International Journal of Computer Networks and Wireless Communications (IJCNWC)

Displaying 1-40 of 156 results

  • White Papers // Jun 2014

    Overload Detection and Controlling Techniques in SIP Servers

    The Session Initiation Protocol (SIP) is an application level signaling protocol used for locating end users, establishing, modifying and closing multimedia sessions between end users. This protocol has been adopted by 3GPP as a signaling protocol for IP-Multimedia Subsystem (IMS) networks. The usage of IP telephony is increasing rapidly, which...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Jun 2014

    A Study on Sensor Deployment Strategies

    A Wireless Sensor Network (WSN) is composed of many tiny, low-power nodes that integrate sensing units, transceivers, and processing unit and wireless communication capabilities. These devices are deployed in a region of interested area to collect the information from the environment, which will be sent to a remote base station....

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Jun 2014

    Performance Evaluation of SCTP Protocol for Smart Grid Environment

    Smart grid communication network will be a network of networks and with the obvious evolution and acceleration, it is crucial for its success to rely on a solid transmission protocol among its peripherals due to its real time streaming. The Stream Control Transmission Protocol (SCTP) protocol, which was initially designed...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Jun 2014

    Dynamic Routing Protocols Assessment for Varying Packets Using OPNET

    In this paper, the authors provide the detailed investigation of three well-known routing protocols namely IS-IS, IGRP and RIP for fifty workstations which have increasing number of packets from 100 to 1000 in steps working on three dissimilar applications i.e. ftp, remote login and videoconferencing respectively. Simulation is carried out...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // May 2014

    Comparative Analysis of Different Channel Coding Techniques

    Communication played important role in the development of human civilization. Today the heart of all techniques is the wireless communication. In wireless communication whenever data is transmitted or received error is produced due to dispersive effect, fading, attenuation, interference, noisy channel. For efficient data communication, it is necessary to receive...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Modeling and Performances Evaluation of HARQ Technique for MIMO Transmission in Downlink LTE Cellular Networks

    Long Term Evolution (LTE) is designed for deployment in a variety of spectrum allocation ranging from 1.4MHz to 20MHz. The peak data rate envisaged for LTE is 100 Mbps in downlink and 50 Mbps in the uplink. Unfortunately, different constraints have a strong influence on system performance such as the...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Adaptive Virtual Queue with Choke Packets for Congestion Control in MANETs

    During past few years, the wireless network has grown in leaps and bounds as it offered the end users more flexibility, which enabled a huge array of services. The concept of the wireless network brings lot of challenges such as energy consumption, dynamic configuration and congestion. Congestion in a network...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    CLDASR: Cross Layer Based Detection and Authentication in Secure Routing in MANET

    In MANETs, providing the security to the network from the routing attacks like black hole and gray hole is a big challenge. To resolve the above issues, in this paper, the authors implement a Cross Layer based Detection and Authentication technique for Secure multi-path Routing (CLDASR). In the authentication method,...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Energy Efficiency of Cellular Networks-Femtocell

    Vast advances in the field of Information Communication and Technologies (ICT) has significantly increased the energy requirement and CO2 emissions which has adversely affected the atmosphere causing untimely and unanticipated changes. Nothing much is being done to address this major issue. The authors call it major as they have very...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Intrusion Detection Prevention System (IDPS) Using ACL and AAA

    It is widely recognized that the threat to enterprises from insider activities is increasing and that significant costs are being incurred. The multi-faceted dimensions of insider threat and compromising actions have resulted in a diverse experience and understanding of what insider threats are and how to detect or prevent them....

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Energy Consumption Efficiency and Performance Evaluation of DSDV and AODV Routing Protocols

    In this paper, the authors examine Mobile Ad-hoc NETworks (MANETs) performance metrics which are mainly: the throughput, the energy consumption and the routing overhead. The reactive Ad-hoc On-demand Distance Vector (AODV) routing protocol was compared to the proactive Destination Sequenced Distance Vector DSDV according to the proposed performance metrics. The...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Detection of Replica Node Attack in Wireless Sensor Networks Using Hierarchical Approach

    The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significant security breaches which lowers the integrity of gathered data. In this paper, the authors propose a replica node detection scheme using a hierarchy-based framework....

