IJSR in Network Security and Communication (IJSRNSC) (original) (raw)
International journal of scientific research in network security and communication, better known as IJSRNSC, is one of the leading and growing open access, peer reviewed, fully refereed and scientific journal for scientists, engineers, research scholars, students and academicians. It is the vision of IJSRNSC to publish original research papers/articles, review articles, survey papers, refereed papers and articles as well as auxiliary material such as- case study, technical notes, short communication in all areas of human study without financial restriction.
The journal intends to disseminate original scientific research and knowledge in the field of, primarily, Network Security and Privacy, Information Security, Mobile Computing, Network Communication, Neural Networks, Ad-hoc Network, Computer Science, Information technology, Cloud computing, Security and privacy, Sensor Networks, Forensics Computing and Security, Parallel and distributed systems, Pervasive computing, Security, Trust and Privacy, Data mining and privacy, Cloud and Big Data Analytics, Computer vision, Data warehouse, Internet of Things, Biometrics and Pattern Recognition, Engineering, Computational Sciences, Software Security, Digital Image Processing, Green and Sustainable Computing, and Web Technologies Software Testing Tools & Technologies, Artificial Intelligence, Applied Informatics, Information Processing.
less
Uploads
Papers by IJSR in Network Security and Communication (IJSRNSC)
—IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to supp... more —IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to support secure TCP/IP environment over the Internet considering flexibility, scalability, and interoperability. IPSEC primarily supports security among hosts rather than users unlike the other security protocols. Recently, IPSEC is emphasized as one of the important security infrastructures in the NGI (Next Generation Internet). It also has suitable features to implement VPN (Virtual Private Network) efficiently and its application areas are expected to grow rapidly. In this paper, the basic concepts and related standard documents of IPSEC will be introduced.
Information is a valuable asset. As an asset information needs to be secured from cryptanalysis a... more Information is a valuable asset. As an asset information needs to be secured from cryptanalysis attacks. Security by encoding a message to make them non readable is the art and science of cryptography. Cryptographic algorithms are computationally rigorous function and guzzle a large amount of CPU time and space complication at the time of encryption. In this research paper we have proposed a reliable, an efficient and a more secure system by using our proposed algorithm for encryption and decryption. The Encryption key is long and consists of 128 bits. In cryptography, information should be confidential not only when it is stored in the computer, it should maintain its confidentiality when it is transmitted from one computer to another. For this purpose here we proposed an integrated cryptographic scheme. This scheme is based on a new cryptographic algorithm, message digest algorithm MD5 and RSA Algorithm. Proposed Encryption Algorithm is used to achieve confidentiality, whereas Message Digest Algorithm MD5 is used to verify the integrity of the message. RSA is adopted to encrypt the key of the encryption algorithm and to generate the digital signature. Four major security principles such as Authentication, Confidentiality, Integrity of Data and Non-Repudiation are achieved together using this scheme.
Now a days, have a great dependence on computer and network and the security of computer related ... more Now a days, have a great dependence on computer and network and the security of computer related to the whole world and everybody. Cryptography is the art and science of achieving security by encoding message to make them non-readable [1] to secure data or information transmits over the network. In this paper introduced modified RSA approach based on multiple public keys and n prime number.RSA algorithm is mostly used in the popular implementation of public key cryptography. In public key cryptography two different keys are generated in RSA one keys is used in encryption data and other corresponding key used for decryption. No other key decrypt the data. Even if it is efficient algorithm it is vulnerable to other person. With the help of all brute force attacks can obtain private keys. In this research paper new approach we used n prime number and multiple public keys. Which is not easily crack able .In here implementation RSA algorithm .using some mathematical logic integer factorization and discrete logarithm problem.
This paper is written to give introduction of the usage of the Bluetooth technology in ad hoc net... more This paper is written to give introduction of the usage of the Bluetooth technology in ad hoc networking. Most common ad hoc networking applications for Bluetooth technology are introduced and current status of the Bluetooth technology suitability for ad hoc networks is examined. Also different protocols and functions, which are integral part of Bluetooth specification and used for ad hoc networking purposes, are discussed. Finally there are some recent studies shortly evaluated concerning Bluetooth scatternet formation and routing protocols performance.
