Kurukshetra University

Displaying 1-40 of 466 results

  • White Papers // Sep 2014

    Study of Cross-Site Scripting Attacks and Their Countermeasures

    In present-day time, most of the associations are making use of web services for improved services to their clients. With the upturn in count of web users, there is a considerable hike in the web attacks. Thus, security becomes the dominant matter in web applications. The disparate kind of vulnerabilities...

    Provided By Kurukshetra University

  • White Papers // Jan 2014

    Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach

    Today every security expert worries about the security problems and tries to find out the secure solution. Because it is a challenging aspect of communications today which touches many spheres including memory space, processing speed, code development and maintenance issues? The problem, exaggerated when it comes to dealing with lightweight...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Analysis of ANSN Attack on OLSR Based MANETs

    A MANET is a multi-hop ad-hoc wireless network where nodes can move arbitrary in the topology. The network has no given infrastructure and can be set up quickly in any environment. The Optimized Link State Routing (OLSR) protocol is a route management protocols for such mobile ad hoc networks. This...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Securing E-Commerce

    E-commerce provides an important medium for doing business on global based. E-commerce is the electronic automation of business process. E-commerce has become a critical component in any business competitive strategy. Organizations are gaining opportunities and benefits such as global presence and improved competitiveness from web-based e-commerce. In this paper, the...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Information Security in Grid Computing

    The spread of worldwide networks and the technological trend arc feeding the progress of network and distributed computing in different directions (grid, cloud, autonomic, ubiquitous, pervasive, volunteer, etc). With regard to information, great amount of data widely (geographically) spread over the network require adequate management, to ensure availability for authorized...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Risk Management in Information Security System

    In information security system there are always some cases which come up with some risks. To handle the risks there must be risk management in information security system. An appropriate risk management process is an extremely critical component of a successful information security program. The main objective of an organization's...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Big Data Analytics Using Hadoop Components Like Pig and Hive

    In big data world, Hadoop Distributed File System (HDFS) is very popular. It provides a framework for storing data in a distributed environment and also has set of tools to retrieve and process. These data set using map-reduce concept. In this paper, a thorough research has been carried to discuss...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Wavelet Based Fingerprint Authentication System

    Fingerprint biometric is very useful in application which requires identity to be claimed. It plays a very important role in forensic applications like criminal investigations, terrorist identification and National security issues. Wavelet analysis and its applications to fingerprint verification is one of the fast growing areas for research in recent...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    A Novel Bayesian Approach Against Phishing Attacks Based on Textual and Visual Content

    Phishing attacks are a major concern for preserving internet users' privacy. By combining social engineering and website forgery techniques, phishing attacks spoof the identity of a company (typically a bank or an auction site), to trick Internet users to reveal confidential information. The perfect phishing attack creates a website very...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Improving the Performance of IDS Using Genetic Algorithm

    Intrusion Detection System (IDS) aim to detect computer attacks and/or computer misuse, and to alert the proper individuals upon detection. The growing number of Internet threats increasingly inspires the need of applying a defense in depth concepts to protect worldwide computer system from being intruded for grabbing information. The authors...

    Provided By Kurukshetra University

  • White Papers // Jul 2013

    Potential Covert Channel in Distributed Database

    In today's environment. There is need of distributed database in communication. This paper provides a faster access and remove delays throughout the system .the paper will examine the features of distributed database architecture. The learning of distributed database management system will lead them for successful design. The design will improve...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Mining of Web Server Logs Using Extended Apriori Algorithm

    Association rule mining is one of the most significant techniques in the field of data mining. It is very useful in discovering relationships hidden in large transaction datasets such as frequent patterns, associations etc. One of the popular and important algorithms in this category is Apriori algorithm which finds frequent...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Highly Available XenApp Cloud

    In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced application and desktop computing costs and provided greater IT and user flexibility compared to traditional application and desktop management models. Among the various SaaS technologies, XenApp that allow numerous end users to connect to their...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Acceptability of Fingerprint as Biometric Traits

    Biometric recognition or, simply, biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is possible to confirm or establish an individual's identity based on \"Who the user is,\" rather than by \"What the users' possesses\" (e.g., an ID card). Among...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Performance of Flow Based Intrusion Detection System Over Traditional Intrusion Detection in High Speed Network

    The vast growth of 1-10Gbps network technology in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services. As users, the authors depend on the Internet in the people daily life for simple tasks such as checking emails, but also for managing private and financial information....