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Modified Centralized Set Cover Based Approximation(CSCA) for Duty-Cycled Wireless Sensor Networks

    Broadcast operation is one of the most fundamental operations in wireless sensor networks for data communication. In this paper, the authors examine the problem of finding an energy-efficient broadcast algorithm for duty-cycled wireless sensor networks. In such networks, sensor nodes usually stay in low energy sleep mode and occasionally wake...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Solving the Wireless Mesh Network Design Problem Using Genetic Algorithm and Tabu Search Optimization Methods

    Wireless Mesh Network (WMN) consists of mesh clients, mesh routers and gateways. In WMN, gateways connect to the internet via wireline links and provide internet access services for users. Due to the limited wireless channel bit rate, multiple gateways are usually required in a WMN, which costs budget and takes...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Energy Efficient Cross Layer Routing Protocol With Adaptive Dynamic Retransmission for Wireless Sensor Networks

    The wireless sensor networks consist of densely populated sensor nodes which are capable of transmitting critical data to intended sink node. The important and crucial part of wireless sensor networks is to utilize and save energy in more conservative way. Here is very much needed to support required application objectives...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Migration of Applications from IPv4 to IPv6

    Organizations of all types are feeling increasing pressure to transition from the well-known and universal Internet Protocol version 4 (IPv4) standards to the newer IPv6 standard, while still supporting both network topologies. There are many reasons for this, not the least of which are the continually shrinking numbers of available...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Radio Interference Detection in Capacity Optimized Co-Operative Networks

    Wireless networks with cooperative communication have received incredible interest in communication networks. Most accessible works based on Capacity Optimized COoperative (COCO) topology control, in cooperative communications are mainly focused on the physical layer issues, commonly outage probability and outage capacity. Therefore, the network upper layer issues are highly ignored. The...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Apr 2014

    Emulation Attack in Cognitive Radio Networks: A Study

    A latest communication technology named \"Cognitive radio network\" is a network in which an un-licensed user can use a freed channel in a spectrum band of licensed user. One of the spectrum management functions is spectrum sensing which the most critical function in the entire communication. If there will be...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2014

    A Comprehensive Study of M2M Area Networks and Challenges

    Machine-To-Machine (M2M) communication technologies has emerged as finest technology for next generation communication, and is moving beyond its decades of use in utilities, transport, and heavy industry in the mainstream, empowering companies to deliver a real value. This paper presents an investigation of M2M area network technologies such as Wi-Fi,...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2014

    A Reaction Based Approach to Detect Black Hole Attack Using Modified AODV Protocol in MANETS

    Mobile Ad-hoc NETworks (MANETS) are group of mobile devices that are connected through wireless links without any fixed infrastructure. Providing a secure routing of data in MANETS is a challenging issue. MANETS suffers from variety of attacks. Among them black hole attack is one of the serious active attack network...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2014

    Performance Analysis of Selective Reject ARQ with Effect on Efficiency

    One of the important layers is the data link layer. The two main functions of the data link layer are data link control and media access control. The first data link control deals with the design and procedures for communication between two adjacent nodes: node-to-node communication. Important responsibilities of data...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2014

    Bi-Quad Antenna with Parabolic Reflector for Enhancing the Coverage Area of a Wi-Fi Access Point

    Today's network especially LAN has drastically changed. People expect that they should not be bound to the network. In this scenario, Wireless Local Area Networks (WLAN) offers tangible benefits over traditional wired networking. Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2014

    Power-Aware Cluster-Based Vehicular Ad hoc Network Model for Highway Communication

