Communication is the basic need and back-bone for development of any society. Societal development and advancement in the electronics & technology led to the development of Wireless based Systems & has become vital for the modern... more
Communication is the basic need and back-bone for development of any society. Societal development and advancement in the electronics & technology led to the development of Wireless based Systems & has become vital for the modern existence. Wireless Local Area Network (WLAN) is the best example for the same. Popularity of the Wireless Local Area Networks (WLANs) are in increasing trend as they are fast, flexible, cost effective, and easy to use. Application & uses of the WLAN has led some security challenges also & choice of security protocol is one of the typical tasks. In general, any information system incorporating wireless technology should fulfil some basic security objectives. The typical taxonomy of security properties can be described by confidentiality, integrity, and availability (CIA).In wireless communication, data rate is increasing drastically due to advancement in technology at a massive scale. In this paper, we review and summarize IEEE 802.11 protocol architecture, component of WLAN, and security issues in WLAN etc.
Natural and catastrophic disasters can cause damage to the communication system, the damage may be complete or it may be partial. In such areas communication and exchange of information plays a very important role and become difficult to... more
Natural and catastrophic disasters can cause damage to the communication system, the damage may be complete or it may be partial. In such areas communication and exchange of information plays a very important role and become difficult to happen in such situations. So, the rescue systems should be installed in those areas for the rescue operations and to take important decisions about how to make a connection from there to the outside world. Wireless communication network architecture should be setup in disaster areas for the communication to happen and to gather information. In this document, wireless ad-hoc access node network architecture has been proposed. These access nodes acts as hotspot for certain area in which they are set up such that the Wi-Fi capable devices get connected to them for communication to happen. If the mobile battery is drained in such situations wireless charging using microwave is shown in this paper. Performance analysis of the communication transport layer protocols is shown and new-SCTP algorithm is developed which shows the better results in terms of cumulative packet loss.
Human advancement moving towards more associated in nature. it has been confirmed it even 10 years before when the electrical message was invented. From that point forward, there was no stop for the human to associate everything through... more
Human advancement moving towards more associated in nature. it has been confirmed it even 10 years before when the electrical message was invented. From that point forward, there was no stop for the human to associate everything through electrical/electronic and computerized channels. As of late, the business has named it IoT which characterizes as the Internet of Things. The name characterizes its temperament as its Inter associating the "things". You can substitute any usable item that can be interconnected as a "thing" i.e., mechanical articles like vehicles, electrical articles like fans, TV, and so forth This opens up heaps of occasion to taunt any "things" on the web permit outsiders to assume control over the control.in every second a huge amount of data has been transmitted and saved from many resources in a secured manner. Data security, otherwise called network protection, means" measures taken to ensure a PC or PC framework (as on the Internet) against unapproved access or attack." Password securing our workstations and work telephones are instances of information security. Individuals and organizations do this for a bigger scope to shield touchy individual and business data from being spilled. This paper will assist with examining the dangers associated with data security and review the techniques associated with the data security and attack detection mechanism.
The problems of the Mobile Ad-hoc Network are due to the limited resources of inactive mobile nodes and its low ability to cooperate due to network congestion. Furthermore, there is no central coordination that makes it dif icult to... more
The problems of the Mobile Ad-hoc Network are due to the limited resources of inactive mobile nodes and its low ability to cooperate due to network congestion. Furthermore, there is no central coordination that makes it dif icult to predict the availability of mobile nodes. Hence, in this paper, we are implementing a free congestion zone (ConZone) where it can accept congested packet and re-route to the right path. These two mechanisms are thought to reduce the end-to-end delay ratio and the loss of the packets. At the same time, there is a possibility to improve the distribution ratio and packet throughput
With larger memory capacities and the ability to link into wireless networks, more and more students uses palmtop and handheld computers for learning activities. However, existing software for Web-based learning is not well-suited for... more
With larger memory capacities and the ability to link into wireless networks, more and more students uses palmtop and handheld computers for learning activities. However, existing software for Web-based learning is not well-suited for such mobile devices, both due to constrained user interfaces as well as communication effort required. A new generation of applications for the learning domain that is explicitly designed to work on these kinds of small mobile devices has to be developed. For this purpose, we introduce CARLA, a cooperative learning system that is designed to act in hybrid wireless networks. As a cooperative environment, CARLA aims at disseminating teaching material, notes, and even components of itself through both fixed and mobile networks to interested nodes. Due to the mobility of nodes, CARLA deals with upcoming problems such as network partitions and synchronization of teaching material, resource dependencies, and time constraints.
Wireless is playing the wide role in today’s industrial application. Central idea of this paper is to enhance quality of service (QoS) for multimedia transmission over ad-hoc network. This paper describes the operational of... more
Wireless is playing the wide role in today’s industrial application. Central idea of this paper is to enhance quality of service (QoS) for multimedia transmission over ad-hoc network. This paper describes the operational of different QoS routing protocols, their properties and various parameters advantages and disadvantages. Also describes the use of QoS in Cross layer routing protocol. Finally, it concludes by study of all these cross layer QoS routing protocols.