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    A Survey on Security Challenges of Cloud Computing

    Cloud computing has revolutionized the industry because of its benefits like on-demand services, scalability, elasticity, minimization of capital expenditure, etc. It is not a new concept but a fusion of distributed computing, grid computing, parallel computing and so on. It attracts the small enterprises as it eliminates the requirements for...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Multi Packed Security Addressing Challenges in Cloud Computing

    Cloud computing efficiency, flexibility, greater agility, less capital expenditure is to overcome geographic limitations to compete in a global market. Most of the companies are shifting to Cloud based services, but at the same time they are concerned about the security risks. Hopefully after the definitions and illustrations of Cloud...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Cloud Computing: Performance Implications and Challenges

    Cloud computing is a new paradigm in the field of distributed computing. The objective of cloud computing is to provide various computing resources over the internet in the form of service to number of cloud consumers. Cloud provides the computing environment to organization in a cost effective manner and give...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Information Management Security in Multiple Networks for Development of Business and E-Commerce

    In this paper, the authors will discuss about Internet which has become the information super highway. The evolving Internet and its related technologies have allowed businesses to communicate in new and strategic ways with various types of people and organizations. Over the years, there have been additions of feature upon...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Detection and Prevention of Wormhole Attack in MANET: A Review

    Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc NETwork (MANET) is an infrastructure less self-configured collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. Security has become a primary...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Survey of Network Intrusion Detection Using K-Mean Algorithm

    Intrusion Detection System (IDS) due to novel attack method or upgraded. Because many current IDSs are constructing by point instruction of professional knowledge, changes to IDSs are costly and slow. Intrusion detection techniques can be categorizes into irregularity detection and mistreats detection. Anomaly detection systems, for example, IDES Intrusion Detection...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Spoof Attack Detection in Fingerprint Authentication Using Hybrid Fusion

    In the modern era, with the growing need of biometric technologies, spoof attacks are becoming a serious concern. A number of solutions have been proposed to detect the use of fake fingerprints. This paper takes advantage of skin elements in fingerprints, namely: minutiae points and ridge bifurcations to investigate spoof...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Enhanced Inter-Cloud System Architecture

    Cloud computing gains tremendous importance in the recent past, understanding low-level implications of the cloud infrastructure becomes necessary provided with all the infrastructure facilities that a cloud user needs. But as the no of organizations adopting cloud system increases, the services providers need to ensure availability of various services, infrastructure...

    Provided By Kurukshetra University

  • White Papers // Feb 2013

    Wormhole Attack Detection and Prevention Technique in Mobile Ad Hoc Networks: A Review

    MANET (Mobile Ad-hoc NETwork) refers to a multi-hop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time, without using any kind of fixed wired infrastructure. MANET'S are actually self organizing and adaptive networks that can be formed and deformed...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    A Comprehensive Study of Latest Security Models for MANETs: Covering Intrusion Detection and Denial of Service Attacks

    Mobile Ad-hoc NETworks (MANETs) are self organizing devices with no infrastructure control. Concept of security is major concern because of changing topology and no centralized control. Since MANET's are prone to many kind of vulnerabilities it is not necessary that any one kind of attack may be active at a...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    Wireless Sensor Networks: Architecture, Protocols

    Wireless Sensor Networks (WSN) is an interconnection of a large number of nodes deployed for monitoring the system by means of measurement of its parameters. Recent research in wireless sensor networks has led to various new protocols which are particularly designed for sensor networks. To design these networks, the factors...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    Analysis of Security Criteria for Partner Network

    The authors are allowing people outside their organization access to proprietary data and applications - over the internet. The objectives of this research are to form a secured infrastructure between partner network and internet. In today's competitive business landscape, organizations are compelled to share data, files, and applications with external...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    The Study of Multimedia Data Model Technology Based on Cloud Computing

    Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. Cloud computing is an emerging computing paradigm in which resources...