    Clustering in Vehicular Ad hoc NETwork (VANET) is one of the control schemes used to make VANET global topology less dynamic. Many of the VANET clustering algorithms are derived from Mobile Ad hoc NETwork (MANET). However, VANET nodes are characterized by their high mobility, and the existence of VANET nodes...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2014

    Link Scheduling With End to End Delay Bandwidth Guarantees for Optimization Flow Control

    One of the most complicated issues is to measuring the delay performance of end to end nodes in multi-hop wireless networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    Improving Service Credibility in Password Authenticated Peer Services

    Two Server Password-based Authentication Key Exchange protocols (Two-Server PAKE), where two servers co-operate to authenticate a client on the basis of password only and if one server is compromised due to insider attack or Distributed Denial of Service attack (DDOS), the attacker still cannot pretend to be the client with...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    Resource Allocation in Self Organizing Cloud - A Survey

    By gearing Virtual Machine (VM) technology which provides performance and fault seclusion, cloud resources can be provisioned on demand in a pulverized, multiplexed manner rather than in monumental pieces. By incorporating unpaid assistant computing into cloud architectures, the authors foresee a colossal self-organizing cloud being twisted to gather the vast...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    Intelligent Redirection of Virtual Machine and Efficient Load Balancing in Private Cloud

    Cloud computing is on demand as it provides flexible usage for reliable and efficient services for cloud consumers. In cloud computing, virtual machines are used for efficient utilization of physical machines which reduces LAN cabling, man power and concurrently supports green computing. The physical machine gets overloaded, during the utilization...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    Optimal Top-K Queries Processing: Sampling and Dynamic Scheduling Approach

    An effective query processing plays an important role in the uncertain data streams. Specifically, multiple top-k queries processing on uncertain data streams obtained from large applications of several fields such as sensor network monitoring and internet traffic control requires periodic execution of queries and sharing results among them. The system...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    Effective Method for Secured SOAP Based Webservice Interaction Using JASYPT

    Several applications are developed with SOA techniques, so security for the web services in heterogeneous platform is very important. In order to secure the web services wide set of security requirements need to be considered for providing authentic secure transfer of message over the internet. In order to solve the...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    Path Diversity in Stateless Multicast Protocol for Ad hoc Networks

    In this paper, the authors have developed a stateless receiver based multicast protocol that uses a list of multicast members addresses embedded in packet headers so that individual nodes do not have to maintain state information hence enabling receivers to decide the most efficient way to forward the multicast traffic....

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    Frequency Offset Estimation in OFDM Systems Using Threshold Based

    The performance of the Orthogonal Frequency Division Multiplexing (OFDM) systems degrade due to Doppler frequency or frequency drift between transmitter and receiver oscillator which causes frequency offset and hence leads to a number of impairments in the received signal, thereby making its detection incorrect. In this paper, a threshold-based frequency...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    End-To-End Flow Allocation and Channel Assignment in MC-MR Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) with multi-channel multi-radio availability are attracting more and more attention from the research community because of its performance improvement and relatively low cost and complexity. It has been believed that the limited spectrum resource can be fully exploited by utilizing partially overlapping channels in addition to...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    Assessment of MANET Routing Protocols in Special Traffic and Mobility Models

    Anonymous routing protocols are used to hide the route between the source and destination, source identity and destination identity. In the existing system, anonymous routing protocols use hop by hop encryption or redundant traffic which may result in high cost and it doesn't provide different anonymity protection to source, destination...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    Analysis of Throughput in WLANS Considering Aggregation Scheme Using Mathematical Modeling (MATLAB)

    Wireless Local Area Network (WLAN) links two or more devices using some wireless distribution method, and usually providing a connection through an access point to the wider internet. The basic requirement of the WLAN is to achieve higher throughput at the Medium Access Control (MAC) service access point. The throughput...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    CSMA/CA, the Channel Access Mechanism for Reducing Congestion in Wireless Cellular Networks

