VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 5, Issue 1
Abstract
Control architecture for resource allocation in satellite networks is proposed, along with the specification of performance indexes and control strategies. The latter, besides being based on information on traffic statistics and network status, rely upon some knowledge of the fading conditions over the satellite network channels. The resource allocation problem consists of the assignment, by a master station, of a total available bandwidth among traffic earth stations in the presence of different traffic types. Traffic stations are assumed to measure continuously their signal fade level, but this information may either be used only locally or also communicated to the master station. According to the information made available on-line to the master station on the level of the fading attenuation of the traffic stations, the assignment can be made static, based on the a priori knowledge of long-term fading statistics, or dynamic, based on the updated measurements. In any case, the decisions can be adapted to slowly time-varying traffic characteristics. At each earth station, two basic traffic types are assumed to be present, namely guaranteed bandwidth, real-time, synchronous data (stream traffic), and best effort traffic (datagram traffic). Numerical results are provided for a specific architecture in the dynamic case, in a real environment, based on the Italian satellite national coverage payload characteristics.
Authors and Affiliations
Nutakki Praveena, Dr. Ujwal A. Lanjewar, Chilakalapudi Meher Babu
A Novel VLSI Architecture for SPHIT Encoder
In this Paper we propose a highly scalable image compression scheme based on the set partitioning in hierarchical trees (SPIHT) algorithm. Our algorithm called highly scalable SPIHT (HS-SPIHT), supports spatial and SNR s...
The Eportfolio as Support for the Professional Development of Preservice Teachers: a Theoretical and Practical Overview
The portfolio is rapidly gaining attention in initial teacher training programs. It serves multiple uses and ends in the professional development and reflective practice of preservice teachers, and the technical advances...
An Alternate Algorithm for (3x3) Median Filtering of Digital Images
Median filtering is a commonly used technique in image processing. The main problem of the median filter is its high computational cost (for sorting N pixels, the temporal complexity is O(N·log N), even w...
A Hybrid Approach of AES and File Encryption to Enhance The Cloud Security
Cloud computing is a paradigm shift in the way we define software and hardware, and architect our IT solutions. The emerging cloud technologies, due to their various unique and attractive properties, are evolving with tr...
Performance Evaluation of Ciphers Using CRYPTOOL 2.0
Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and considerable research effort is required. This paper includes the complete s...