    Provided By Kurukshetra University

  • White Papers // Nov 2012

    A Novel Parallel Domain Focused Crawler for Reduction in Load on the Network

    World Wide Web is a collection of hyperlinked documents available in HTML format. Due to the growing and dynamic nature of the web, it has become a challenge to traverse all the URLs available in the web documents. The list of URL is very huge and so it is difficult...

    Provided By Kurukshetra University

  • White Papers // Oct 2012

    Effect of Malicious Nodes on AODV in Mobile Ad Hoc Networks

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. As mobile ad hoc network applications are deployed, Routing is one of the central requirements. Due to non central control, security is the major issue in...

    Provided By Kurukshetra University

  • White Papers // Aug 2012

    Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN

    Recent years have shown an unprecedented growth in the use of wireless LANs. However, unlike the relative simplicity of wired Ethernet deployments, IEEE 802.11-based wireless LANs uses Radio-Frequency (RF) data which is vulnerable to various attacks. This paper analyzes the IEEE 802.11b wireless LANs to determine variations in throughput so...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Cloud Computing Security and Privacy Concerns

    In last few years, cloud computing concept has groomed a lot which result that it has become the fastest growing business for the IT industry. Because it has became a promising business concept with win-win situation for the clients to shift. Now, recession-hit companies have acknowledged that simply by shifting...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    GLAAR: Geographic Location Aware Adaptive Routing in Mobile Ad Hoc Networks (MANETs)

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring, wireless, low range/power, mobile infrastructure less network where each participating node itself manages the communication over the network. Node Location information may reduce the overall communication overhead for packet forwarding in Mobile Ad-Hoc NETworks (MANETs). This paper proposes a novel Geographic Location...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Framework for Enhancing Security and Performance in Multi-Tenant Applications

    The ability to scale a web application or website is tied directly to understanding where the resource constraints lie and what impact the addition of various resources has on the application. Unfortunately, architects more often than not assume that simply adding another server into the mix can fix any performance...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Implementation of Public Key Cryptographic System: RSA

    In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA system generally belongs to the category of PKCS. RSA encryption is one of the public-key methods that have been...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Security Issues of Banking Adopting the Application of Cloud Computing

    Cloud computing has become the most emerging technology now a days. It increases the flexibility scalability over internet. Every field wants to do work with the help of cloud computing because it provides promising business idea to the fastest growing areas of the information technology. One of the fields that...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Text Mining: How to Mining Knowledge From Text

    An important approach to text mining involves the use of natural-language information extraction. Information Extraction (IE) distills structured data or knowledge from un-structured text by identifying references to named entities as well as stated relationships between such entities. IE systems can be used to directly extricate abstract knowledge from a...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A 3-Tier Heterogeneous Secure Routing Protocol for Wireless Sensor Network

    Security is very critical parameter in sensor networks. Securing the WSN needs to make the network support every security property. Security attack is a concern for wireless sensor networks because of usage of very low capacity devices in the systems and physical accessibility to sensor nodes. Therefore to prevent confidential...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Fuzzy Model for Object Oriented Testability & Its Performance

    For large software systems, the testing phase tends to have comparatively much higher cost than all the previous life-cycle phases taken together, obviously resulting in much more efforts. A good measure of software testability can help better manage the testing phase effort. This paper proposes a fuzzy model for measurement...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Novel Approach for Software Inspection

    Michael Fagan introduced the software inspection process in the early 1970s. The Fagan inspection method, a formalization of review process is based on the application of process management techniques to software development. In this paper, the authors discuss techniques based on strongest post-condition predicates transformer (sp). They identify problems with...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Analyzing WLANs Standards for Wireless Sensor Network

    Wireless sensor network is a special kind of wireless network, design to communicate with distributes wireless nodes (Which supplies the information). Data collection from leaf sensor node to the central node for manipulation and prepare into information in useful format to the next observer node. Wireless sensor network may adopt...

    Provided By Kurukshetra University

  • White Papers // Feb 2010

    A New Optimal Approach for Evaluating the Size of BDD for Calculating the Reliability of a CCN

    Network reliability analysis receives considerable attention for the design, validation, and maintenance of many real world systems, such as computer, communication, or power networks. The components of a network are subject to random failures, as more and more enterprises become dependent upon CCN or networked computing applications. Failure of a...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    A Novel Mobile Crawler System Based on Filtering Off Non-Modified Pages for Reducing Load on the Network

    The studies in the literature show that about 40% of the current Internet traffic and bandwidth consumption is due to web crawlers that retrieve pages for indexing by the different search engines. This traffic and bandwidth consumption will increase in future due to the exponential growth of the web. This...