    While the demand for wireless cellular services continues to increase, radio resources remain scarce. As a result, network operators have to competently manage these resources in order to increase the efficiency of their Wireless Cellular Networks (WCN) and meet the Quality of Service (QoS) of different users. A key component...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2013

    Current Studies on AP Selection and Load Balancing in IEEE 802.11WLAN

    IEEE802.11 WLAN (Wireless LAN) has been widely used in enterprise and public space. The important aspect of such network is the efficient use of radio resources and optimal load balancing among APs (Access Point). In IEEE802.11, a STAtion (STA) or a node has the right to select an AP with...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Oct 2013

    Fortify MANETs From Invasion Using Hybrid Cryptographic Techniques

    Wireless Networks are always preferred from the first day of invention due to mobility and scalability. Mobile Ad hoc NETwork (MANET) has become one of the most wireless communication mechanisms. Security is the problem in wireless networks. The lacking of security leads to occurrence of Intrusion. The Pre-Existing Research, an...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Oct 2013

    Improve the Network Energy Consumption in Sensor Networks Using K-Level Hierarchical Algorithm

    Wireless Sensor Networks (WSNs) is a collection of wireless sensor nodes dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. Routing protocols in wireless sensor networks helps node to send and receive packets. Traditional hierarchical routing algorithms combine adaptability to changing environments with energy...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Oct 2013

    Performance Evaluation of MMSE Filter and Matched Filter Based Multiuser Detectors

    In the broad sense the term communication means sending, receiving and processing of information by electronic methods. The communication started with wire line telegraphy. CDMA is very useful technique for modern communication system. There exist problem of interference due to other users accessing the channel at same time. Multi User...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Oct 2013

    Intelligence Induced Location Personalized Data Service

    Now-a-days, people are using mobile phones for searching required data. But the major problem in mobile search is that the interaction between the users and search engines are limited by the small form factors of the mobile devices. In this paper, the authors propose a Location Personalized Data Service (LPDS)...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey

    In recent years, the use of wireless sensor networks in real life applications has increased rapidly. The building block of WSNs comprises of hundreds or even thousands of sensor nodes. These sensor nodes are battery-powered with a limited lifetime and additional energy can be harvested from the external environment. They...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Clustering Schemes in Wireless Sensor Networks and Mobile Ad hoc Network: Classification and Comparison

    Number of clustering schemes has been proposed so far for different ad hoc networks which play an important role in self organizing them. The two prominent ad hoc networks which have gained lot popularity during the last few years are Wireless Sensor Networks (WSN) and Mobile Ad hoc Networks (MANETs)....

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Identification & Punishment of Misbehaving Wireless Stations in IEEE 802.11

    Contemporary wireless devices should be equipped with functionality for supporting Quality of Service (QoS) & integrity of the data. Unfortunately, most widely used Medium Access Control (MAC) protocols, IEEE 02.11a/b/g, could not satisfy these requirements because they do not provide assurance for fluent QoS. Misbehaving stations are the ones which...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Comparative Study of Congestion Control Techniques in High Speed Network

    Due to enhancement of broadband infrastructure, many multimedia applications such as streaming media, IPTV, video conference, online gaming and video surveillance are emerging. These video streaming generally require high bandwidth but are not responding to network congestion. And most of them prefer timeliness to reliability. TCP seems not suitable to...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Internet Protocol Security(IPSec)

    The standard Internet communication protocol is completely unprotected, allowing hosts to inspect or modify data which is in transit. Adding IPSec to systems will overcome this limitation by providing strong encryption, integrity, authentication and replay protection. This paper describes IP security in details and explains theory, its mode of operation,...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    A relative study of Various Routing Protocols in Wireless Sensor Networks

    A sensor is a device to sensing and monitoring the networks. It operates in wireless domain with radio frequency at 2.4 GHz free ISM (Industrial Scientific and Medical Applications) band to measuring and capture the network behavior. Typical applications include, but are not limited to, data collection, monitoring, surveillance, and...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Energy Efficient Architecture to Cognitive Radio Wireless Sensor Networks

