E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

This paper explains the basic functionality of Ethernet and how it can be utilized at home and business networks. This paper includes types of Ethernet, how Ethernet works with OSI modal and cable? , specifications of Ethernet with respect to different types of cables and distance between two points, networking devices supported by it and the topology used by it. ...
Paper Information
Authors Dr. Zobair Ullah
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 39

To find out the delay distribution in a disruption tolerant network between the nodes when there are randomly distributed several numbers of replications of packets on each node. This delay distribution function can help us with a guideline on how to set the lifetime of a message. As the number of replicas on the nodes increases the delay increases. Up to our best knowledge it is the fir...
Paper Information
Authors Dr. P.K.Suri, Lokesh Pawar
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 36

Increasing lifetime in wireless sensor networks is a major challenge because the nodes are equipped with low power battery. For increasing the lifetime of the sensor nodes energy efficient routing is one solution which minimizes maintenance cost and maximizes the overall performance of the nodes. In this paper, different energy efficient routing techniques are discussed. Here, photovolta...
Paper Information
Authors Jyoti Saraswat, Neha Rathi, Dr. Partha Pratim Bhattacharya
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 31

Typically a user desires to obtain the value of some aggregation function over distributed data items. We present a low-cost, scalable technique to answer continuous aggregation queries using a network of aggregators of dynamic data items. In such a network of data aggregators, each data aggregator serves a set of data items at specific coherencies. Our technique involves decomposing a c...
Paper Information
Authors Dr. P. Prabhakar, S. Nageswara Rao
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 20

Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this article, we consider the problem of jammingaware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization probl...
Paper Information
Authors Dr. M. Karunakar Reddy, S. Nageswara Rao
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 11

In this document, we study the result of multi hop relaying on the throughput of the downstream channel in cellular networks. In particular, we contrast the throughput of the multi hop method through that of the conventional cellular system, representing the feasible throughput development by the multi hop relaying under transitive transmission considerations. We moreover propose a hybri...
Paper Information
Authors A.Veerabhadra Reddy, Dr. D. Sreenivasa Rao
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

Standard firewalls alone can no longer protect the enterprise from Internet dangers; new technologies such as next generation firewalls and advanced packet inspection devices can improve security around your gateways. ...
Paper Information
Authors Dr. Steven Thomason
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 50

Mobile ad-hoc networks (MANETs) are selfconfiguring networks of nodes connected via wireless. This kind of networks is currently one of the most important research subjects, due to the huge variety of applications (emergency, military, etc...). In MANETs, each node acts both as host and as router, thus, it must be capable of forwarding packets to other nodes. Topologies of these networks...
Paper Information
Authors Dr. Gurjeet Singh, Er.Manish Goyal
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 46

Access control refers to securing access to the resources and allowing access up to some defined level. This paper presents various approaches implementing access control in an open domain and carries an analysis of decentralized and diverse access control (DDAC) architecture. The DDAC architecture eliminates the role of centralized authority for managing and issuing usersâ€â...
Paper Information
Authors Dr. Rajender Nath, Gulshan Ahuja
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 35

This paper is focused on a new solution for congestion avoidance in ad hoc multicast routing by bearing the congestion situations. As the routing strategy belongs to Medium Access Level, the routing strategy is named Medium Access Level Multicast Routing short MALMR. MALMR is aimed at Congestion Avoidance in Multicast Mobile Ad hoc routing protocol. The present MAC level routing strategy...
Paper Information
Authors G.S.Sreedhar, Dr. A.Damodaram
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 30