A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Padmavathi, G.
- Performance Evaluation of Parallel and Series Communication Network with Dynamic Bandwidth Allocation
Authors
1 Department of Technical Education, AP, IN
2 Department of Statistics, Andhra University, Visakhapatnam, IN
3 Electronics and Communication Engineering, Andhra University, Visakhapatnam, IN
Source
Networking and Communication Engineering, Vol 1, No 7 (2009), Pagination: 410-421Abstract
In this paper a parallel and series communication network model with dynamic bandwidth allocation is developed and analyzed. In order to reduce congestion in buffer and to improve voice quality several congestion control methods like bit dropping,selective packet discarding, flow control etc., are developed and successfully implemented. to have an efficient utilization we propose dynamic allocation of bandwidth i.e. the transmission rate of the data/voice packet dependent on the content of the buffer just before it get transmitted. The end to-end performance of the model is measured by approximating the arrival and service processes of the packets follow poisson process. The transient analysis of the communication network shows that dynamic allocation has a significant effect in reducing mean delays and improving throughput of the transmitter. Graphs illustrate performance of the network model for different parameters.
Keywords
Dynamic Bandwidth Allocation, Joint Probability Generating Function, Mean Delay, Poisson Process, Throughput.- An Evaluation of Suitable Key Management Schemes in Mobile Adhoc Networks
Authors
1 Department of Computer Science, Avinashilingam University for Women, Coimbatore–641 043, IN
2 Department of Computer Science, Avinashilingam University for Women, Coimbatore – 641 043, IN
Source
Networking and Communication Engineering, Vol 1, No 2 (2009), Pagination: 62-66Abstract
Mobile ad hoc networks, or MANETs, are wireless networks that do not depend on a fixed infrastructure. Mobile nodes may form networks on the fly for a variety of environments including emergency rescue missions, sensor networks, military applications,and open networks of personal wireless devices. Wireless nodes can communicate directly with neighboring nodes that are within their transmission ranges. To reach nodes outside the direct transmission range, nodes depend on each other to forward their packets, creating
a multihop network with many vulnerability points. Cryptographic techniques are essential to the protection of both routing information and application data. A secure and efficient management of cryptographic keys is crucial for a reliable network service and thus the success for wireless ad hoc networks. This paper evaluates and surveys the key management schemes available for mobile adhoc network.