An Improved Distance-Vector Routing Protocol For Reliable Network Transmission in Local Area Networks
Routing protocols govern the prime path for data communication amongst network nodes. These protocols are employed once there is a major growth in organisations were, static routes are uncontrollable. Distance vector routing protocols which is one of the two main routing protocols for communication uses data packets sent over Internet Protocol (IP). This routing protocols are classified into Enhanced Interior Gateway Routing Protocol (EIGRP) and Routing Information Protocol (RIP). They are dynamic Internet Gateway Protocols (IGPs) which route packets within one Autonomous System (AS). However, RIP is considered an effective solution for small homogeneous networks. An organisation who needs to expand its network cannot use the RIP due to its limitations of fifteen hop counts. This problem has been a major concern in corporate organisations which hence the need for an improved distance vector routing protocol. EIGRP although, is a Cisco proprietary protocol based on Diffused Update Algorithm (DUAL) was introduced in this research to serve as an extension to an organisation’s network. Packet flowing from RIP network interface if exhausted its maximum hop count, can re-route its packet through EIGRP network interface. With this improvement, organisations have no worries of changing the entire routing protocol.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Survey on Trust Systems for Clustered Wireless Sensor Networks
There are many primitive trust systems which have adopted unique approach for communication in Wireless Sensor Networks. These traditional trust systems do not meet the requirements like maintaining resource efficiency and dependability between nodes in Clustered Wireless Sensor Networks. This is because of their high overhead and low dependability. LDTS (Light-weight and dependable trust system) proposes low communication overhead and makes efficient use of energy resources by proposing light-weight algorithm. Also LDTS (Light-weight and Dependable Trust System) proposes dependable trust system that helps improving system efficiency by reducing effect of malicious nodes. As compared to traditional trust systems LDTS (Light-Weight and Dependable Trust System) demands less memory .So it can be said that LDTS is light weight and dependable trust system for communication in clustered wireless sensor networks.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Implementation of Advanced Network Intrusion Detection and Prevention System Using Rule Based Mining Techniques
This paper explores the detail implementation & experimental analysis of Advanced Network Intrusion Detection & Pretension System (ANIDPS). This advanced system mines anomalous traffic episodes from internet connection and reduced false positive rate by providing detection of 1. Known Intrusion using misuses or signature based Intrusion Detection System (IDS) by finding known intrusion or attack from existing intrusion signature database. 2. Unknown Intrusion using potentials of anomaly based Intrusion Detection System (IDS) If one of the intrusion detected mention above, system generate alert and apply the prevention policies to avoid further massive damaged to credentials, resources of the organization. Further this system generates new intrusion signature from Unknown Intrusion & store them back into signature database to speedup detection capability of this system in next computation. In this system the data mining approach is used to handle large amount of data captured in the internet, to improve its execution time & to give fast response to network administrator for prevention of data resource with minimum user interaction. In experimental analyses, this system gives improved & effective result in comparison with existing IDS & minimize the false positive rate
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Intelligent driver model automation system in vanet
In this paper an algorithm for alternate path is implemented. The evaluation matrices for the shortest available path are velocity of the leading vehicles, distance from source to destination and time delay to reach to destination. Simulation shows, if there is congestion on the current path then the node will find for an alternate shortest path in digital map to the destination. This will avoid the congestion on a single road at intersection points. But the system has to make search every time the vehicle found congestion on the way for destination. The graph given below shows, the traffic moving according to the pause time on the roads due to any reason like traffic light, accident or any other obstacle. X axis is labeled as time delay and Y axis contained no. of nodes/packets moving towards an intersection point to destination. Whenever the no of nodes becomes more, the pause time will be increased. Upper and lower points in the graph show congestion. At these points, where the graph goes upwards, the congestion is increased at a single intersection point. But where the graph goes downwards, the congestion is reduced to a lower value; because some nodes used alternate route/path to reach to the destination.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Web extraction based on the XPath expanding technique
Research and Realization of a Web Information Extraction based on Xpath expansion. This algorithm marks importance weight of semantic blocks and obtains a model of block importance. This information extraction method based on Xpath expansion forms extraction rule corresponding to web site. Lastly, this algorithm extracts the text information blocks of theme-based web pages. It uses a case to confirm that this algorithm can accurately complete the extraction task of text information blocks in the theme-based web pages.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Survey on TCP Congestion Control in LTE Network
In the Long Term Evolution (LTE) network, buffer overflows often occur in the evolved Node B (eNB) when dealing with the traffic bursts from the wired part due to restricted bandwidth or environmental interferences in the wireless part. In this paper, a survey on approaches is proposed to protect the buffer from overflow by appropriately controlling the advertisement window to enhance the Transmission Control Protocol (TCP) when the buffer becomes congested. The sender will slow down the data sending rate upon the receipt of reduced advertisement window, and hence the buffer overflow will be alleviated. To evaluate the suggested solution, a LTE network model is implemented and validated through extensive numerical experiments. It is demonstrated that the proposed approach can enhance the end to end system performance in terms of network throughput, average packet delay and jitter, as well as packet loss rate.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Data Packets Transmission Using ACO in WSN
Prolonging lifetime of WSN is a critical issues today. For overcoming this issue a good WSN design needed to be energy efficient. Routing is one of the reasons for reducing the lifetime of WSN. By using energy aware routing algorithm we can maximize the life of the network. In this paper we have used load balancing ACO algorithm with TARF to overcome energy problem in WSN. This algorithm help in providing shortest path reduce energy and time consumption and provide security against attacks.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Flooding attacks using packet dropper method in Optimized Link State Routing (OLSR)
Mobile Ad-hoc Networks (MANET) is the self organizing collection of mobile nodes. The Optimized Link State Routing (OLSR) protocol was designed to improve scalability of Mobile Ad-Hoc Networks (MANETs). OLSR protocol implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Nevertheless, OLSR was designed without security measures. There-fore, a misbehaving node can affect the topology map acquisition process by interrupting the flooding of control information or disturbing the MPR selection process.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
OFDM based transit data encryption scheme
Orthogonal frequency division multiplexing (OFDM) has been one of the key contenders in various broadcasting standards, due to its immunity towards multipath fading and ease of implementation. But the issue security has not been addressed much, which calls for a separate modules performing encryption. Here a scheme of Encryption jointly with OFDM has been proposed based on rearranging the OFDM subcarriers to make the data non intelligible, which provides transit data security. Simulation results show that the proposed scheme provides both security and immunity against fading, together. Also, compared to the conventional OFDM system, this scheme provides encryption with no BER performance degradation and no additional bandwidth.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Qos based energy efficient routing in adhoc networks using genetic algorithm
Multicast routing optimization problem is addressed by considering parameters like cost, battery power, delay and bandwidth. The objectives proposed in this work are minimizing the cost and maximizing the battery power subject to the constraints delay and bandwidth. To find the optimal route with the above objectives, binary coded genetic algorithm (GA) technique has been chosen. In this work, an avoidance strategy is included to avoid the illegal chromosome creation during genetic operation. The simulations are done with the test system which consists of standard graphs with different size. Performances of the given networks are compared with existing approach in terms of fitness values, probabilities of genetic operators, network life and generation of convergence.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]