IPA Journals

Displaying 1-29 of 29 results

  • White Papers // Jun 2013

    An Analytical Review on Load Balancing Heuristic Approach and Related Issues in Manets

    Ad hoc networks have gained more attention of researchers/ academicians last decades, with the proliferation of mobile processing platforms and small sized wireless equipment. Mobile ad hoc network consists of freely moving nodes responsible of not only forwarding packets for other nodes but also perform computations. Routing in such networks...

    Provided By IPA Journals

  • White Papers // Jun 2013

    A Study of the Impact of Random Waypoint and Vector Mobility Models on Various Routing Protocols in Manet

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without the need for base stations or any other pre-existing network infrastructure. As these nodes need connection to each other to form a dynamic network and to transfer data, link instability needs to...

    Provided By IPA Journals

  • White Papers // Jun 2013

    Inter-Message Causality Satisfying Multicast Protocol for Reducing Gossip Message Redundancy in Geographically Distributed Sensor Networks

    In this paper, the authors present a causally ordered delivery guaranteeing protocol for overlapping multicast groups based on sensor brokers. In the protocol, sensor brokers might lead to make overlapping multicast networks organized by subscriber's interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered...

    Provided By IPA Journals

  • White Papers // Dec 2012

    Data Distortion Approaches for Privacy Preserving in Association Rule Mining

    Huge repositories of data have sensitive information that must be confined against unauthorized access. The safeguard of the privacy of this data has been a long-standing goal for the database security research community. Current advances in data mining algorithms have enhanced the disclosure risks that one may come across when...

    Provided By IPA Journals

  • White Papers // Dec 2012

    Network Lifetime Enhancement in Wireless Sensor Network-A Review paper

    The sensor nodes deployed in wireless sensor networks are extremely power constrained, so maximizing the lifetime of the entire network is mainly the area of research in recent years. Excess extent of energy is dissipated during data transmission to the base station (sink) from normal sensor nodes. Clustering is an...

    Provided By IPA Journals

  • White Papers // Oct 2012

    Wireless Mesh Networks Protocols: State of the Art Review

    Wireless Mesh Network (WMN) is considered as a promising technology and got the attention to be studied lately especially in the area of poor network infrastructure because of its low cost deployment, WMNs are self organized and self-considered, Many ad hoc routing protocols have been adapted to work in WMN...

    Provided By IPA Journals

  • White Papers // Oct 2012

    Architectural Strategies on Cloud Computing

    The term cloud computing refers to the delivery of scalable IT resources over the Internet, as opposed to hosting and operating those resources locally, such as on a college or university network. Those resources can include applications and services, as well as the infrastructure on which they operate. By deploying...

    Provided By IPA Journals

  • White Papers // Aug 2012

    Masking the Data on Cloud

    Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from software processing to storing data, instantly, commitment-free and on-demand. The massive concentrations of resources and data present a more attractive target to attackers; hence the cloud's economies of scale and flexibility are...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Architecting a Secure Enterprise Data Sharing Environment to the Edge

    There are so many methods and implementations for developing a secured communication with the users that the authors' located within the security domain. Now-a-days as technologies and number of users is increasing day-by-day they need to provide high secure for each and every new established connection. But the problem arises...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Review of Deadlock Free Dynamic Reconfiguration in High-Speed LANS

    The performance of the computer has increased in recent years, so the communication subsystems have become the main problem within the system. So, the switch based interconnection networks are used in the current high performance systems to solve this problem. To solve this problem, whenever the topological change occurs, the...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Comparative Performance Evaluation of Various QoS Parameter in Wireless Ad Hoc Network of Reactive and Proactive Protocols

    All the protocols reported are constantly being updated and improved by IETF. As a result, a comprehensive performance evaluation is essential of ad-hoc routing protocols. Keeping this in mind, the authors have analyzed a comparative performance evaluation for all available metrics for recently reported reactive protocols (AODV & DSR) and...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Blocking of Mischievous Users in Anonymizing Networks Using Nymble System

    There are some networks called "Anonymizing networks" which allow users to gain access to internet services without revealing their identity (IP-addresses) to the servers. Networks such as "Tor (The Onion Router)","Crowds" and "I2P" gained popularity in the years 2002-2007, but the success of such networks however has been limited by...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Mobile Number Portability in India

    In this paper, the authors examines the consequences of introducing Mobile Number Portability (MNP) throughout India. Mobile number portability allows a mobile subscriber to switch operators without changing his/her phone number. As MNP allows consumers to keep their telephone number when switching providers, it reduces consumers' switching costs. Even though...