    Provided By Kurukshetra University

  • White Papers // Sep 2010

    Design and Performance Analysis of Coordinated Checkpointing Algorithms for Distributed Mobile Systems

    Checkpointing is an efficient fault tolerance technique used in distributed systems. Mobile computing raises many new issues, such as high mobility, lack of stable storage on Mobile Hosts (MHs), low bandwidth of wireless channels, limited battery life and disconnections that make the traditional checkpointing protocols unsuitable for such systems. Several...

    Provided By Kurukshetra University

  • White Papers // Sep 2010

    Network Reliability Computation by Using Different Binary Decision Diagrams

    In this Paper the authors consider three different types of variable ordering; namely optimal ordering, good ordering and bad ordering for constructing the BDD of a given network by applying three different heuristics. This classification is based on the size of the BDD, because the size of the BDD strongly...

    Provided By Kurukshetra University

  • White Papers // Sep 2009

    Design of Simulator for Reliability Estimation of Component Based Software System

    This is the age of Rapid Application Development (RAD). To achieve the goal of RAD, Component Based Software Development (CBSD) can be of great help. Here Commercial-Off-The-Shelf (COTS) components are deployed together to make a larger application. These components are designed and developed independent of each other and independent of...

    Provided By Kurukshetra University

  • White Papers // Nov 2010

    SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks-wormhole attack, byzantine attack and blackhole attack. SD-AODV...

    Provided By Kurukshetra University

  • White Papers // Jan 2010

    Node Disjoint Multipath Routing Considering Link and Node Stability Protocol: A Characteristic Evaluation

    Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths...

    Provided By Kurukshetra University

  • White Papers // May 2011

    Making Ad Hoc Network Stable, Secured and Energy Efficient

    Mobile Ad hoc networking is a challenging task due to the lack of resources in the network as well as the frequent changes in the network topology. Although lots of research has been done on supporting QoS in the Internet and other networks, they are not suitable for mobile Ad...

    Provided By Kurukshetra University

  • White Papers // Nov 2009

    Quality of Service Routing in Mobile Ad Hoc Networks Considering Lifetime and Energy Predictions With Traffic Distribution

    Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths...

    Provided By Kurukshetra University

  • White Papers // May 2011

    A Multi-Layer Real Time Remote Monitoring & Corporate Network System for Virulent Threats

    Corporations face a dangerous threat that existing security technologies do not adequately address, which includes malware, trackware and adware, describes any program that may track online and/or offline PC activity and locally saves or transmits those findings to third parties without user's knowledge or consent. The same activities that make...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Circular Patch Antenna With Enhanced Bandwidth Using Narrow Rectangular Slit for Wi-Max Application

    Since the inception of microstrip patch antenna constant efforts are being made to modify the overall performance of this class of antenna field. Although the microstrip antenna has some of shortcoming till this date such as low gain, narrow operating bandwidth, poor radiation efficiency, yet it has been one the...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    A Survey on Congestion Control in Wireless Sensor Networks

    In Recent years, wireless sensor network plays a vital role in various fields. A Wireless Sensor Network is deployed with large number of sensor nodes. These sensor nodes acquire real time information and transmit the information. When large number of sensor nodes are active in transmitting the information there is...

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    Handoff Process In Mobile WiMAX Networks

    In the present scenario, new and fast emerging technologies are taking place in the field of wireless networks. These technologies allow high speed broadband wireless access. Mobile WiMAX (Worldwide Interoperability for Microwave Access) based on 802.16e-2005 supports 4G, is an advanced next generation mobile broadband wireless network. IEEE 802.16e -2005...

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    Cost Function Evaluation of Routing Protocols in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) basically are community networks by considering cost effective routing for the new generation wireless communication. WMNs are undergoing swift progress and stimulating several applications. Still, any solo type of wireless network routing is unable to provide all types of most favorable services. For more broad results,...