— The voice signal is first processed in MATLAB and the spectrogram is obtained for the same. Gau... more — The voice signal is first processed in MATLAB and the spectrogram is obtained for the same. Gaussian noise is deliberately added to the signal and the two text files 'with noise' and 'without noise' files are obtained. These two files are first modified to bring it in matrix form and used as the header files in design of adaptive LMS algorithm in embedded C on Xilinx Platform Studio and implemented on FPGA for processing and recovered text file is obtained. The recovered signal is plotted and played back on MATLAB and verified with the original signal and was found to be matching.
— micro strip patch antennas have been studied extensively over the past two decades because of i... more — micro strip patch antennas have been studied extensively over the past two decades because of its low profile structure, light weight and low cost. they have many advantages over conventional antennas, which make them suitable for a wide variety of applications. however, major drawback for this type of antennas low efficiency , narrow bandwidth and surface wave losses. to improve surface wave losses uses electromagnetic band gap structures & for bandwidth improvement we use dummy EBG patern on feed line.
— To achieve security in wireless sensor networks it is important to be able to encrypt the messa... more — To achieve security in wireless sensor networks it is important to be able to encrypt the messages sent among the sensor nodes. Keys for encryption and authentication purpose must be agreed upon by communicating nodes. Due to the resource constraint (limited memory size), achieving such key agreement in wireless sensor network is extremely difficult. Many key agreement schemes used in general networks, such as Diffie-Hellman and public key based schemes, are not suitable for wireless sensor networks. Pre-distribution of secret key for all the pair of nodes is not possible due to the large amount of memory is used when network size is large. In this paper, we provide a view of pairwise key pre-distribution scheme and the deployment knowledge; and also describe the pairwise key pre-distribution scheme with deployment knowledge as an improvement. Deployment knowledge avoids the unnecessary key assignments and improves the performance of the sensor networks in terms of memory usage.
— This review paper explains Software Defined Networking (SDN), wherein control and forwarding pl... more — This review paper explains Software Defined Networking (SDN), wherein control and forwarding planes are detached, shifting all the network intelligence to a server (SDN controller) to make a logically centralized network infrastructure. Open Flow protocol is the communication interface between control and forwarding plane. It allows researchers to experiment their abstractions in heterogeneous environment in a uniform way at line-rate and with high port-density; while on the other hand, manufacturers need not reveal the interior design and operations of their switches. Open Networking Foundation (ONF) community is encouraging different vendors to introduce OpenFlow in their products and elevate networking related innovations in worldwide college campuses.
—With the increasing stress and unhealthy in people's daily life, mental health problems are beco... more —With the increasing stress and unhealthy in people's daily life, mental health problems are becoming a global concern. In particular, mood related mental health problems, such as mood disorders, depressions, and elation, are seriously impacting people's quality of life. However, due to the complexity and unstableness of personal mood, assessing and analyzing daily mood is both difficult and inconvenient, which is a major challenge in mental health care. In this paper, we propose a novel framework for assessing and analyzing daily mood of persons working in corporate organizations. It uses mobile phone data—particularly mobile phone accelerometer sensor data to extract human behavior pattern and assess daily mood. We also present a sampling approach for rapidly and efficiently computing the best sampling rate which minimizes the Sum of Square Error in order to handle the large data.
Cellular Automata is one of the most fascinating disciplines. It is being used in many practical ... more Cellular Automata is one of the most fascinating disciplines. It is being used in many practical applications but it's used in cryptography is still not being explored. A technique of generating key for public key cryptography has been proposed in the work. The work also applies different tests to the data generated by the application developed to generate cryptography key. It is found that the key is generated follows the gap test and frequency test .Moreover, the coefficient of autocorrelation of the data generated is also apt. Therefore, the method can be safely used in public key cryptography. The strength of the key generated is being tested against AES.
—At the beginning of the 21st century, a new form of denial of service (DoS) attack emerged which... more —At the beginning of the 21st century, a new form of denial of service (DoS) attack emerged which is the Distributed DoS (DDoS). This new form of attack was launched on huge number of prominent websites such as yahoo, e-bay, Amazon, and buy.com, resulting in tremendous financial loses. DDoS attack has continued to increase over the years due to the rapid increase in internet users. Moreover, even more alarming is the fact that developers of DDoS tools have assumed unprecedented sophistication in their design methods, thus making their attacks highly destructive and undetectable. As a result of these reason and many others, researchers have focused their attention on the study of this new method of attack, they are particularly interested in studying its evolution, and with this knowledge they are being able to design anti-DDoS tools in order to prevent networks from falling into the clutches of DDoS attack. In this research work, a DDoS attack is simulated using MATLAB's SimEvents, with the aim of finding the quantitative measure of its effect on the victim, experiments conducted in this study show that the server is scarcely utilized in its normal working conditions thus having high availability and low average utilization since it accepts requests only from legitimate clients. However, as the attacker launches an attack on the server, its utilization increases sharply and thus resulting in decrease in availability, this is because the server is flooded with illegal requests from the attacker as well as zombies from within the network domain. Additional study reveals that when a warm-up phase is added to the simulation of the server failure, the utilization suddenly increases due to the fact that the attacker seizes the opportunity of the slow recovery of the server to further overwhelm it and eventually push it into saturation.
