RWP Mobility Model Based Performance Evaluation of DSR, Dymo and FSR in Manet
This paper aims to compare some routing protocols in Mobile ad-hoc network (MANET). A MANET is a dynamic network in which collection of mobile nodes forms a temporary network without using any existing centralized administration or fixed infrastructure. The availability of routes at an instant can increase or decrease due to mobility of nodes. Therefore, the path availability and stability of routes at an instance is an issue in an Ad-hoc network. To support these types of issue in MANET, many routing protocols are designed, such as AODV, DSR, DSDV, FSR, DYMO, LAR etc. In this paper, we analyzed three different types of routing protocols: DSR, DYMO and FSR using QualNet 5.0.2 simulator. Several simulations were conducted in different traffic patterns (CBR and FTP) to analyze the performance of these routing protocols on the basis of performance matrices such as end-to-end dealy, jitter and throughput.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Speed analysis for QOS in ATM network – a comparison
The approaches to QoS support of ATM networks are explained, The Performance of several kinds of schemes such as ABR CBR and VBR are compared based on transit delay and total delay based on all the six Qos parameters. Some simulation work is done and related results are shown and discussed.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design and simulation of folded printed dipole antenna with PBG structure for Ultra Wide Band (UWB) applications
In this paper folded printed dipole antenna with PBG operating for Ultra wide band applications ,The geometry of the antenna is very simple for fabrication and printed circuit board integration that is only 42*36 mm, the proposed antenna are simplified structure with 50 ? feed line .the PBG structure antenna working in the frequency at 3.2 GHz and 3.9GHz with the bandwidth 68% and 50 % respectively ,In this proposed antenna has maximum gain 4.664 dBi and 3.8 dBi at 3.2 GHz and 3.9 GHz respectively .The proposed radiation pattern is omnidirectional in the E-plane and H-plane due to the orthogonal configuration of the dipole strips. The folded printed dipole antenna with PBG structure antenna should be useful for the UWB applications, The radiation characteristics examined in further sections.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Detection of Online Phishing Attacks Using a Transparent Proxy System
The Internet has increasingly become a valuable tool. Despite the benefit, the Internet can often represent an insecure channel for exchange of information. Among the challenges that have now affected the Internet user is phishing. This study propose a secure Anti-Phishing system using a Transparent Proxy System. The proposed system is a middleware that is located between the clients and a content provider. The proposed system was able to detects, alerts novice and experienced users of potential phishing content.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Wireless Sensor Network for Energy Efficient Target Coverage
A critical aspect of applications with wireless sensor network lifetime. Power –constrained wireless sensor networks are usable as long as they can communicate sensed data to a processing node. In this paper, we have depicted the over view of the blocks required for the wireless sensor network information about the hardware parts to some extent .These hardware parts are the necessary requirement for enhancement of our work further sensing and communications consume energy, therefore judicious power management and sensor scheduling can effectively extend network lifetime.[1] Moreover, in existed paper which only had few sensor and 8051 processor have been replaced by the efficiently proposed method having PIC processor to be processed along with sensor module which can be of any type based on their availability.[7] This paper propose an efficient method to extend the sensor network life time by organizing the Sensors into a maximal number of set covers that are activated successively. Only the sensors from the current active set are responsible for monitoring all targets and for transmitting the collected data, while all other nodes are in a low-energy sleep mode. By allowing sensors to participate in multiple sets, our problem formulation increases the network lifetime. [3]
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A three-stage heuristic combined Hopfield neural network for channel assignment problem in cellular mobile system
A three-stage algorithm of combining sequential heuristic methods into a Hopfield neural network is presented for the channel assignment problem in cellular mobile communication systems in this paper. The goal of this problem is to find a channel assignment to requested calls with the minimum number of channels subject to interference constraints between channels. The three-stage algorithm consists of: 1) the regular interval assignment stage; 2) the greedy assignment stage; and 3) the neural-network assignment stage. In the first stage, the calls in a cell determining the lower bound on the total number of channels are assigned channels at regular intervals. In the second stage, the calls in a cell with the largest degree and its adjacent cells are assigned channels by a greedy heuristic method. In the third stage, the calls in the remaining cells are assigned channels by a Hopfield neural network. The performance is verified through solving well-known benchmark problems. Especially for Sivarajan’s benchmark problems, my three-stage algorithm first achieves the lower bound solutions in all of the 12 instances.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Detection of misbehaving and selfish node in optimized link state routing (OLSR) in mobile adhoc network
Mobile Ad-hoc Networks (MANET) is the self organizing collection of mobile nodes. The Optimized Link State Routing (OLSR) protocol was designed to improve scalability of Mobile Ad-Hoc Networks (MANETs). OLSR protocol implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Nevertheless, OLSR was designed without security measures. There-fore, a misbehaving node can affect the topology map acquisition process by interrupting the flooding of control information or disturbing the MPR selection process.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
SODRRP: A secure on demand route routing protocol in MANET
Ad-hoc networks, due to their improvised nature, are frequently established insecure environments, which makes them susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. On Demand Route Routing Protocol (ODRRP) is a Broadcast Reply network routing protocol for Mobile Ad hoc Network (MANET). Black hole attack is one of the severe security threats in ad-hoc networks which can be easily employed by exploiting vulnerability of on-demand routing protocols such as ODRRP. In this paper we proposed a solution for identifying the malicious node in ODRRP protocol suffering from black hole attack.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Energy Aware Load Balancing With False Temporal Pattern Identification for Wireless Sensor Networks
Load balancing using clustering can increase network scalability. This paper attempting to apply efficient techniques of load, energy and security such that network life can be increased with security and also its reliability. Continuous aggregation is required in sensor applications to obtain the temporal variation information of aggregates. It helps the users to understand how the environment changes over time and track real time measurements for trend analysis. Due to the high frequency and the long period of a continuous aggregation in every epoch, the false temporal variation pattern would incur a great communication cost. In this paper, we propose a clustering technique which will balance the load among the cluster by using some backup nodes. In the continuous aggregation, the attacker could manipulate a series of aggregation results through compromised nodes to fabricate false temporal variation patterns of the aggregates .We detect and verify a false temporal variations pattern by checking only a small part of aggregation results to reduces a verification cost. A sampling based approach is used to check the aggregation results and we also proposed a security mechanisms to protect the sampling process.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]