    Provided By IPA Journals

  • White Papers // Jul 2012

    LDPC Code based Varying Data Rate Communication Systems with Improved OFDM-MIMO Technology

    The rapid evolution of global mobile communication demands high data rate transmission via satellites, which in turn requires spectrally efficient modulation technique and power efficient forward-error correction, schemes. The main objective of any communication system is error free transmission with maximum possible data rate. Noisy communication channels are the major...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Comparison of AODV, OLSR and ZRP in Mobile Ad-Hoc Network on the Basis of Jitter

    Mobile Ad-hoc networks are rapidly deployable and self-configuring networks. There is no need for existing infrastructure. These are wireless links. In this network nodes are mobile, topology can be very dynamic. Here the nodes must be able to relay traffic since communicating nodes might be out of range. A MANET...

    Provided By IPA Journals

  • White Papers // Apr 2012

    Evaluation of Routing Protocols in the Integrated MANET Internet Scenario

    In this paper the authors had integrated wired and wireless network particularly MANET using stationary gateway through which mobile nodes can communicate with the wired nodes or they can say fixed nodes in internet. Gateways operate as a bridge between MANET and wired nodes. Due to the dynamic topology, routing...

    Provided By IPA Journals

  • White Papers // Apr 2012

    An Overview on Cloud Computing Technology

    Cloud computing is a technology of computing in which internet and central remote servers are provided "As a service" to users. This paper describes cloud computing model where users access virtual shared server on payment as per usage. Cloud Providers offer services that can be grouped into three categories termed...

    Provided By IPA Journals

  • White Papers // Apr 2012

    Power Management Techniques in Wireless Sensor Network

    In Wireless Sensor Networks (WSN) energy is a limited resource. So, to increase the life time of wireless sensor networks the authors have to reduce the power consumption of sensor networks. WSN consists of hundreds or thousands of nodes, which doesn't have any infrastructure. When designing a distributed wireless sensor...

    Provided By IPA Journals

  • White Papers // Apr 2012

    SER Analysis Based on Different Modulation Techniques in MIMO System

    Physical limitations of the wireless medium create a technical challenge for reliable wireless communication. Moreover, the need for high-speed wireless Internet has led to the demand for technologies delivering higher capacities and link reliability than achieved by current systems. Multiple -Input Multiple-Output (MIMO) based communication systems are capable accomplishing these...

    Provided By IPA Journals

  • White Papers // Apr 2012

    Angled-Leach in Wireless Sensor Networks

    The need for efficient energy utilization, scalability and load balancing has increased the interest in wireless sensor networks. WSNs are being widely used all over the world in many applications such as weather monitoring, combat field reconnaissance, intrusion detection, disaster management, traffic monitoring, etc. The clustering algorithms aim to prolong...

    Provided By IPA Journals

  • White Papers // Apr 2012

    A survey on clustering protocols in Wireless Sensor Networks

    Wireless sensor Networks has gained major attention from most of the recent research community. The crucial role of efficient energy management of sensor nodes is emphasized by lesser life time and capacity of the sensor nodes. Clustering is one of those ways of efficiently balancing the load on the sensor...

    Provided By IPA Journals

  • White Papers // Apr 2012

    A review on WiMAX Technology

    The improvement in broadband and mobile communication technology provides good quality of services in voice and multimedia applications with high speed data connectivity, robust security and mobility. WiMAX (Worldwide Interoperability for Microwave Access) is a latest development and considered as a 4G (Fourth Generation) technology. It provides broadband and IP...

    Provided By IPA Journals

  • White Papers // Apr 2012

    Capacity and delay analysis in Passive Optical Networks (PONs) - A review

    The dramatic increase of internet users and development of new high volume internet applications has a profound impact on design of Next Generation Passive Optical Network (NG-PON). Today, most of the available networks are quite busy networks and as the number of nodes increases in the network, the communication over...