—In practical communication systems, a low error probability and a high transmission rate are not... more —In practical communication systems, a low error probability and a high transmission rate are not the only important factors. Another very important parameter is the latency. In this paper, an attempt has been made to enhance the latency performance of serially concatenated convolutional codes. In particular, we compare RSC-RSC concatenated codes using non-iterative concatenated Viterbi decoding to RS-RSC concatenated codes using concatenation of Viterbi & Berklelamp-Massey decoding. Overall code rate i.e. transmission rate of concatenated code system is varied through puncturing & its effect on the latency of concatenated systems is simulated. On the basis of simulations, it is shown that RSC-RSC code is better than RS-RSC codes for in terms of latency. It is also shown that for concatenated codes a trade-off is needed to be considered between BER & latency in digital communications.
A mobile ad hoc network is a collection of wireless mobile hosts forming a temporary network with... more A mobile ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services regularly available in wide-area networks to which the hosts may normally be connected In this paper, we present an effective scheme to balance the load in ad hoc network. The scheme can be applied in most on-demand routing protocols. It is implemented in the process of route request. When route request (RREQ) messages are flooded to acquire routes, Only the qualified nodes, which have a potential to serve as intermediate forwarding nodes, will respond to these messages, so that the established path will not be very congested, and the traffic will be distributed evenly in the network. In this scheme, a threshold value, which is used to judge if the intermediate node is overloaded, is variable and changing along with the nodes' interface queue occupancy around the backward path. Therefore, we call it an adaptive load-balancing approach and the performance of routing overhead and average end-to-end delay is also improved.
— Network Management Systems have played a great important role in information systems. There are... more — Network Management Systems have played a great important role in information systems. There are different network management systems such as Remote monitoring, Desktop Sharing, Bandwidth management etc. This paper elaborates the above mentioned issues i.e. remote desktop sharing, Bandwidth Management and Remote monitoring which are accumulated in single network management system. Remote desktop sharing is a technology that allows remote access and remote collaboration on a person's computer. Remote Desktop Sharing provides the capability to technology consultants, administrator or anyone to have full access and control of home computers, office workstations and servers remotely. Another application in network system is Bandwidth management. Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. Bandwidth is reserved for each application to ensure the QoS. To ensure the QoS guaranteed services, the SS may reserve more bandwidth than its demand. As a result, the reserved bandwidth may not be fully utilized all the time. In this paper, we propose a scheme, named Bandwidth management, to utilize the unused bandwidth without changing the existing bandwidth reservation. The idea of the proposed scheme is to allow other SSs to utilize the unused bandwidth when it is available. Thus, the system throughput can be improved while maintaining the same QoS guaranteed services. Another important feature of this network management system is Remote desktop monitoring which can be very useful for efficient management of available bandwidth. This paper specially highlights remote monitoring and control refers to the measurement of disparate devices from a network operations center or control room and the ability to change the operation of these devices from that central office. Remote monitoring allows monitoring operations of one computer through other computer in network. this can be done using TCP/IP protocol. Using this feature server can shutdown client's PC. If server finds out that any client is misusing bandwidth he may warn him by sending alert message if client continues misuse of bandwidth he may shutdown his Computer. This paper intends to increase network management functions by making system capable of utilizing available bandwidth efficiently with help of Remote monitoring functionalities. Bandwidth management feature relies on user-defined bandwidth classes and policy rules to manage the available bandwidth; this avoids wastage of precious available bandwidth. If a user uses this system user can simultaneously monitor client's desktop, share desktop and dynamically handle available bandwidth as per the requirement of client. This system uses Wi-Fi (WLAN) to connect computers in network. This paper is to implement the client/server network management system using Wi-Fi. And then this paper intends to show data or message structure of client/server and how to work using TCP/IP protocol.
