following factors
two methodologies where Role – Based Access Control plays an should be noted down while solving it.
important part in it. How to assign rights to users according to i. The model should protect the confidentiality and integrity of
their roles in an institution? Permissions for subjects accessing data based on its sensitivity.
protected objects have to be described in a suitable way. A ii. The model should be able to be used at any architectural
central authority should be responsible for granting the level.
authorizations. Furthermore, a convenient administration of the iii. There could be different sets of rules to decide access.
authorizations should be guaranteed for a large number of iv. There must be a convenient way to assign users and data to
subjects and objects. The principle of least privilege should be classification levels.
supported. The suggestions are People in institutions have
different needs for access to information, according to their The Role-Based Access Control model is used now in many
functions. systems. However, the different component frameworks (.NET,
i.We must help the institution to define precise access rights for J2EE) provide support only to define roles and to write
its members according to a need-to-know policy. authorization rules, they don’t say anything about where the
ii.Granting rights to individual users would require storing many rights come from. It is not easy for system designers or for
authorization rules and it would also be hard for administrators to define the needed roles and their corresponding
administrators to keep track of these rules. rights.
iii.Users may have more than one role and we may want to
enforce policies such as separation of duty, where a user
cannot be in two specific roles in the same session.
47
Integrated Intelligent Research(IIR) International Journal of Communication and Networking System
Volume: 01 Issue: 01 June 2012,Pages No.46-48
ISSN: 2278-2427
[10]IBM Corp., AlphaWorks Web Services Toolkit.
V. APPROACH FOR PROPOSED ROLE-BASED
ACCESS CONTROL (RBAC) PATTERN USE
CASE DESIGN

The proposed model highlights with following factors while


determining the role bases and use cases
i. Roles correspond to functional tasks in an institution and we
need to assign to these tasks enough rights to perform their
work.
ii. Rights should be assigned according to the need-to-know
(least privilege) principle, where each role gets only the
rights needed to perform her duties.
iii. New roles appear and some roles may not be needed
anymore; changes to roles and their rights should be easy to
perform.
iv. When Use cases are defined we follow these steps. Define
the use cases of the system. The design of object-oriented
systems always start this way but even systems which use
other methodologies often define use cases as part of the
requirements stage. As use cases define the interactions of
actors with the system, we can interpret actors as roles. The
roles that appear in a use case must be authorized for all the
operations initiated by the role or the role could not perform
its functions. If we collect all the operations performed by a
role over all use cases, they define the necessary rights for
this role. To make this approach more detailed and
systematic, we should build a use case diagram that displays
all the use cases for the system and sequence diagrams that
show the interactions of roles with the system for each use
case.

VI. CONCLUSION

RBAC pattern identifies the rights of the user according to the


user requirements and it only grants people who are having
access privilege rights, etc to access internet Information.. This
model defines the security system, using classes such as User,
Role, and accessibility. This proposed pattern complements by
providing a way to define the specific rights needed in a
particular system.

REFERENCES
[1] W. Arbaugh, “Wireless security is different”, Computer, IEEE, August 2003,
99- 102.
[2] P. Ashley, H. Hinton, and M. Vandenwauver, “Wired versus wireless
security: The Internet, WAP, and iMode for e-commerce”, Procs. 17th Ann.
Comp. Sec. Applications Conference, 2001.
[3] Aventail, “Practical solutions for securing your wireless network”, White
paper,2004.
[4] B. Chee and O. Rist, “The Wi-Fi security challenge”, InfoWorld, May 17,
2004.
[5] J. Cox, “Vendors offer tools to control, secure WLANs”, Network World,
6/7/04,
[6] http://www.dtic.mil/whs/directives/corres/html/81002.htm
[7] [Fer04a] E. B. Fernandez, M. Thomsen, and M.H. Fernandez, "Comparing
the security architectures of Sun ONE and Microsoft .NET"., in
“Information security policies and actions in modern integrated systems”,
book by C. Bellettini and M.G.Fugini (Eds.),2004.
[8] E.B.Fernandez, “A methodology for secure software design”, Procs. of the
2004
[9] The GSM security technical whitepaper for 2002”,
48

You might also like