    Provided By IPA Journals

  • White Papers // Feb 2012

    Mobile Agent Based Distributed Network Management Models: A Review

    Modern day telecommunication industry is facing ever increasing demand for more sophisticated services, higher quality and shorter times to market. Network operators and service providers in the telecommunications industry must meet these demands at a commercially viable cost and should have plans in place for any unforeseen change. Current management...

    Provided By IPA Journals

  • White Papers // Feb 2012

    Performance Evaluation Of Aodv, Dsr, Dsdv Mobile Ad-Hoc Protocols On Different Scenarios: An Analytical Review

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point or administration. MANET protocols have to face high challenges due to dynamically changing topologies, low transmission power and asymmetric links of network. A suitable and effective routing mechanism...

    Provided By IPA Journals

  • White Papers // Feb 2012

    A Review on Different Routing Protocols in Ad-Hoc Network

    This paper presents the review on different routing protocols for ad hoc wireless networks. This will provide merits and demerits of routing protocol which used in ad hoc wireless network. In this the authors also discuss about new routing protocol based on the Swarm Based Intelligence. The motivation for using...

    Provided By IPA Journals

  • White Papers // Feb 2012

    A Secure Zone-Based Routing Protocol For Mobile Ad Hoc Networks

    Routing protocols for mobile ad-hoc networks have to face the challenge of frequently changing topology, low transmission power and asymmetric links. Both proactive and reactive routing protocols prove to be inefficient under these circumstances. The Secure Zone Routing Protocol (SZRP) combines the advantages of the proactive and reactive approaches by...

    Provided By IPA Journals

  • White Papers // Feb 2012

    Peer to Peer Networks: A Review

    A client server setup has servers, which are dedicated machines that perform specific functions in the network. A server can be used to manage a network's email, database, files, printers, or access an anti-virus. In a client server setup, each component has a designated function in the network. One server...

    Provided By IPA Journals

  • White Papers // Feb 2012

    Web Mining Security: A Survey

    Mining information and knowledge from large databases/Web is always a key research area in database systems with an opportunity of major revenues. Several emerging applications in information providing services call various data mining techniques to easily interact with user, to improve the service provided but very few of them thought...

    Provided By IPA Journals

  • White Papers // Jun 2013

    An Analytical Review on Load Balancing Heuristic Approach and Related Issues in Manets

    Ad hoc networks have gained more attention of researchers/ academicians last decades, with the proliferation of mobile processing platforms and small sized wireless equipment. Mobile ad hoc network consists of freely moving nodes responsible of not only forwarding packets for other nodes but also perform computations. Routing in such networks...

    Provided By IPA Journals

  • White Papers // Dec 2012

    Data Distortion Approaches for Privacy Preserving in Association Rule Mining

    Huge repositories of data have sensitive information that must be confined against unauthorized access. The safeguard of the privacy of this data has been a long-standing goal for the database security research community. Current advances in data mining algorithms have enhanced the disclosure risks that one may come across when...

    Provided By IPA Journals

  • White Papers // Jun 2013

    A Study of the Impact of Random Waypoint and Vector Mobility Models on Various Routing Protocols in Manet

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without the need for base stations or any other pre-existing network infrastructure. As these nodes need connection to each other to form a dynamic network and to transfer data, link instability needs to...

    Provided By IPA Journals

  • White Papers // Jun 2013

    Inter-Message Causality Satisfying Multicast Protocol for Reducing Gossip Message Redundancy in Geographically Distributed Sensor Networks

    In this paper, the authors present a causally ordered delivery guaranteeing protocol for overlapping multicast groups based on sensor brokers. In the protocol, sensor brokers might lead to make overlapping multicast networks organized by subscriber's interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered...

    Provided By IPA Journals

  • White Papers // Dec 2012

    Network Lifetime Enhancement in Wireless Sensor Network-A Review paper

    The sensor nodes deployed in wireless sensor networks are extremely power constrained, so maximizing the lifetime of the entire network is mainly the area of research in recent years. Excess extent of energy is dissipated during data transmission to the base station (sink) from normal sensor nodes. Clustering is an...

    Provided By IPA Journals

  • White Papers // Oct 2012

    Wireless Mesh Networks Protocols: State of the Art Review

    Wireless Mesh Network (WMN) is considered as a promising technology and got the attention to be studied lately especially in the area of poor network infrastructure because of its low cost deployment, WMNs are self organized and self-considered, Many ad hoc routing protocols have been adapted to work in WMN...