— Position based routing protocols can offer a significant performance increase over traditional ... more — Position based routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Correctness of location messages. These routing protocols use geographical information to make forwarding decisions, resulting in a significant reduction in the number of routing messages. However, current position aided routing protocols were not designed for use in high-risk environments, as position information is broadcasted in the clear allowing anyone within range, including the enemy, to receive. We introduce " Secure Position Based Grid Location for Ad hoc Routing " (SPBGLAR), a routing protocol designed to use protected position information to improve security, efficiency, and performance in MANET routing. We propose a secure geographic forwarding (SGF) mechanism, which provides source authentication, neighbour authentication, and message integrity by using both the shared key and the TIK protocol. By combining SGF with the Grid Location Service (GLS), we propose a Secure Grid Location Service (SGLS) where any receiver can verify the correctness of location messages.
— Wireless mesh network (WMN) is a new emerging field with its potential applications in extremel... more — Wireless mesh network (WMN) is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. WMN has the feather of self-organization, distributed structure. WMN is going to address the internet provision to users at low cost anytime from anywhere, as it allows a fast, easy and inexpensive network deployment. However, they are far from mature for large-scale deployment in some applications due to the lack of the satisfactory guarantees on security. In the wireless mesh networks, management model is one of the most important secure problems. We propose a security based model for wireless mesh network which be adapted by large groups according to network characteristics.
In wireless sensor networks the deployment of nodes is an important factor that affects all the a... more In wireless sensor networks the deployment of nodes is an important factor that affects all the aspects of system like coverage, connectivity, bandwidth, packet loss and lifetime of network. In this work, we propose a new clustering technique for enhanced lifetime of the network in deterministic deployment of the sensor network. The main aim of proposing this approach is to provide coverage with minimum number of nodes, enhance the life time of network, minimise packets from nodes to base station, and balance energy consumption. We propose two algorithms, first is a dynamic routing algorithm from a node to cluster head , it works with two parameters , number of nodes and battery level of nodes and second algorithm is an Energy Efficient Deterministic Cluster-Head Selection Algorithm (E 2 DCH) for choosing the cluster heads. In this approach we continuously change position cluster head and move clusters in a deterministic manner so that we can enhance lifetime of the network. Analysis and simulation results demonstrate the correctness and effectiveness of our proposed algorithm.
—Micro strip patch antennas became very popular because of planer profile, ease of analysis and f... more —Micro strip patch antennas became very popular because of planer profile, ease of analysis and fabrication, compatibility with integrated circuit technology & their attractive radiation characteristics. But also some drawbacks of low efficiency, narrow bandwidth and surface wave losses. To improve surface wave losses uses Electro Magnetic Band Gap structures, for improving efficiency & bandwidth do proper impedance matching. We design and simulate the new EBG structures operating at 2.4GHz resonant frequency.
—IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to supp... more —IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to support secure TCP/IP environment over the Internet considering flexibility, scalability, and interoperability. IPSEC primarily supports security among hosts rather than users unlike the other security protocols. Recently, IPSEC is emphasized as one of the important security infrastructures in the NGI (Next Generation Internet). It also has suitable features to implement VPN (Virtual Private Network) efficiently and its application areas are expected to grow rapidly. In this paper, the basic concepts and related standard documents of IPSEC will be introduced.
Information is a valuable asset. As an asset information needs to be secured from cryptanalysis a... more Information is a valuable asset. As an asset information needs to be secured from cryptanalysis attacks. Security by encoding a message to make them non readable is the art and science of cryptography. Cryptographic algorithms are computationally rigorous function and guzzle a large amount of CPU time and space complication at the time of encryption. In this research paper we have proposed a reliable, an efficient and a more secure system by using our proposed algorithm for encryption and decryption. The Encryption key is long and consists of 128 bits. In cryptography, information should be confidential not only when it is stored in the computer, it should maintain its confidentiality when it is transmitted from one computer to another. For this purpose here we proposed an integrated cryptographic scheme. This scheme is based on a new cryptographic algorithm, message digest algorithm MD5 and RSA Algorithm. Proposed Encryption Algorithm is used to achieve confidentiality, whereas Message Digest Algorithm MD5 is used to verify the integrity of the message. RSA is adopted to encrypt the key of the encryption algorithm and to generate the digital signature. Four major security principles such as Authentication, Confidentiality, Integrity of Data and Non-Repudiation are achieved together using this scheme.