    Cognitive radio has been considered as a key technology for future wireless communications and mobile computing. In this cognitive radio technology spectrum play an important role. Effective utilization of frequency spectrum improves the quality of the communication. In this paper the authors attempt to improve the radio spectrum utilization by...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Oct 2012

    Effect of Malicious Node Attacks Under Practical Adhoc Network

    Unlike a fixed wireless network, wireless ad hoc or on-the-fly networks are characterized by the lack of infrastructure. Nodes in a mobile ad-hoc network are free to move and organize themselves in an arbitrary fashion. The field of wireless networking emerges from the integration of personal computing, cellular technology, and...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Oct 2012

    A New Evolutionary Approach for Gateway Placement in Wireless Mesh Networks

    In this paper, the authors study the challenging problem of optimizing gateway placement for throughput in Wireless Mesh Networks and propose a novel algorithm based on Evolutionary Algorithm (EA) for it. By generating the locations of gateway randomly and independently, they calculate the fitness value of each scheme, and update...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Oct 2012

    Advanced Passive Clustering Mobility in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a set of nodes communicating through wireless links to observe a given phenomenon. Mobility of sensor nodes posed new challenge witch demands researchers' attention. Given the constraints of mobility and energy consumption, WSNs require the implementation of new algorithms. In this paper, the authors...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Oct 2012

    Secured QoS Routing Path Discovery in Wireless Ad hoc Networks Using Cache Mechanism

    Wireless ad-hoc networks consist of a set of nodes which construct a random network topology by means of several communication media. Wireless Ad-hoc network present a diversification in communication technology necessary to solve the end-to-end requirements of the QoS based communication networks. Of the numerous confronts in the composite dispersed...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Oct 2012

    A K-Anonymity Confidentiality Defending Locality Examining Scheme for Wireless Networks with Jack Secure System

    Anonymizing wireless networks permit users to access services confidentially with the help of a series of routers in order to conceal the IP address of the client from the server. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving. To address this...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Oct 2012

    A Comparative Study of Mobile Wireless Communication Networks and Technologies

    Mobile and wireless networks have made tremendous growth in the last fifteen years. The rapid improvement of the mobile generations was for the purpose of supporting as many mobile devices as possible that could benefit the users at anytime and anywhere in terms of common practical applications such as Internet...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2013

    Performance Analysis on Modulation Techniques of W-CDMA in Multipath Fading Channel

    In the beginning of 21st century there has been a dramatic shift in the market dynamics of telecommunication services. The transmission from base station to mobile or downlink transmission using M-ary Quadrature Amplitude Modulation (QAM) and Quadrature Phase Shift Keying (QPSK) modulation schemes are considered in Wideband-Code Division Multiple Access...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2013

    AAA Mechanism for Local Mobile Node in Network Mobility Environment

    NEtwork MObility (NEMO) is a kind of mobility deployment scenario where a group of nodes form a network and moves from one network to another network that is led by a node called Mobile Router (MR). NEMO Basic Support (NEMO BS) protocol enables a whole network to move and to...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2013

    A Survey on Modified RTS/CTS Mechanism

    The Request-To-Send and Clear-To-Send (RTS/CTS) mechanism is widely used in wireless networks in order to transmit data from source to destination in order to reduce packet collisions (due to Hidden node) and, thus, achieve high throughput. It solves problem over Carrier Sense Multiple Access (CSMA), but also arises some additional...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2013

    CCES: Coverage and Cluster-Based Energy Efficient Node Scheduling Scheme for Mobile Sensor Network

    Scheduling the sensors active and sleep period is significantly important for achieving energy efficiency in resource constrained Wireless Sensor Networks (WSNs). Most existing node scheduling schemes consider only the energy efficiency of sensor nodes and cannot be used for mobility-centric applications since they are designed for static network topology. Though...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2013

