i-manager's Journal on Wireless Communication Networks (JWCN)


Volume 7 Issue 2 July - September 2018

Research Paper

Coexistence of 5G and Fixed Satellite Services on MM-Wave Band

S. A. Mikail* , Abdelrahim Mohamed**, Barry Evans***, Y. Ibrahim****
* Ph. D Scholar, Department of Computer Science and Engineering, Central South University, China.
** Postdoctoral Research Fellow, 5G Innovation Centre (5GIC), U.K.
*** Fellow, UK Royal Academy of Engineering and IET, United Kingdom.
****Lecturer II, Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria.
Mikail,S.A., Abdelrahim ,M., Evans B,G.,and Ibrahim ,Y.(2018). Frequency Sharing between Satellite and Terrestrial Networks .i-manager's Journal on Wireless Communication Networks,7(2), 1-9. https://doi.org/10.26634/jwcn.7.2.15605

Abstract

Addition of devices of different form factors to the network has resulted to high demand for broadband access. To improve the network capacity, Frequency spectrum regulators have recommended fifth generation (5G) network for deployment on one of the high frequency bands due to their huge contiguous bandwidth. Since such bands have already been allocated to satellite networks by the regulatory bodies, 5G must coexistence with the satellite systems. As a result, feasibility study for coexistence of 5G with the incumbent satellite systems is needed. This paper studied coexistence feasibility of a 5G terrestrial base station (BS) with fixed satellite service (FSS) terminal at 28GHz considering only interference from the satellite terminal into the 5G terrestrial BS. The study used signal to interference plus noise ratio (SINR) available at sectors of a 3-sector cell 5G terrestrial BS as a protection parameter. The available SINR on each sector was used in estimating the impact of the FSS terminal transmit power on the deployment parameters of the 5G system. Moreover, the study was conducted using a more realistic path loss model and 5G antenna pattern recently released by 3rd generation partnership project (3GPP). The results show that the transmission power and elevation angle of the FSS terminal affect deployment parameters of the 5G terrestrial BS. Finally, the results suggested that coexistence of the two systems is feasible in residential areas with only one FSS terminal if the deployment parameters of the 5G BS are carefully selected.

Research Paper

Analysis of Mixed Strategies for P2P-TV Networks with Buffering Mechanism

Adamu Aminu* , Y. V. Gaidamaka**
*Senior Lecturer, Department of Mathematics and Computer Science, Umaru Musa Yar'adua University, Nigeria.
**Professor, Department of Applied Probability and Informatics, People's Friendship University of Russia, Moscow, Russia.
Aminu,A., and Gaidamaka,Y.V .(2018). Analysis of Mixed Strategies for P2P-TV Networks with Buffering Mechanism .i-manager's Journal on Wireless Communication Networks,7(2), 10-18. https://doi.org/10.26634/jwcn.7.2.15609

Abstract

In this paper a problem of finding optimal buffer filling strategy in form of mixed strategy was considered for P2P-TV networks. In such networks, the popularly used strategies are the Rarest First (RF) and Greedy (Gr) strategies, however, studies have shown that RF strategy outperforms Gr strategy in terms of playback continuity and Gr strategy outperforms RF strategy in terms of startup delay, hence there is a need to find an optimal buffer filling strategy inform of mixed strategy with which viewers will experience better playback continuity with short startup delay. The idea of the mixed strategy is to divide the buffer with total of M buffer positions into two parts via demarcation point x, and apply one strategy to fill one part of the buffer and then the other strategy is applied to fill the other part of the buffer. For M = 40 buffer positions, an optimal demarcation point x* was found for each of the proposed mixed strategies. The results of the analysis have shown that mixed strategy where RF is firstly applied for buffer positions from m = 0,…,10, then Gr for m = 11,…,39 is the optimal strategy, with high probability of playback continuity and very low startup delay.