Now a days, have a great dependence on computer and network and the security of computer related ... more Now a days, have a great dependence on computer and network and the security of computer related to the whole world and everybody. Cryptography is the art and science of achieving security by encoding message to make them non-readable [1] to secure data or information transmits over the network. In this paper introduced modified RSA approach based on multiple public keys and n prime number.RSA algorithm is mostly used in the popular implementation of public key cryptography. In public key cryptography two different keys are generated in RSA one keys is used in encryption data and other corresponding key used for decryption. No other key decrypt the data. Even if it is efficient algorithm it is vulnerable to other person. With the help of all brute force attacks can obtain private keys. In this research paper new approach we used n prime number and multiple public keys. Which is not easily crack able .In here implementation RSA algorithm .using some mathematical logic integer factorization and discrete logarithm problem.
This paper is written to give introduction of the usage of the Bluetooth technology in ad hoc net... more This paper is written to give introduction of the usage of the Bluetooth technology in ad hoc networking. Most common ad hoc networking applications for Bluetooth technology are introduced and current status of the Bluetooth technology suitability for ad hoc networks is examined. Also different protocols and functions, which are integral part of Bluetooth specification and used for ad hoc networking purposes, are discussed. Finally there are some recent studies shortly evaluated concerning Bluetooth scatternet formation and routing protocols performance.
— The voice signal is first processed in MATLAB and the spectrogram is obtained for the same. Gau... more — The voice signal is first processed in MATLAB and the spectrogram is obtained for the same. Gaussian noise is deliberately added to the signal and the two text files 'with noise' and 'without noise' files are obtained. These two files are first modified to bring it in matrix form and used as the header files in design of adaptive LMS algorithm in embedded C on Xilinx Platform Studio and implemented on FPGA for processing and recovered text file is obtained. The recovered signal is plotted and played back on MATLAB and verified with the original signal and was found to be matching.
— micro strip patch antennas have been studied extensively over the past two decades because of i... more — micro strip patch antennas have been studied extensively over the past two decades because of its low profile structure, light weight and low cost. they have many advantages over conventional antennas, which make them suitable for a wide variety of applications. however, major drawback for this type of antennas low efficiency , narrow bandwidth and surface wave losses. to improve surface wave losses uses electromagnetic band gap structures & for bandwidth improvement we use dummy EBG patern on feed line.
— To achieve security in wireless sensor networks it is important to be able to encrypt the messa... more — To achieve security in wireless sensor networks it is important to be able to encrypt the messages sent among the sensor nodes. Keys for encryption and authentication purpose must be agreed upon by communicating nodes. Due to the resource constraint (limited memory size), achieving such key agreement in wireless sensor network is extremely difficult. Many key agreement schemes used in general networks, such as Diffie-Hellman and public key based schemes, are not suitable for wireless sensor networks. Pre-distribution of secret key for all the pair of nodes is not possible due to the large amount of memory is used when network size is large. In this paper, we provide a view of pairwise key pre-distribution scheme and the deployment knowledge; and also describe the pairwise key pre-distribution scheme with deployment knowledge as an improvement. Deployment knowledge avoids the unnecessary key assignments and improves the performance of the sensor networks in terms of memory usage.
— This review paper explains Software Defined Networking (SDN), wherein control and forwarding pl... more — This review paper explains Software Defined Networking (SDN), wherein control and forwarding planes are detached, shifting all the network intelligence to a server (SDN controller) to make a logically centralized network infrastructure. Open Flow protocol is the communication interface between control and forwarding plane. It allows researchers to experiment their abstractions in heterogeneous environment in a uniform way at line-rate and with high port-density; while on the other hand, manufacturers need not reveal the interior design and operations of their switches. Open Networking Foundation (ONF) community is encouraging different vendors to introduce OpenFlow in their products and elevate networking related innovations in worldwide college campuses.
—With the increasing stress and unhealthy in people's daily life, mental health problems are beco... more —With the increasing stress and unhealthy in people's daily life, mental health problems are becoming a global concern. In particular, mood related mental health problems, such as mood disorders, depressions, and elation, are seriously impacting people's quality of life. However, due to the complexity and unstableness of personal mood, assessing and analyzing daily mood is both difficult and inconvenient, which is a major challenge in mental health care. In this paper, we propose a novel framework for assessing and analyzing daily mood of persons working in corporate organizations. It uses mobile phone data—particularly mobile phone accelerometer sensor data to extract human behavior pattern and assess daily mood. We also present a sampling approach for rapidly and efficiently computing the best sampling rate which minimizes the Sum of Square Error in order to handle the large data.