    Provided By IPA Journals

  • White Papers // Oct 2012

    Architectural Strategies on Cloud Computing

    The term cloud computing refers to the delivery of scalable IT resources over the Internet, as opposed to hosting and operating those resources locally, such as on a college or university network. Those resources can include applications and services, as well as the infrastructure on which they operate. By deploying...

    Provided By IPA Journals

  • White Papers // Aug 2012

    Masking the Data on Cloud

    Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from software processing to storing data, instantly, commitment-free and on-demand. The massive concentrations of resources and data present a more attractive target to attackers; hence the cloud's economies of scale and flexibility are...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Review of Deadlock Free Dynamic Reconfiguration in High-Speed LANS

    The performance of the computer has increased in recent years, so the communication subsystems have become the main problem within the system. So, the switch based interconnection networks are used in the current high performance systems to solve this problem. To solve this problem, whenever the topological change occurs, the...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Comparative Performance Evaluation of Various QoS Parameter in Wireless Ad Hoc Network of Reactive and Proactive Protocols

    All the protocols reported are constantly being updated and improved by IETF. As a result, a comprehensive performance evaluation is essential of ad-hoc routing protocols. Keeping this in mind, the authors have analyzed a comparative performance evaluation for all available metrics for recently reported reactive protocols (AODV & DSR) and...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Blocking of Mischievous Users in Anonymizing Networks Using Nymble System

    There are some networks called "Anonymizing networks" which allow users to gain access to internet services without revealing their identity (IP-addresses) to the servers. Networks such as "Tor (The Onion Router)","Crowds" and "I2P" gained popularity in the years 2002-2007, but the success of such networks however has been limited by...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Mobile Number Portability in India

    In this paper, the authors examines the consequences of introducing Mobile Number Portability (MNP) throughout India. Mobile number portability allows a mobile subscriber to switch operators without changing his/her phone number. As MNP allows consumers to keep their telephone number when switching providers, it reduces consumers' switching costs. Even though...

    Provided By IPA Journals

  • White Papers // Jul 2012

    LDPC Code based Varying Data Rate Communication Systems with Improved OFDM-MIMO Technology

    The rapid evolution of global mobile communication demands high data rate transmission via satellites, which in turn requires spectrally efficient modulation technique and power efficient forward-error correction, schemes. The main objective of any communication system is error free transmission with maximum possible data rate. Noisy communication channels are the major...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Comparison of AODV, OLSR and ZRP in Mobile Ad-Hoc Network on the Basis of Jitter

    Mobile Ad-hoc networks are rapidly deployable and self-configuring networks. There is no need for existing infrastructure. These are wireless links. In this network nodes are mobile, topology can be very dynamic. Here the nodes must be able to relay traffic since communicating nodes might be out of range. A MANET...

    Provided By IPA Journals

  • White Papers // Apr 2012

    SER Analysis Based on Different Modulation Techniques in MIMO System

    Physical limitations of the wireless medium create a technical challenge for reliable wireless communication. Moreover, the need for high-speed wireless Internet has led to the demand for technologies delivering higher capacities and link reliability than achieved by current systems. Multiple -Input Multiple-Output (MIMO) based communication systems are capable accomplishing these...

    Provided By IPA Journals

  • White Papers // Apr 2012

    Angled-Leach in Wireless Sensor Networks

    The need for efficient energy utilization, scalability and load balancing has increased the interest in wireless sensor networks. WSNs are being widely used all over the world in many applications such as weather monitoring, combat field reconnaissance, intrusion detection, disaster management, traffic monitoring, etc. The clustering algorithms aim to prolong...

    Provided By IPA Journals

  • White Papers // Apr 2012

    A survey on clustering protocols in Wireless Sensor Networks

    Wireless sensor Networks has gained major attention from most of the recent research community. The crucial role of efficient energy management of sensor nodes is emphasized by lesser life time and capacity of the sensor nodes. Clustering is one of those ways of efficiently balancing the load on the sensor...