Research Paper

Use and Effects of Radio Frequency Identification (RFID) Technology on Theft Detection for Library Resources Management in Two Private Universities in Abuja, Nigeria

Yusufu Shehu Amanyi* , Philip Usman Akor**, Everest C. Madu***
*Librarian, Sunrise International School, Abuja, Nigeria.
**_***Associate Professor, Library and Information Technology, School of Information and Communication Technology, Federal University of Technology, Minna, Nigeria.
Amanyi,Y.S., Akor,P.U.,and Madu,E.C.(2018). Use and Effects of Radio Frequency Identification (RFID) Technology on Theft Detection for Library Resources Management in Two Private Universities in Abuja, Nigeria . i-manager's Journal on Wireless Communication Networks,7(2), 19-31. https://doi.org/10.26634/jwcn.7.2.15610

Abstract

The study was designed to investigate the use and effect of Radio Frequency Identification (RFID) technology on theft detection for library management in two private universities in Abuja, Nigeria. Three objectives and three research questions guided the study. The study adopted descriptive research design. The population of the study comprises of 234 postgraduate students and 9 librarians in the two private universities in Abuja metropolis. Total enumeration method was employed and a self-designed closed ended questionnaire was used to collect data from respondents. Frequency counts, tables, percentages, mean and standard deviation were used for data analysis. The results indicated that the tags, readers, handheld readers, servers, antennae, RFID label printer, and external book return kiosk were available, installed and in use in the libraries, except for handheld readers that are rarely in use. The study further revealed that despite the positive effect of RFID technology in reducing book theft in the library, much still needed to be done to revamp, upgrade and make functional RFID equipment that are obsolete as well as boost manpower development through training to enhance librarian’s productivity and efficiency in using the RFID technology to check library theft. Based on the findings it was recommended that the management of Nile University of Nigeria (NUN) and African University of Science & Technology (AUST) should invest more in other technologies to compliment RFID technology through upgrade and periodic maintenance; it also recommended that training and retraining of librarians should be advanced in the use of rarely used facilities such as handheld readers, in order to boost their morale and productivity toward a more efficient and effective service delivery.

Research Paper

Design of a Wireless Network for Rural Communities

Osahon Okoro* , Azom E. Edim**
* Academic Lecturer, Department of Computer Science, University of Calabar, Nigeria.
**Associate Professor, Department of Computer Science, University of Calabar, Nigeria.
Osahon,O.,and Edim,A.E. (2018).Design of a Wireless Network for Rural Communities. i-manager's Journal on Wireless Communication Networks,7(2), 32-41. https://doi.org/10.26634/jwcn.7.2.15608

Abstract

Wireless networks are expensive to build and maintain but are best option for rural communities because of the nature of rural environments. The absence of affordable Internet services in such communities continues to impact negatively on socio-economic growth. The aim of this study was to design an enhanced wireless network for rural dwellers. Qualitative and quantitative data were collected for the design and evaluation of wireless network infrastructure in five rural locations. The results showed that for more than a year, the system performance is optimal with an average of 200 users per month and good quality of service. The transmit/receive rate of 300Mbps was three times faster than the normal Ethernet specification with an average throughput of 1 Mbps of strong signal strength. The point-to-multipoint network design increased the network throughput and the distance of signal reach and penetration, and with quality of service and affordable service.

Research Paper

Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification and Countermeasures

Idris Ismaila* , Muhammad Umar Majigi**, Shafi’i Muhammad Abdulhamid***, Morufu Olalere****, Muhammad Bashir Abdullahi*****, Vivian O. Nwaocha******
*_****Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria.
***** Department of Computer Science, Federal University of Technology, Minna, Nigeria.
******Department of Computer Science, National Open University of Nigeria, Nigeria.
Ismaila, I.,Majigi,M.U.,Abdulhamid,S.M.,Olalere,M.,Abdullahi.M.B.,and Nwaocha,V.O.(2018). Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification and Counter measures. i-manager's Journal on Wireless Communication Networks,7(2), 42-51. https://doi.org/10.26634/jwcn.7.2.15604

Abstract

In order to safeguard a University’s networked assets, a network administrator must decide how to harden the network. To aid the decision-making process, network administrators may use network hardening suggestions. A critical drawback of currently available analyses is the lack of consideration for the network administrator on identified vulnerabilities, risk figure, risk priority level classification and network security mechanism. Nessus and Nmap are network vulnerability scanner used for this research. Internal and external scan results tabulated. The result shows that firewall constitute 81 on scale of 1-100 risk priority level classification of university information and technology service (ITS) network with high risk security level and open email relay constitute 2 with low risk level. Thus, the research establish a university secure network architecture model that contributed towards understanding risk priority level and also overcome shortcoming in choosing appropriate security measures.