Cellular Automata is one of the most fascinating disciplines. It is being used in many practical ... more Cellular Automata is one of the most fascinating disciplines. It is being used in many practical applications but it's used in cryptography is still not being explored. A technique of generating key for public key cryptography has been proposed in the work. The work also applies different tests to the data generated by the application developed to generate cryptography key. It is found that the key is generated follows the gap test and frequency test .Moreover, the coefficient of autocorrelation of the data generated is also apt. Therefore, the method can be safely used in public key cryptography. The strength of the key generated is being tested against AES.
—At the beginning of the 21st century, a new form of denial of service (DoS) attack emerged which... more —At the beginning of the 21st century, a new form of denial of service (DoS) attack emerged which is the Distributed DoS (DDoS). This new form of attack was launched on huge number of prominent websites such as yahoo, e-bay, Amazon, and buy.com, resulting in tremendous financial loses. DDoS attack has continued to increase over the years due to the rapid increase in internet users. Moreover, even more alarming is the fact that developers of DDoS tools have assumed unprecedented sophistication in their design methods, thus making their attacks highly destructive and undetectable. As a result of these reason and many others, researchers have focused their attention on the study of this new method of attack, they are particularly interested in studying its evolution, and with this knowledge they are being able to design anti-DDoS tools in order to prevent networks from falling into the clutches of DDoS attack. In this research work, a DDoS attack is simulated using MATLAB's SimEvents, with the aim of finding the quantitative measure of its effect on the victim, experiments conducted in this study show that the server is scarcely utilized in its normal working conditions thus having high availability and low average utilization since it accepts requests only from legitimate clients. However, as the attacker launches an attack on the server, its utilization increases sharply and thus resulting in decrease in availability, this is because the server is flooded with illegal requests from the attacker as well as zombies from within the network domain. Additional study reveals that when a warm-up phase is added to the simulation of the server failure, the utilization suddenly increases due to the fact that the attacker seizes the opportunity of the slow recovery of the server to further overwhelm it and eventually push it into saturation.
—In practical communication systems, a low error probability and a high transmission rate are not... more —In practical communication systems, a low error probability and a high transmission rate are not the only important factors. Another very important parameter is the latency. In this paper, an attempt has been made to enhance the latency performance of serially concatenated convolutional codes. In particular, we compare RSC-RSC concatenated codes using non-iterative concatenated Viterbi decoding to RS-RSC concatenated codes using concatenation of Viterbi & Berklelamp-Massey decoding. Overall code rate i.e. transmission rate of concatenated code system is varied through puncturing & its effect on the latency of concatenated systems is simulated. On the basis of simulations, it is shown that RSC-RSC code is better than RS-RSC codes for in terms of latency. It is also shown that for concatenated codes a trade-off is needed to be considered between BER & latency in digital communications.
A mobile ad hoc network is a collection of wireless mobile hosts forming a temporary network with... more A mobile ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services regularly available in wide-area networks to which the hosts may normally be connected In this paper, we present an effective scheme to balance the load in ad hoc network. The scheme can be applied in most on-demand routing protocols. It is implemented in the process of route request. When route request (RREQ) messages are flooded to acquire routes, Only the qualified nodes, which have a potential to serve as intermediate forwarding nodes, will respond to these messages, so that the established path will not be very congested, and the traffic will be distributed evenly in the network. In this scheme, a threshold value, which is used to judge if the intermediate node is overloaded, is variable and changing along with the nodes' interface queue occupancy around the backward path. Therefore, we call it an adaptive load-balancing approach and the performance of routing overhead and average end-to-end delay is also improved.