    A Survey on Duty Cycling Schemes for Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a network that is composed of large number of low cost, low power sensor nodes that are interconnected by means of wireless medium and it finds major application in the field of environment monitoring, target tracking, vehicle tracking and surveillance. The unique characteristics of...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2013

    An Efficient Idrs Approach to Abolish the Routing Attacks in Manet

    A MANET is a category of wireless ad hoc network that can change locations and configure itself. These type of networks are without fixed infrastructure and are more prone to attacks that occur in the network. The existing methodologies namely 2ACK,NACK,SMP and STP results its inefficiency in detecting attacker's intrusion...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2013

    Performance Evaluation of Round Robin and Proportional Fair Scheduling Algorithms for Constant Bit Rate Traffic in LTE

    Scheduling is a key Radio Resource Management (RRM) mechanism for realizing Quality of Service (QoS) requirements and optimizing system performance of Long Term Evolution (LTE) network. Scheduling is the process of dynamically allocating physical resources to User Equipments (UEs) based on scheduling algorithms implemented at the LTE base station. Various...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Simulation Based Performance Comparison of AODV, DSR, FSR Routing Protocol with Wormhole Attack

    An ad hoc network is a cluster of nodes where individual nodes help in forwarding the packets even beyond the wireless transmission range. This network does not rely on routers in wired network or access points in wireless network, hence it's named ad hoc. In this paper, the authors have...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Routing Protocols of Wireless Sensor Networks: A Review

    Research on wireless sensor networks is the most popular area for the research scholars. Wireless networks are connecting each and every corner of the world and providing communication facilities to various users. Routing protocols are one of the most important factors for any kind of communication. In this paper, the...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    A Survey on Gray Hole Attack in MANET

    Mobile Adhoc NETwork (MANET) are used most commonly all around the world, because it has the ability to communicate each other without any fixed network. It has the tendency to take decisions on its own that is autonomous state. MANET is generally known for infrastructure less. The bridges in the...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    A Survey on Detection and Mitigation of Misbehavior in Disruption Tolerant Networks

    Denial of Service (DoS) attack is one of the major problem in today's Internet. It constitutes the hardest security problems nowadays. Particularly Distributed Denial of Service (DDoS) attack have severe impact. The main aim of a DoS is the disruption of services by attempting to control access to a system...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Literature Survey for Decoder Performance Analysis of Relay Based Decode-and-Forward Cooperative Diversity Network

    Performance degradation is an major problem in a relay based Decode-and-Forward (DF) receiving cooperative system. In the DF protocol, existing decoder performances have high decoding complexity, because destination require exact knowledge of the source-relay link along with the channel coefficient of source-destination and relay - destination links. In the proposed...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Quality of Service Optimization in IEEE 802.11e Networks Using Enhanced Distributed Channel Access Technique

    Quality of Service (QoS) is an ability to guarantee a certain level of performance to data flow in a wireless network. IEEE 802.11 a/b/g networks do not provide QoS for multimedia traffic. Where as providing QoS for IEEE802.11e is difficult. EDCA technique enhances the QoS service in IEEE802.11e. Enhanced Distributed...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Datapath Reuse in a Multi-Standard FEC Kernel

    Sharing of datapath and memories across different Forward Error Correction (FEC) decoder implementations are important in flexible wireless communication system design. In this paper, the authors explore datapath reuse possibilities across some important FEC families like convolutional, turbo and Low Density Parity Check (LDPC) codes. At first, design of a...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2012

    Synchronization Techniques in OFDM Systems

    Orthogonal Frequency-Division Multiplexing (OFDM) is a powerful technique for high data-rate transmission over fading channels. OFDM systems have experienced increased attention in recent years and have found applications in a number of diverse areas including telephone-line based links, digital audio and video broadcasting systems, and Wireless Local Area Networks (WLAN)....

