VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 5, Issue 1

Abstract

Control architecture for resource allocation in satellite networks is proposed, along with the specification of performance indexes and control strategies. The latter, besides being based on information on traffic statistics and network status, rely upon some knowledge of the fading conditions over the satellite network channels. The resource allocation problem consists of the assignment, by a master station, of a total available bandwidth among traffic earth stations in the presence of different traffic types. Traffic stations are assumed to measure continuously their signal fade level, but this information may either be used only locally or also communicated to the master station. According to the information made available on-line to the master station on the level of the fading attenuation of the traffic stations, the assignment can be made static, based on the a priori knowledge of long-term fading statistics, or dynamic, based on the updated measurements. In any case, the decisions can be adapted to slowly time-varying traffic characteristics. At each earth station, two basic traffic types are assumed to be present, namely guaranteed bandwidth, real-time, synchronous data (stream traffic), and best effort traffic (datagram traffic). Numerical results are provided for a specific architecture in the dynamic case, in a real environment, based on the Italian satellite national coverage payload characteristics.

Authors and Affiliations

Nutakki Praveena, Dr. Ujwal A. Lanjewar, Chilakalapudi Meher Babu

Keywords

Related Articles

A NOVEL APPROACH OF HYBRID MODEL OF ENCRYPTION ALGORITHMS AND FRAGMENTATION TO ENSURE CLOUD SECURITY

Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the s...

Evolution of Graphics-Development & Innovations

Graphics are now an integral part in many scientific, and entertainment fields. Radical discoveries and developments are still being made. Combinations of techniques and technology from different scientific fields are th...

A Petri Net approach for representing Orthogonal Variability Models

The software product line (SPL) paradigm is used for developing software system products from a set of reusable artifacts, known as platform. The Orthogonal Variability Modeling (OVM) is a technique for representing and...

Effect of Weight Factor on The Performance of Hybrid Column Wavelet Transform used for Watermarking under Various Attacks.

Digital image watermarking is aimed at copyright protection of digital images. Strength of embedded watermark plays an important role in robustness and invisibility of watermarking technique. In this paper, effect of two...

Using 3GPP- A Secure IDS for MANETs

Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directl...

Download PDF file
  • EP ID EP649956
  • DOI 10.24297/ijct.v5i1.4383
  • Views 136
  • Downloads 0

How To Cite

Nutakki Praveena, Dr. Ujwal A. Lanjewar, Chilakalapudi Meher Babu (2013). VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 5(1), 29-34. https://europub.co.uk/articles/-A-649956