Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Patle, V. K.
- Effect of Pause Time and Network Size in Various Routing Protocol:MANET
Abstract Views :182 |
PDF Views:0
Authors
Affiliations
1 School of Studies in Computer Science and IT, Pt. Ravishankar Shukla University, Raipur (Chhattisgarh) 492010, IN
1 School of Studies in Computer Science and IT, Pt. Ravishankar Shukla University, Raipur (Chhattisgarh) 492010, IN
Source
Research Journal of Science and Technology, Vol 5, No 3 (2013), Pagination: 335-339Abstract
Mobile Ad hoc network is self-organizing and adaptive in nature. The nodes are mobile and forming a dynamic temporary network without any use of existing network. The routing in mobile ad hoc network is a difficult task because nodes are dynamic. A routing protocol is used to find routes between mobile nodes to facilitate communication within the network. Route should be discovered and maintained with a minimum of overhead and bandwidth consumption. There are number of routing protocols were proposed for Mobile ad-hoc networks. In this paper analysis of performance evaluation of three different routing protocols i.e. Ad-hoc on demand distance vector routing protocol (AODV), Dynamic Source Routing Protocol (DSR) and Destination-Sequenced Distance Vector (DSDV), which gives good performance for different parameters scenarios. And also highlights simulation based performance analysis of routing protocols on various metrics like overhead, end-to-end delay, Packet Delivery Fraction (PDF) etc by increasing the size of Network with variation in Pause Time for the same number of nodes. Network size and pause time affects the performance of selected protocols. DSDV gives good performance for small network size, but for large network size AODV performances good. End-to-end delay varies, but overhead and PDF is stable for all scenarios. Network Simulator (NS2) is used for this simulation work.Keywords
MANET, AODV, DSDV, DSR, NS2 Simulator.- Performance Evaluation of AOMDV, AODV and DSR Reactive Routing Protocols using NS-2
Abstract Views :170 |
PDF Views:0
Authors
Affiliations
1 School of Studies in Computer Science, Pt. Ravishankar Shukla University, Raipur, Chhattisgarh, IN
1 School of Studies in Computer Science, Pt. Ravishankar Shukla University, Raipur, Chhattisgarh, IN
Source
Research Journal of Science and Technology, Vol 5, No 3 (2013), Pagination: 343-346Abstract
Abstract- Mobile Ad hoc networks (MANET) are frequently changing network topology, using multi-hop wireless links without any fixed infrastructure. Reactive Routing is important for Ad hoc network in terms of resource, robustness and efficiency when mobility is high and links get disconnected frequently. Performance of three reactive routing protocols for mobile Ad hoc network including Ad hoc On-demand Multi path Distance Vector Routing (AOMDV), Ad hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR) is evaluated using Network Simulator (ns-2). Performance is evaluated with respect to fraction of packets delivered and end-to-end delay for Common Bit Rate (CBR) traffic model. Relative strength, weakness and applicability of each reactive routing protocol to different situations are studied and evaluated.Keywords
Mobile Ad hoc Networks, Reactive Routing Protocols, AOMDV, AODV, DSR.- Analysis of Tunneling Transition Mechanism in IPv6
Abstract Views :167 |
PDF Views:0
Authors
Affiliations
1 School of Studies in Computer Science & IT, Pt. Ravishankar Shukla University, Raipur, (Chhattisgarh) 492010, IN
1 School of Studies in Computer Science & IT, Pt. Ravishankar Shukla University, Raipur, (Chhattisgarh) 492010, IN
Source
Research Journal of Science and Technology, Vol 5, No 3 (2013), Pagination: 313-318Abstract