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2011

    Security Based Model for Cloud Computing

    The cloud computing is the best way to save money and achieve efficiency which satisfies organizations requirement. But without security embedded into innovative technology that supports cloud computing, businesses are setting themselves up for a fall. The trend of frequently adopting this technology by the organizations automatically introduced new risk...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2011

    Multilayer Security Mechanism in Computer Networks

    In multilayered security infrastructure, the layers are projected in a way that vulnerability of one layer could not compromise the other layers and thus the whole system is not vulnerable. This paper evaluates security mechanism on application, transport and network layers of ISO/OSI reference model and gives examples of today's...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2011

    Quantum Cryptography With Key Distribution in Wireless Networks on Privacy Amplification

    Wireless networks have become one of the most extensively used communication systems in the world. Providing secure communication for wireless networks has become one of the main concerns. Wireless Local Area Networks (WLAN) is more and more popular; increasingly place of work buildings, airports, and other public places are being...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2011

    Security Enhancement & Solution for WPA 2 (Wi-Fi Protected Access 2)

    WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless networks. The Alliance defined the protocol in response to several weaknesses researchers had found in the previous system: Wired Equivalent...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2011

    The Performance Analysis Fiber Optic Dispersion on OFDM-QAM System

    Performance of Orthogonal Frequency Division Multiplexing (OFDM) combined with Quadrature Amplitude Modulation (QAM) has been analyzed in presence of fiber optic dispersion. The influence of dispersion on the OFDM spectrum is investigated with fiber lengths, bit rates, no. of channels and source line-widths. The inter-channel interference occurs due to dispersion-induced...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2011

    A New Era of Infrastructure Hosting Optimization - Cloud Computing

    Cloud computing concept helped organizations to save significant cost savings and providing flexible services for business expansion within a short duration. Cloud technology has several advances when compared with physical hosting of applications. In this paper, the concept of cloud computing, cloud architecture and components, market potential and strategy, application...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2011

    Rate-Based Congestion Control and Reliable Data Dissemination in Wireless Sensor Network

    In Wireless Sensor Networks (WSN), nodes have very limited energy resources, limited processing and memory capabilities. Congestion causes due to the unpredictable nature of traffic load variation, link capacity, fluctuation, topology modification or various types of misbehaviors. Packet losses and retransmissions resulting form congestion causes energy waste, throughput reduction and...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Dec 2011

    Evaluation and Performance Analysis of Propagation Models for WiMAX

    Worldwide Interoperability for Microwave Access (WiMAX) is the latest broadband wireless technology for terrestrial broadcast services in Metropolitan Area Networks (MANs). WiMAX has potential success in its line-of-sight (LOS) and non line-of-sight (NLOS) conditions which operating below 11 GHz frequency. Estimation of path loss is very important in initial deployment...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2012

    An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System

    Peer-to-peer overlay networks are widely used in distributed systems. P2P networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. The objective of this work is to design a hybrid peer-to-peer...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Feb 2012

    Performance Analysis of Cryptographic VLSI Data

    Cryptographic algorithms are more efficiently implemented in custom hardware than in software running on general-purpose processors. The hardware implementation approaches for the AES (Advanced Encryption Standard) Algorithm describes the design and performance testing Rijndael algorithm. Compared to software implementation, hardware implementations provide more physical security as well as higher speed....

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Mar 2012

    Improving the Channel Capacity of Wireless Network Using Cell Sectoring

    The continuous increase in the cellular mobile users in recent times and the associated impairments in the system has been a lot of concerns to both the users and the network operators. Unlike in Global System for Mobile communication (GSM) system where the network is bandwidth limited, the Universal Mobile...

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)

  • White Papers // Mar 2012

    Super Peer Deployment in Unstructured Peer-to-Peer Networks

    Two-layer hierarchy unstructured Peer-To-Peer (P2P) systems, comprising an upper layer of super-peers and an underlying layer of ordinary peers, are commonly used to improve the performance of large-scale P2P systems. However, the optimal super-peer network design involves several requirements including super-peer degree, network diameter, scalability, load balancing, and flooding performance....

    Provided By International Journal of Computer Networks and Wireless Communications (IJCNWC)