Mobile ad hoc network is a standalone network capable of autonomous operation where nodes communicate with each other without the need of any existing infrastructure. They are self configuring, autonomous, quickly deployable and operate... more
Mobile ad hoc network is a standalone network capable of autonomous operation where nodes communicate with each other without the need of any existing infrastructure. They are self configuring, autonomous, quickly deployable and operate without infrastructure. Mobile ad hoc networks consist of nodes that cooperate to provide connectivity and are free to move and organize randomly. Every node is router or an end host, in general autonomous and should be capable of routing traffic as destination nodes sometimes might be out of range. Nodes are mobile since topology is very dynamic and they have limited energy and computing resources. These nodes are often vulnerable to failure thus making mobile ad hoc networks open to threats and attacks. Communication in MANET relies on mutual trust between the participating nodes but the features of MANET make this hard. Nodes sometimes fail to transmit and start dropping packets during the transmission. Such nodes are responsible for untrustworthy routing. A trust based scheme can be used to track these untrustworthy nodes and isolate them from routing, thus provide trustworthiness. In this paper a trusted AODV (ST-AODV) protocol is presented which assigns a trust value for each node. Nodes are allowed to participate in routing based on their trust values. A threshold value is assigned and if the nodes trust value is greater than this value its marked as trustworthy node and allowed to participate in routing else the node is marked untrustworthy. The STAODV increases PDR and decreases delay thereby enhancing the QoS metrics and trustworthiness in AODV based MANET routing. The work is implemented and simulated on NS-2. The simulation result shows the proposed ST-AODV provides more trustworthy routing compared with general AODV in presence of packet dropping nodes in MANET.
Quad-Copter is a certain type of Unmanned Arial Vehicles UAVs, due to its stability, maneuverability and easy to design and implementation had been used in a variety of applications that serve humanity in many fields such as, military,... more
Quad-Copter is a certain type of Unmanned Arial Vehicles UAVs, due to its stability, maneuverability and easy to design and implementation had been used in a variety of applications that serve humanity in many fields such as, military, industrial, commercial, surveillance, etc. In this paper, Quad-Copter had been used along with Ad-hoc network mechanism to design a prototype of a system that can be developed to be used early mentioned applications, with range more than that can be achieved via single Quad-Copter. The performance of Ad-hoc network was evaluated using test bed method. Ad-hoc network was implemented using N-Raspberry pi 3 (Rpi 3) microprocessor, using their built-in Wi-Fi and a laptop as a Monitor unit. Each device in the proposed prototype system had used Optimized Link state Routing OLSR as routing protocol. Ad-hoc network was evaluated for three scenarios that are; evaluating the configuration of Ad-hoc network, evaluating OLSR data forwarding over 1-hop / multi-hop and finally evaluate multi-hop mechanism in Ad-hoc networks. The results shows that the routing protocol used in the implemented network can find a path for 1-hop and multi-hop and use that path to stream a video with acceptable jitter.
An Ad-Hoc network is a wireless, decentralized, dynamic network in which devices associate with each other in their link range, in which the basic 802.11 MAC protocol uses the Distributed Coordination Function (DCF) to share the media... more
An Ad-Hoc network is a wireless, decentralized, dynamic network in which devices associate with each other in their link range, in which the basic 802.11 MAC protocol uses the Distributed Coordination Function (DCF) to share the media between various devices. But use of 802.11 MAC protocol in Ad-Hoc networks affected by different issues such as restricted power capacity, packet loss because of transmission error, various control traffic and failure to avoid packet collision. To solve these problems various protocols have been proposed. But we don't have any perfect protocol which can resolve the issues related to power management, packet collision and packet loss efficiently. In this research paper, we suggest a new protocol to adjust the upper & lower bounds for the contention window to decrease the number of collisions. As well as it proposes a power control scheme, triggered by the MAC layer to reduce the packet loss, energy wastage and decrease the number of collisions during transmission. The proposed MAC protocol is implemented and performance is compared with existing 802.11 MAC protocol. We computed the Packet Delivery Fraction(PDF), average End-to-End(e-e) delay, average throughput and packet loss in several conditions. We find proposed protocol is comparatively improved than the existing protocol.
This paper outlines experience with the implementation and deployment of wireless network with direct connection between the devices using Ad-hoc network. The work was prompted by the lack of published results concerning the issues... more
This paper outlines experience with the implementation and deployment of wireless network with direct connection between the devices using Ad-hoc network. The work was prompted by the lack of published results concerning the issues associated with the implementation of ad-hoc network on actual wireless networks, as opposed to results of simulation experiments. I examined implementations of adhoc network is defined as the wireless network with direct connection between the devices. The connection is here been established dynamically while defining a session. While performing the communication, the communicating device discovers the other communicating device in the range so that effective communication will be drawn over the system. The search mechanism is performed till the target node is not identified.