Eashwar Publications

Displaying 1-13 of 13 results

  • White Papers // Dec 2009

    Domain keys Identified Mail (DKIM) for Spam Control

    SPAM (UBE) is email sent to groups of recipients who have not requested it or have "Opted out" of group email subscriptions and continue to receive email from the sender. So the authors devise a DKIM (Domain Key Identified Mail), which is a domain-level authentication framework for email using public-key...

    Provided By Eashwar Publications

  • White Papers // Aug 2009

    Efficiency Analysis on QoS Multicast Routing Protocols Under Cross-Layer Approach With Bandwidth Estimated Admission Control

    In wireless ad hoc networks, nodes are expected to be heterogeneous with a set of multicast destinations greatly differing in their end devices and QoS requirements. This paper produces an analysis for efficiency for multilayered video multicast over heterogeneous wireless ad hoc networks for bandwidth requirements with admission control. The...

    Provided By Eashwar Publications

  • White Papers // Aug 2009

    A Study on Optimized Smooth Handoff in Mobile IPv6

    Over the past decade a number of wireless communication networks have emerged for urban and indoor areas to complement the traditional cellular networks. The services provided by these networks are geographically selective. As a result, a wireless communication terminal needs to connect to multiple points of connection and perhaps multiple...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    A Performance Comparison of Multicast Routing Protocols for Mobile Ad Hoc Networks

    Multicasting is an essential service for mobile ad-hoc networks. In this paper, the authors present a comparative performance evaluation of two general-purpose multicast protocols, namely ODMRP and AMRIS, focusing on the effects of changes such as increasing number of multicast receivers or sources, delivery ratio and maximum speed. An ad...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    Key Distribution and Authentication System for MANET Without Pre-Fixed Trust Relationship

    As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    A Novel Framework for Security Attack Analysis in Wireless Ad-Hoc Networks

    Mobile Ad hoc NETworks (MANET) have inherently different properties than traditional wired and wireless networks. Due to the dynamic nature of the mobile ad hoc network, there are numerous security threats that disturb the network security. In this paper, security issues and analysis of main vulnerabilities in the mobile ad...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    Bandwidth Guaranteed in VPN Using Provisioned Restorable Algorithm With Quality of Service

    A Virtual Private Network (VPN) provides end users with a way to privately access information on their network over a public network infrastructure such as internet. Using a technique called "Tunneling", data packets are across a public routed network, such as internet that simulates a point-to-point connection. The basic structure...

    Provided By Eashwar Publications

  • White Papers // Mar 2009

    Performance Analysis of Shared Tree Based Multicast Routing Protocols for Ad-Hoc Wireless Networks

    In recent times multicast routing protocols has a tremendous growth in the ad-hoc wireless networks like civilian operations, emergency search and rescue, law enforcement, and warfare situations, where setting up and maintaining a communication infrastructure may be costly. Ad-hoc wireless networks are dynamic topology networks organized by a collection of...

    Provided By Eashwar Publications

  • White Papers // Mar 2009

    Network Security Engineering Process and Management

    This paper gives a high-level overview of network security that organizes the mass of seemingly related subjects of network security into a manageable whole. They key concept of the organization is that network security consists of some basic theory, like cryptography and network protocols; a software engineering process that is...

    Provided By Eashwar Publications

  • White Papers // Mar 2009

    Prototype Architecture for Real-Time Object Oriented Distributed Database

    Real-Time Object Oriented Distributed Database has temporal requirements for management of data, timing constraints on transactions, and performance goals. Temporal database contains time-varying data. In a Real-Time Database transaction have deadlines or timing constraints. A typical Real-Time application is program trading for financial markets, accessing information concurrently, within a dynamic...

    Provided By Eashwar Publications

  • White Papers // Feb 2009

    Packet Scheduling Algorithms in Network Standards

    Packet Scheduling Algorithm is a networking algorithm which helps to maximize system throughput and guarantee the Quality of Service (QoS) thereby reduces network traffic using Orthogonal Frequency Division Multiplexing (OFDM) systems with smart antennas, a new packet scheduler is introduced to consider QoS requirements, packet location in the frame, and...

    Provided By Eashwar Publications

  • White Papers // Jan 2009

    A Protective Model for Back-End Server Security Using to IP

    Today in this technological world web based applications are on a roll for the modern business. This application though is useful and has made business global posses certain threats. These web based applications are divided into two parts one the Front end and the other Back end. The most significant...

    Provided By Eashwar Publications

  • White Papers // Jan 2009

    A Novel Approach for Misbehavior Detection in Ad Hoc Networks

    In the recent years, wireless technology has enjoyed a tremendous rise in popularity and usage opening new fields of applications. One such field concerns Mobile Adhoc NETwork (MANET) where the nodes do not rely on any existing network infrastructure. By definition the nature of adhoc networks is dynamically changing. Hence...

