A method to predict the offloading potential for DTN and WIFI hotspots
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
An enormous amount of cellular data traffic has been produced by mobile users which exceeds the capacity of cellular network and hence weaken the network quality. The solution is to enhance the capacity of cellular networks which however is expensive and inefficient. As DTNs and Wi-Fi hotspots usually focus on maximizing the amount of cellular traffic that can be offloaded. In most cases due to user mobility these networks provide discontinuous and opportunistic network connectivity to the users and the traffic offloading hence results in no negligible data downloading delay.
Authors and Affiliations
Ravi Prakash P, D Srinivasa Rao
A Survey of Techniques for Intrusion Detection System
In this paper we will discuss the various kinds of anomalous and malicious activities, which can be a symptoms of Intrusion. The term Intrusion detection was coined in 1980. Since then many Frameworks for Intrusion D...
A Performance Evaluation of Different Parameter in Wireless LAN Standards using Qualnet
In recent year, wireless local area network have been developed and deployed in many wireless applications. The need for these devices is to communicate with each other effectively when the use of mobile call is incr...
Extraction of Frequent Subgraph from Graph Database
Graphs are promising abstraction of complex structured and semi-structured data. Graph mining techniques extract, analyze and summarize significant and useful information from the graph databases. Finding frequent su...
Minimizing End-To-End Delay in Interactive Network Applications
Multiple users interaction in network applications such as teleconferencing, network gaming, and online trading are gaining popularity but these applications require that the delay difference in between multiple clie...
Efficient and Reliable Transmission Mechanism for Wireless Nodes
In wireless networks the traffic from the source to the destination which is often routed through a number of nodes are often subject to a number of attacks ,where intermediate nodes claim to transmit packets which w...