    Provided By IPA Journals

  • White Papers // Apr 2012

    A review on WiMAX Technology

    The improvement in broadband and mobile communication technology provides good quality of services in voice and multimedia applications with high speed data connectivity, robust security and mobility. WiMAX (Worldwide Interoperability for Microwave Access) is a latest development and considered as a 4G (Fourth Generation) technology. It provides broadband and IP...

    Provided By IPA Journals

  • White Papers // Apr 2012

    Capacity and delay analysis in Passive Optical Networks (PONs) - A review

    The dramatic increase of internet users and development of new high volume internet applications has a profound impact on design of Next Generation Passive Optical Network (NG-PON). Today, most of the available networks are quite busy networks and as the number of nodes increases in the network, the communication over...

    Provided By IPA Journals

  • White Papers // Apr 2012

    Evaluation of Routing Protocols in the Integrated MANET Internet Scenario

    In this paper the authors had integrated wired and wireless network particularly MANET using stationary gateway through which mobile nodes can communicate with the wired nodes or they can say fixed nodes in internet. Gateways operate as a bridge between MANET and wired nodes. Due to the dynamic topology, routing...

    Provided By IPA Journals

  • White Papers // Apr 2012

    An Overview on Cloud Computing Technology

    Cloud computing is a technology of computing in which internet and central remote servers are provided "As a service" to users. This paper describes cloud computing model where users access virtual shared server on payment as per usage. Cloud Providers offer services that can be grouped into three categories termed...

    Provided By IPA Journals

  • White Papers // Apr 2012

    Power Management Techniques in Wireless Sensor Network

    In Wireless Sensor Networks (WSN) energy is a limited resource. So, to increase the life time of wireless sensor networks the authors have to reduce the power consumption of sensor networks. WSN consists of hundreds or thousands of nodes, which doesn't have any infrastructure. When designing a distributed wireless sensor...

    Provided By IPA Journals

  • White Papers // Feb 2012

    Mobile Agent Based Distributed Network Management Models: A Review

    Modern day telecommunication industry is facing ever increasing demand for more sophisticated services, higher quality and shorter times to market. Network operators and service providers in the telecommunications industry must meet these demands at a commercially viable cost and should have plans in place for any unforeseen change. Current management...

    Provided By IPA Journals

  • White Papers // Feb 2012

    Performance Evaluation Of Aodv, Dsr, Dsdv Mobile Ad-Hoc Protocols On Different Scenarios: An Analytical Review

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point or administration. MANET protocols have to face high challenges due to dynamically changing topologies, low transmission power and asymmetric links of network. A suitable and effective routing mechanism...

    Provided By IPA Journals

  • White Papers // Feb 2012

    A Review on Different Routing Protocols in Ad-Hoc Network

    This paper presents the review on different routing protocols for ad hoc wireless networks. This will provide merits and demerits of routing protocol which used in ad hoc wireless network. In this the authors also discuss about new routing protocol based on the Swarm Based Intelligence. The motivation for using...

    Provided By IPA Journals

  • White Papers // Feb 2012

    A Secure Zone-Based Routing Protocol For Mobile Ad Hoc Networks

    Routing protocols for mobile ad-hoc networks have to face the challenge of frequently changing topology, low transmission power and asymmetric links. Both proactive and reactive routing protocols prove to be inefficient under these circumstances. The Secure Zone Routing Protocol (SZRP) combines the advantages of the proactive and reactive approaches by...

    Provided By IPA Journals

  • White Papers // Feb 2012

    Peer to Peer Networks: A Review

    A client server setup has servers, which are dedicated machines that perform specific functions in the network. A server can be used to manage a network's email, database, files, printers, or access an anti-virus. In a client server setup, each component has a designated function in the network. One server...

    Provided By IPA Journals

  • White Papers // Jul 2012

    Architecting a Secure Enterprise Data Sharing Environment to the Edge

    There are so many methods and implementations for developing a secured communication with the users that the authors' located within the security domain. Now-a-days as technologies and number of users is increasing day-by-day they need to provide high secure for each and every new established connection. But the problem arises...

    Provided By IPA Journals

  • White Papers // Feb 2012

    Web Mining Security: A Survey

    Mining information and knowledge from large databases/Web is always a key research area in database systems with an opportunity of major revenues. Several emerging applications in information providing services call various data mining techniques to easily interact with user, to improve the service provided but very few of them thought...

    Provided By IPA Journals