    Provided By Eashwar Publications

  • White Papers // Mar 2009

    Performance Analysis of Shared Tree Based Multicast Routing Protocols for Ad-Hoc Wireless Networks

    In recent times multicast routing protocols has a tremendous growth in the ad-hoc wireless networks like civilian operations, emergency search and rescue, law enforcement, and warfare situations, where setting up and maintaining a communication infrastructure may be costly. Ad-hoc wireless networks are dynamic topology networks organized by a collection of...

    Provided By Eashwar Publications

  • White Papers // Feb 2009

    Packet Scheduling Algorithms in Network Standards

    Packet Scheduling Algorithm is a networking algorithm which helps to maximize system throughput and guarantee the Quality of Service (QoS) thereby reduces network traffic using Orthogonal Frequency Division Multiplexing (OFDM) systems with smart antennas, a new packet scheduler is introduced to consider QoS requirements, packet location in the frame, and...

    Provided By Eashwar Publications

  • White Papers // Aug 2009

    Efficiency Analysis on QoS Multicast Routing Protocols Under Cross-Layer Approach With Bandwidth Estimated Admission Control

    In wireless ad hoc networks, nodes are expected to be heterogeneous with a set of multicast destinations greatly differing in their end devices and QoS requirements. This paper produces an analysis for efficiency for multilayered video multicast over heterogeneous wireless ad hoc networks for bandwidth requirements with admission control. The...

    Provided By Eashwar Publications

  • White Papers // Aug 2009

    A Study on Optimized Smooth Handoff in Mobile IPv6

    Over the past decade a number of wireless communication networks have emerged for urban and indoor areas to complement the traditional cellular networks. The services provided by these networks are geographically selective. As a result, a wireless communication terminal needs to connect to multiple points of connection and perhaps multiple...

    Provided By Eashwar Publications

  • White Papers // Dec 2009

    Domain keys Identified Mail (DKIM) for Spam Control

    SPAM (UBE) is email sent to groups of recipients who have not requested it or have "Opted out" of group email subscriptions and continue to receive email from the sender. So the authors devise a DKIM (Domain Key Identified Mail), which is a domain-level authentication framework for email using public-key...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    A Performance Comparison of Multicast Routing Protocols for Mobile Ad Hoc Networks

    Multicasting is an essential service for mobile ad-hoc networks. In this paper, the authors present a comparative performance evaluation of two general-purpose multicast protocols, namely ODMRP and AMRIS, focusing on the effects of changes such as increasing number of multicast receivers or sources, delivery ratio and maximum speed. An ad...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    Key Distribution and Authentication System for MANET Without Pre-Fixed Trust Relationship

    As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    A Novel Framework for Security Attack Analysis in Wireless Ad-Hoc Networks

    Mobile Ad hoc NETworks (MANET) have inherently different properties than traditional wired and wireless networks. Due to the dynamic nature of the mobile ad hoc network, there are numerous security threats that disturb the network security. In this paper, security issues and analysis of main vulnerabilities in the mobile ad...

    Provided By Eashwar Publications

  • White Papers // Apr 2009

    Bandwidth Guaranteed in VPN Using Provisioned Restorable Algorithm With Quality of Service

    A Virtual Private Network (VPN) provides end users with a way to privately access information on their network over a public network infrastructure such as internet. Using a technique called "Tunneling", data packets are across a public routed network, such as internet that simulates a point-to-point connection. The basic structure...

    Provided By Eashwar Publications

  • White Papers // Mar 2009

    Network Security Engineering Process and Management

    This paper gives a high-level overview of network security that organizes the mass of seemingly related subjects of network security into a manageable whole. They key concept of the organization is that network security consists of some basic theory, like cryptography and network protocols; a software engineering process that is...

    Provided By Eashwar Publications

  • White Papers // Mar 2009

    Prototype Architecture for Real-Time Object Oriented Distributed Database

    Real-Time Object Oriented Distributed Database has temporal requirements for management of data, timing constraints on transactions, and performance goals. Temporal database contains time-varying data. In a Real-Time Database transaction have deadlines or timing constraints. A typical Real-Time application is program trading for financial markets, accessing information concurrently, within a dynamic...

    Provided By Eashwar Publications

  • White Papers // Jan 2009

    A Protective Model for Back-End Server Security Using to IP

    Today in this technological world web based applications are on a roll for the modern business. This application though is useful and has made business global posses certain threats. These web based applications are divided into two parts one the Front end and the other Back end. The most significant...

    Provided By Eashwar Publications

  • White Papers // Jan 2009

    A Novel Approach for Misbehavior Detection in Ad Hoc Networks

    In the recent years, wireless technology has enjoyed a tremendous rise in popularity and usage opening new fields of applications. One such field concerns Mobile Adhoc NETwork (MANET) where the nodes do not rely on any existing network infrastructure. By definition the nature of adhoc networks is dynamically changing. Hence...

    Provided By Eashwar Publications