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    Performance Enhancement in Mobile Computing Using Replicated Cache Agent

    With the rapid advances of wireless communications and portable computing devices, a new computing paradigm which is called "Mobile computing" has evolved. In mobile computing environment, users carrying portable devices have access to data and information services regardless of their physical location or movement behaviour. Wireless LANs (WLANs); allow greater...

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    Performance Comparison Study of AODV, OLSR and TORA Routing Protocols for MANETS

    Mobile Ad hoc NETworks (MANETs) are the special type of wireless network, where mobile nodes are connected through wireless interfaces forming a temporary network. They don't need fixed infrastructure. Due to higher mobility in nodes and dynamic infrastructure of MANETS, Routing is important issue in ad hoc networks. There are...

    Provided By Kurukshetra University

  • White Papers // Nov 2012

    A Novel Parallel Domain Focused Crawler for Reduction in Load on the Network

    World Wide Web is a collection of hyperlinked documents available in HTML format. Due to the growing and dynamic nature of the web, it has become a challenge to traverse all the URLs available in the web documents. The list of URL is very huge and so it is difficult...

    Provided By Kurukshetra University

  • White Papers // Dec 2009

    An Efficient and Secured Data Gathering Using Data Aggregation Technique in Wireless Sensor Network

    In Wireless Sensor Network (WSN) security issue, data confidentiality, integrity, and elimination of data redundancy becomes vital, when the sensor network is deployed in a hostile environment. In this hostile environment there is requirement of efficient and secured data gathering of sensed data and forward that data to the required...

    Provided By Kurukshetra University

  • White Papers // Sep 2011

    A Comprehensive Study of Adverse Effect of Malicious Attacks on End-to-End Delay in Mobile Ad-Hoc Networks Carrying Packet Telephony

    Like any other wireless network, mobile ad-hoc networks are highly vulnerable to security threats coming from various intruders. Attacks launched by nodes that are part of the network, have attracted attention of research fraternity. A malicious node may work in a manner to increase the transfer delay and hence disrupt...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Two-Stage Algorithm for Subcarrier, Bit and Power Allocation in OFDMA Systems

    Orthogonal Frequency Division Multiple Access (OFDMA) is considered as a modulation and multiple access method for fourth generation wireless networks. This scheme tries to minimize the required transmit power while satisfying the rate requirement and data error rate constraint of each user. It is based on the assumption of knowing...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Wireless Sensor Network for Coastal Erosion: A National Perspective

    Wireless Sensor Networks (WSNs) are one of the research areas in 21st century, which provide platform to scientists with the capability of developing real-time monitoring systems. This paper discusses the development of a WSN to detect coastal erosions, which includes the design, development and implementation of a WSN for real...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    A Comparative Study of Application Portability With Virtualization Softwares

    Virtualization is a proven software technology that is rapidly transforming the IT landscape and fundamentally changing the way that people compute. Different virtual machines can run different operating systems and multiple applications on the same physical computer. Virtualization is a framework or methodology of dividing the resources of a computer...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Design and Implementation of Probe Fed Equilateral Triangular Patch Microstrip Antenna for Wireless Communications

    The patch of the microstrip antennas can have different geometries such as rectangular, circular, elliptic, squares and triangular. The present paper is about design and fabrication of triangular microstrip antenna. The S is investigated and optimization is performed by varying the feed position and substrate dielectric constant. The ETMA has...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Impact of Relay Nodes on Vehicular Delay Tolerant Network

    Vehicular Delay Tolerant Networks (VDTNs) are networks in which no simultaneous end-to-end path exists. Typically, message delivery experiences long delays due to the disconnected nature of the network. In this type of network the authors' main goal is to deliver the messages to the destination. In this paper, they use...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Fuzzy Based Congestion Control in Wireless Network

    The tremendous growth of wireless networks demands the need to meet different multimedia (such as voice, audio, video, data, etc) applications available over the network. This application demand and allocation could lead to congestion if the network has to maintain such high resources for the quality of service requirements of...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Wi-Fi(802.11) Security Issues and Its Solution