— Network Management Systems have played a great important role in information systems. There are... more — Network Management Systems have played a great important role in information systems. There are different network management systems such as Remote monitoring, Desktop Sharing, Bandwidth management etc. This paper elaborates the above mentioned issues i.e. remote desktop sharing, Bandwidth Management and Remote monitoring which are accumulated in single network management system. Remote desktop sharing is a technology that allows remote access and remote collaboration on a person's computer. Remote Desktop Sharing provides the capability to technology consultants, administrator or anyone to have full access and control of home computers, office workstations and servers remotely. Another application in network system is Bandwidth management. Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. Bandwidth is reserved for each application to ensure the QoS. To ensure the QoS guaranteed services, the SS may reserve more bandwidth than its demand. As a result, the reserved bandwidth may not be fully utilized all the time. In this paper, we propose a scheme, named Bandwidth management, to utilize the unused bandwidth without changing the existing bandwidth reservation. The idea of the proposed scheme is to allow other SSs to utilize the unused bandwidth when it is available. Thus, the system throughput can be improved while maintaining the same QoS guaranteed services. Another important feature of this network management system is Remote desktop monitoring which can be very useful for efficient management of available bandwidth. This paper specially highlights remote monitoring and control refers to the measurement of disparate devices from a network operations center or control room and the ability to change the operation of these devices from that central office. Remote monitoring allows monitoring operations of one computer through other computer in network. this can be done using TCP/IP protocol. Using this feature server can shutdown client's PC. If server finds out that any client is misusing bandwidth he may warn him by sending alert message if client continues misuse of bandwidth he may shutdown his Computer. This paper intends to increase network management functions by making system capable of utilizing available bandwidth efficiently with help of Remote monitoring functionalities. Bandwidth management feature relies on user-defined bandwidth classes and policy rules to manage the available bandwidth; this avoids wastage of precious available bandwidth. If a user uses this system user can simultaneously monitor client's desktop, share desktop and dynamically handle available bandwidth as per the requirement of client. This system uses Wi-Fi (WLAN) to connect computers in network. This paper is to implement the client/server network management system using Wi-Fi. And then this paper intends to show data or message structure of client/server and how to work using TCP/IP protocol.
— Position based routing protocols can offer a significant performance increase over traditional ... more — Position based routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Correctness of location messages. These routing protocols use geographical information to make forwarding decisions, resulting in a significant reduction in the number of routing messages. However, current position aided routing protocols were not designed for use in high-risk environments, as position information is broadcasted in the clear allowing anyone within range, including the enemy, to receive. We introduce " Secure Position Based Grid Location for Ad hoc Routing " (SPBGLAR), a routing protocol designed to use protected position information to improve security, efficiency, and performance in MANET routing. We propose a secure geographic forwarding (SGF) mechanism, which provides source authentication, neighbour authentication, and message integrity by using both the shared key and the TIK protocol. By combining SGF with the Grid Location Service (GLS), we propose a Secure Grid Location Service (SGLS) where any receiver can verify the correctness of location messages.
— Wireless mesh network (WMN) is a new emerging field with its potential applications in extremel... more — Wireless mesh network (WMN) is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. WMN has the feather of self-organization, distributed structure. WMN is going to address the internet provision to users at low cost anytime from anywhere, as it allows a fast, easy and inexpensive network deployment. However, they are far from mature for large-scale deployment in some applications due to the lack of the satisfactory guarantees on security. In the wireless mesh networks, management model is one of the most important secure problems. We propose a security based model for wireless mesh network which be adapted by large groups according to network characteristics.
In wireless sensor networks the deployment of nodes is an important factor that affects all the a... more In wireless sensor networks the deployment of nodes is an important factor that affects all the aspects of system like coverage, connectivity, bandwidth, packet loss and lifetime of network. In this work, we propose a new clustering technique for enhanced lifetime of the network in deterministic deployment of the sensor network. The main aim of proposing this approach is to provide coverage with minimum number of nodes, enhance the life time of network, minimise packets from nodes to base station, and balance energy consumption. We propose two algorithms, first is a dynamic routing algorithm from a node to cluster head , it works with two parameters , number of nodes and battery level of nodes and second algorithm is an Energy Efficient Deterministic Cluster-Head Selection Algorithm (E 2 DCH) for choosing the cluster heads. In this approach we continuously change position cluster head and move clusters in a deterministic manner so that we can enhance lifetime of the network. Analysis and simulation results demonstrate the correctness and effectiveness of our proposed algorithm.
—Micro strip patch antennas became very popular because of planer profile, ease of analysis and f... more —Micro strip patch antennas became very popular because of planer profile, ease of analysis and fabrication, compatibility with integrated circuit technology & their attractive radiation characteristics. But also some drawbacks of low efficiency, narrow bandwidth and surface wave losses. To improve surface wave losses uses Electro Magnetic Band Gap structures, for improving efficiency & bandwidth do proper impedance matching. We design and simulate the new EBG structures operating at 2.4GHz resonant frequency.