Eashwar Publications

Displaying 1-8 of 8 results

  • White Papers // Dec 2009

    Domain keys Identified Mail (DKIM) for Spam Control

    SPAM (UBE) is email sent to groups of recipients who have not requested it or have "Opted out" of group email subscriptions and continue to receive email from the sender. So the authors devise a DKIM (Domain Key Identified Mail), which is a domain-level authentication framework for email using public-key...

    Provided By Eashwar Publications

  • White Papers // Aug 2009

    Efficiency Analysis on QoS Multicast Routing Protocols Under Cross-Layer Approach With Bandwidth Estimated Admission Control

    In wireless ad hoc networks, nodes are expected to be heterogeneous with a set of multicast destinations greatly differing in their end devices and QoS requirements. This paper produces an analysis for efficiency for multilayered video multicast over heterogeneous wireless ad hoc networks for bandwidth requirements with admission control. The...

    Provided By Eashwar Publications

  • White Papers // Aug 2009

    A Study on Optimized Smooth Handoff in Mobile IPv6

    Over the past decade a number of wireless communication networks have emerged for urban and indoor areas to complement the traditional cellular networks. The services provided by these networks are geographically selective. As a result, a wireless communication terminal needs to connect to multiple points of connection and perhaps multiple...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    A Performance Comparison of Multicast Routing Protocols for Mobile Ad Hoc Networks

    Multicasting is an essential service for mobile ad-hoc networks. In this paper, the authors present a comparative performance evaluation of two general-purpose multicast protocols, namely ODMRP and AMRIS, focusing on the effects of changes such as increasing number of multicast receivers or sources, delivery ratio and maximum speed. An ad...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    Key Distribution and Authentication System for MANET Without Pre-Fixed Trust Relationship

    As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    A Novel Framework for Security Attack Analysis in Wireless Ad-Hoc Networks

    Mobile Ad hoc NETworks (MANET) have inherently different properties than traditional wired and wireless networks. Due to the dynamic nature of the mobile ad hoc network, there are numerous security threats that disturb the network security. In this paper, security issues and analysis of main vulnerabilities in the mobile ad...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    Bandwidth Guaranteed in VPN Using Provisioned Restorable Algorithm With Quality of Service

    A Virtual Private Network (VPN) provides end users with a way to privately access information on their network over a public network infrastructure such as internet. Using a technique called "Tunneling", data packets are across a public routed network, such as internet that simulates a point-to-point connection. The basic structure...

    Provided By Eashwar Publications

  • White Papers // Mar 2009

    Prototype Architecture for Real-Time Object Oriented Distributed Database

    Real-Time Object Oriented Distributed Database has temporal requirements for management of data, timing constraints on transactions, and performance goals. Temporal database contains time-varying data. In a Real-Time Database transaction have deadlines or timing constraints. A typical Real-Time application is program trading for financial markets, accessing information concurrently, within a dynamic...

    Provided By Eashwar Publications

  • White Papers // Aug 2009

    Efficiency Analysis on QoS Multicast Routing Protocols Under Cross-Layer Approach With Bandwidth Estimated Admission Control

    In wireless ad hoc networks, nodes are expected to be heterogeneous with a set of multicast destinations greatly differing in their end devices and QoS requirements. This paper produces an analysis for efficiency for multilayered video multicast over heterogeneous wireless ad hoc networks for bandwidth requirements with admission control. The...

    Provided By Eashwar Publications

  • White Papers // Aug 2009

    A Study on Optimized Smooth Handoff in Mobile IPv6

    Over the past decade a number of wireless communication networks have emerged for urban and indoor areas to complement the traditional cellular networks. The services provided by these networks are geographically selective. As a result, a wireless communication terminal needs to connect to multiple points of connection and perhaps multiple...

    Provided By Eashwar Publications

  • White Papers // Dec 2009

    Domain keys Identified Mail (DKIM) for Spam Control

    SPAM (UBE) is email sent to groups of recipients who have not requested it or have "Opted out" of group email subscriptions and continue to receive email from the sender. So the authors devise a DKIM (Domain Key Identified Mail), which is a domain-level authentication framework for email using public-key...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    A Performance Comparison of Multicast Routing Protocols for Mobile Ad Hoc Networks

    Multicasting is an essential service for mobile ad-hoc networks. In this paper, the authors present a comparative performance evaluation of two general-purpose multicast protocols, namely ODMRP and AMRIS, focusing on the effects of changes such as increasing number of multicast receivers or sources, delivery ratio and maximum speed. An ad...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    Key Distribution and Authentication System for MANET Without Pre-Fixed Trust Relationship

    As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    A Novel Framework for Security Attack Analysis in Wireless Ad-Hoc Networks

    Mobile Ad hoc NETworks (MANET) have inherently different properties than traditional wired and wireless networks. Due to the dynamic nature of the mobile ad hoc network, there are numerous security threats that disturb the network security. In this paper, security issues and analysis of main vulnerabilities in the mobile ad...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    Bandwidth Guaranteed in VPN Using Provisioned Restorable Algorithm With Quality of Service

    A Virtual Private Network (VPN) provides end users with a way to privately access information on their network over a public network infrastructure such as internet. Using a technique called "Tunneling", data packets are across a public routed network, such as internet that simulates a point-to-point connection. The basic structure...

    Provided By Eashwar Publications

  • White Papers // Mar 2009

    Prototype Architecture for Real-Time Object Oriented Distributed Database

    Real-Time Object Oriented Distributed Database has temporal requirements for management of data, timing constraints on transactions, and performance goals. Temporal database contains time-varying data. In a Real-Time Database transaction have deadlines or timing constraints. A typical Real-Time application is program trading for financial markets, accessing information concurrently, within a dynamic...

    Provided By Eashwar Publications