    802.11 wireless LANs continue to gain market momentum. Higher speeds, larger bandwidth and improved quality of service are helping businesses realize the potential business benefits that wireless networking delivers. Now, with this growing adoption of 802.11 wireless LANs, security has become a focal point regarding the decision to deploy a...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Investigation on Throughput of a Multi Hop Network With Identical Station for Random Failure

    In Multi-hop networks stations may pump more traffic into the networks that can be supported, resulting in high packet-loss rate, re-routing instability unfairness and random failures problems due to this effect system efficiency. In this paper formulae has been used for numerical simulation from, by using this formulae, the authors...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Performance Evaluation and Simulation Based Modeling of Energy Aware Variable Range DSR (VRDSR) Protocol

    Energy management is an important issue in Mobile Ad hoc NETworks (MANETs). Normally MANETs use common transmission range for data transfer. Transmitting with high power improves network performance by reducing the number of forwarding nodes. However, it results in interference and decreases network lifetime. The authors have tried variable range...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Performance Analysis of Multicast Protocols: ODMRP, PUMA and OBAMP

    Mobile Ad-hoc NETwork (MANET) is a dynamically reconfigurable wireless network without any centralized administration or infrastructure. Here each node acts as a router for each other nodes. Multicasting is the transmission of datagram's to a group of nodes identified by a single destination address. This paper analyzes the performance of...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Security in Virtual Machine is Better Than Real Machine

    This position paper argues that the operating system and applications currently running on a real machine should relocate into a virtual machine. This structure enables services to be added below the operating system and to do so without trusting or modifying the operating system or applications. To demonstrate the usefulness...

    Provided By Kurukshetra University

  • White Papers // May 2010

    Multipath Routing Protocol With Backtracking for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is characterized by multi-hop wireless links in the absence of cellular infrastructure and frequent host mobility. In this paper, a new on-demand routing protocol is proposed, named On-demand Routing protocol with Backtracking (ORB), for multi-hop mobile ad hoc networks. Suppose a source host wants...

    Provided By Kurukshetra University

  • White Papers // Nov 2009

    Dynamic Frequency Allocation Scheme of Mobile Networks Using Priority Assignment Technique

    Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node changes its transmission or reception parameters to communicate effectively avoiding interference with licensed or unlicensed users. Cognitive radio techniques provide the capability to use or share the spectrum in an opportunistic manner. In...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Mobility Management Protocols for Wireless Mobile Networks

    4 G wireless networks are envisioned to provide high raw data rates in the downlink as well as in the uplink directions. These networks are driven by the need to support context-rich multimedia services and applications. 4G wireless networks also support global roaming and multiple classes of services with variable...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Comparision of Approaches to Implement Intrusion Detection System

    An IDS can be a piece of installed software or a physical appliance that monitors network traffic in order to detect unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies. Intrusion detection system alerts the system administrators...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Design Issues: Duty Cycle Control in Wireless Sensor Networks

    Wireless sensor networks are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Wireless Sensor Networks (WSN's) are becoming popular in military and civilian applications such as surveillance, monitoring, disaster recovery, home automation and many others. Almost any sensor network application faces the...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    A Survey and Performance Analysis of Checkpointing and Recovery Schemes for Mobile Computing Systems

    Checkpoint is defined as a designated place in a program where normal processing of a system is interrupted to preserve the status information. Checkpointing is a process of saving status information. Mobile computing systems often suffer from high failure rates that are transient and independent in nature. To add reliability...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Bluetooth Quality Issues, Threats and Security Tips

    The Bluetooth, LAN's and IrDA technology is a boon of the present era. It's a part of wireless communication as well as mobile communication. Bluetooth use low power and generally do not require a license for spectrum use LAN is a technology for data transfer providing data rates up to...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Mobile Cloud Computing as a Future of Mobile Multimedia Database

    Most of the people use their mobile phones as mini-computers that travel with them and keep them connected 24 hours a day, and that number will surely continue to grow. Mobiles are now integral part of business world and importance of mobile database is inevitable. A new study from ABI...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Cooperative Diversity and Partner Selection Techniques in Wireless Networks

    Mobile users' quality of service is limited by the fading problem. In fading, within the duration of any given call, mobile users experience severe variations in signal attenuation. Solution to this problem is the use of some type of spatial diversity. Spatial diversity generally requires more than one antenna at...

    Provided By Kurukshetra University