A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Punithavalli, M.
- An Implementation of Security in VoIP Using Modified Shamir‟s Secret Sharing Algorithm
Authors
1 Department of Computer Applications, SNR SONS College, Coimbatore, IN
2 Department of Computer Applications, Sri Ramakrishna Engineering College, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 3, No 13 (2011), Pagination: 864-868Abstract
A major change in telecommunication industry is Voice over Internet Protocol (VoIP). VoIP offers interactive communications. It differs from conventional circuit switched networks. It allows people to communicate with each other at very low rates. The transmission of Real time voice data is not as easy as ordinary text data. The real time voice transmission faces lot of difficulties. It suffers from packet loss, delay, security and quality. These factors will affect the communication, degrades the performance and quality of a VoIP. This paper addresses the security aspects of VoIP to improve the quality. The modified shamir's secret sharing algorithm is designed to improve security in terms of delay.Keywords
Security, Quality, Telecommunication and VoIP.- Cloud Computing: Practice of Efficient Approaches, Techniques and Challenges for Data Centers
Authors
1 Department of Computer Applications in V.S.B. Engineering College, Karur, Tamil Nadu, IN
2 Bharathiyar University, Tamil Nadu, IN
3 Department of computer applications in SNS Arts and Science College, Coimbatore, Tamil Nadu, IN
Source
Networking and Communication Engineering, Vol 3, No 5 (2011), Pagination: 285-288Abstract
Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is a virtualized pool of computing resources. It can manage a variety of different workloads, including the batch of back-end operations and user-oriented interactive applications. There are many resources available in a data center and in the cloud that a client can purchase or rent, such as processing time, network bandwidth, disk storage, and memory. The users of the cloud do not need to know where the data center is, or have any expertise on how to operate or maintain the resources in the cloud. Clients only need to know how to connect to the resources and how to use the applications needed to perform their jobs. This article introduces the background and service model of cloud computing. This article also introduces efficient approaches, techniques and challenges for data centers.Keywords
Cloud Computing, Cloud Service, Data Centers, SaaS.- LSB and DCT Based Steganography in Safe Message Routing and Delivery for Structured Peer-To-Peer Systems
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore-641 044, IN
Source
Networking and Communication Engineering, Vol 2, No 9 (2010), Pagination: 365-369Abstract
In structured P2P systems, message deliverance can be done by identifying the peer IDs of the individual systems. The initiator has to decide the destination and can route the message through one or more hops. The message passes from one hop to another correctly by identifying the IP address and finally reaches the destination. In this paper we propose an efficient routing strategy to control the routing path and to identify the malicious nodes. We also eliminate the drawbacks of encryption by introducing steganography in message deliverance. This paper proposes a new steganographic encoding scheme which separates the colour channels of the windows bitmap images and then hides messages randomly in the LSB of one colour component of a chosen pixel where the colour components of the other two are found to be equal to the key selected. In addition to this we apply DCT based Steganography which embeds the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture. When information is hidden inside video, the program hiding the information usually performs the DCT. DCT works by slightly changing each of the images in the video, only to the extent that is not noticeable by the human eye. An implementation of both these methods and their performance analysis has been done in this paper.Keywords
Peer-To-Peer, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Steganography.- Alternative Best Effort (ABE) Router (Providing a Low-Delay Service within Best Effort)
Authors
1 Department of Finance and Computer Application, S.N.R. Sons College, Coimbatore, Tamil Nadu, IN
2 Computer Science Department, Sri Ramakrishna College for women, Coimbatore, Tamil Nadu, IN
Source
Networking and Communication Engineering, Vol 1, No 8 (2009), Pagination: 479-487Abstract
In all the applications that transfer binary data such as bulk data transfer will seek to minimize the overall transfer time. This paper proposes a novel approach for Internet Protocols (IP) networks. This paper presents Alternative Best Effort (ABE) Router that relies on the notion of providing low delay at the disbursement of fewer throughputs. The main objective of the proposed approach is to retain the simplicity of the original Internet single-class best-effort service while providing low delay to interactive adaptive applications. With ABE, each best effort packet is marked as either blue or green. The presence of green packets in every router ensures low bounded delay. Based on the nature of the traffic and global traffic conditions of a particular application the color the packets is chosen for every router. At the time of congestion the green packets are more likely to be dropped than the blue packet. The proposed router requirements aim at enforcing benefits for all types of traffic; as the green packet achieves low delay and the blue traffic receives at least as much throughput as it would in a flat best effort network. In addition this paper also discuss on ABE service, properties, requirements and usage. Moreover, it discusses the implications of replacing the existing IP best effort service by ABE service.Keywords
Data Transfer, Internet Protocols, Alternative Best Effort, Router, Packets, Throughput.- A Survey of Secure Group Key Management
Authors
1 Sri Ramakrishna College of Arts and Science for Women, Coimbatore, Tamil Nadu, IN
2 Department is with the Sri Ramakrishna College of Arts and Science for Women, Coimbatore, Tamil Nadu, IN
Source
Networking and Communication Engineering, Vol 1, No 7 (2009), Pagination: 422-429Abstract
Group key management is an important functional building block for any secure multicast architecture. Many grouporiented and distributed applications need security services which includes key management. Such applications need a secure group key to communicate their data. This brings importance to key distribution techniques. Secure group communication has applications in multimedia conferencing, stock quote distribution shared work space,distributed interactive simulation, grid computing, teleconferences, pay-per-view, multi party games etc., some of these applications engage in one to many communications while others involve many to many communications. Several protocols have been proposed to support secure group key management. This paper focuses on several protocols that are designed for secure group key management. Various protocols are discussed on focusing the key management.
Keywords
Group Key Management, Security, Secure Group Communication, Multicast.- The Hybrid Architecture for the Secure Exchange of Data in E-Governance Applications
Authors
1 Department of Computer Science, PSG College of Arts & Science, Coimbatore, IN
2 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN