VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 5, Issue 1

Abstract

Control architecture for resource allocation in satellite networks is proposed, along with the specification of performance indexes and control strategies. The latter, besides being based on information on traffic statistics and network status, rely upon some knowledge of the fading conditions over the satellite network channels. The resource allocation problem consists of the assignment, by a master station, of a total available bandwidth among traffic earth stations in the presence of different traffic types. Traffic stations are assumed to measure continuously their signal fade level, but this information may either be used only locally or also communicated to the master station. According to the information made available on-line to the master station on the level of the fading attenuation of the traffic stations, the assignment can be made static, based on the a priori knowledge of long-term fading statistics, or dynamic, based on the updated measurements. In any case, the decisions can be adapted to slowly time-varying traffic characteristics. At each earth station, two basic traffic types are assumed to be present, namely guaranteed bandwidth, real-time, synchronous data (stream traffic), and best effort traffic (datagram traffic). Numerical results are provided for a specific architecture in the dynamic case, in a real environment, based on the Italian satellite national coverage payload characteristics.

Authors and Affiliations

Nutakki Praveena, Dr. Ujwal A. Lanjewar, Chilakalapudi Meher Babu

Keywords

Related Articles

A New Similarity Measure for User-based Collaborative Filtering in Recommender Systems

Collaborative filtering is a popular approach in recommender Systems that helps users in identifying the items they may like in a wagon of items. Finding similarity among users with the available item ratings so as to pr...

RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing

Cloud computing presents IT organizations with a funda­mentally different model of operation, one that takes advantage of the maturity of web applications and networks and the rising interoperability of computing system...

MARKETING INFORMATION SYSTEMS IN THE HEALTH SECTOR: A PRACTICE IN HOSPITALS IN TURKEY AND JORDAN

Health tourism, showing development in the last twenty years in the world, has emerged as an alternative tourism. Health tourism, very quickly developing among alternative tourism options, is an important profit tool s...

VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS

Control architecture for resource allocation in satellite networks is proposed, along with the specification of performance indexes and control strategies. The latter, besides being based on information on traffic statis...

Enhancing RSA algorithm using Mersenne Primes with reduced size of encrypted file

Message passing from source to destination is one of the important aspects of communication. However, it is requiredmany times that this message gets transmitted secretly, so that no unauthorized person gets knowledge of...

Download PDF file
  • EP ID EP649956
  • DOI 10.24297/ijct.v5i1.4383
  • Views 135
  • Downloads 0

How To Cite

Nutakki Praveena, Dr. Ujwal A. Lanjewar, Chilakalapudi Meher Babu (2013). VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 5(1), 29-34. https://europub.co.uk/articles/-A-649956