During the time of migration from Internet Protocol Version4 to Internet Protocol Version6 network, a various number of transitions mechanism have been proposed to ensure smooth, stepwise and independent changeover. IPv6 was proposed by IETF (Internet Engineering Task force) as a replacement of IPv4 protocol. When IPv6 was applied in cellular network, need of some improved Protocols was felt in order to support the mobility and Quality Of Service of a node. IPv6 Tunneling is a process where an encapsulation technique is fairly simple in which outer IP header is added before the original IP header, between them any other headers for the path, such as security headers specific to the tunnel configuration. The outer IP header source and destination identify the "end points" of the tunnel. Tunneling has two types i.e. automatic and configured. Tunneling is applied in four way i.e. Host-to-Host, Host-to-Router, Router-to- Router, Router-to-Host. Analyze the Automatic and Configured Tunneling in all the four way of Tunneling. Automatic tunnel is not point-to-point; it is point-to-multipoint. Configured tunnel is Simple point-to-point tunnels that can be used within a site or between sites.Keywords
MANET, IPv6, Automatic Tunneling, Configured Tunneling, Way of Tunneling.- Effect of Selfish Nodes in Trust Base Route:MANET
Abstract Views :167 |
PDF Views:0
Authors
Affiliations
1 School of Studies in Computer Science & IT, Pt. Ravishankar Shukla University, Raipur, (Chhattisgarh) 492010, IN
1 School of Studies in Computer Science & IT, Pt. Ravishankar Shukla University, Raipur, (Chhattisgarh) 492010, IN
Source
Research Journal of Science and Technology, Vol 5, No 3 (2013), Pagination: 327-330Abstract
MANET is a network with no fixed infrastructure. Routing is a greater challenge in these types of mobile networks due to the mobility and open media nature .The mobile ad hoc networks are more prone to security threats compared to the wired network. Therefore security needs are higher in mobile ad hoc networks compared to the traditional networks. Many types of problem are possible in mobile ad hoc networks such as selfish node problem .Selfish node is a node which can hold packet for using resources for their respective use. So for data security we want to send it through secure route, for that purpose we identify which node is cooperative and which one is selfish. Increasing of selfish node decreases the trust value of a node. If selfish node can be detected in a rout then one can abort that route and choose another safe route for data transfer. This paper analysis the selfish nodes problem in MANET with the help of network simulator and explore that the network performance is inversely proportional to no. of selfish node. After finding load on network route can be modify and network performance can be increased.Keywords
MANET Trust Base Route, Selfish Node, Cooperative Node, Network Simulator.- Characterization Techniques and Mechanoluminescence Properties of Sr2SiO4:Eu2+ Phosphor by Solid State Reaction Method
Abstract Views :147 |
PDF Views:0
Authors
Affiliations
1 School of Studies in Physics & Astrophysics, Pt. Ravishankar Shukla University, Raipur (C.G.) - 492010, IN
2 School of Studies in Computer Science, Pt. Ravishankar Shukla University, Raipur (C.G.) - 492010, IN
3 Department of Applied Physics, Bhilai Institute of Technology, Durg (C.G.)-491001, IN
1 School of Studies in Physics & Astrophysics, Pt. Ravishankar Shukla University, Raipur (C.G.) - 492010, IN
2 School of Studies in Computer Science, Pt. Ravishankar Shukla University, Raipur (C.G.) - 492010, IN
3 Department of Applied Physics, Bhilai Institute of Technology, Durg (C.G.)-491001, IN
Source
Research Journal of Science and Technology, Vol 6, No 3 (2014), Pagination: 147-150Abstract
Sr2SiO4:Eu2+ phosphor was prepared by the solid state reaction method, boric acid (H3BO3) was added as flux. The obtained phosphor was characterized using XRD, TEM, SEM techniques. The surface of the prepared phosphor was not found uniform and particles distribution is in nanometer size. The ML intensity of prepared phosphor was increasing linearly with increases of mechanical load.Keywords
Sr2SiO4:Eu2+, XRD, TEM, SEM, Mechanoluminescence.- Spatial-Temporal Data Mining in Wireless Sensor Networks
Abstract Views :172 |
PDF Views:0
Authors
Affiliations
1 School of Studies in Computer Science and I.T., Pt. Ravishankar Shukla University, Raipur C.G., IN
1 School of Studies in Computer Science and I.T., Pt. Ravishankar Shukla University, Raipur C.G., IN
Source
Research Journal of Science and Technology, Vol 6, No 2 (2014), Pagination: 87-90Abstract
Data mining techniques are use to discover a meaningful knowledge from data set. These mining techniques have been applied to intrusion detection, customized marketing, web personalization and many real-life problems. Knowledge discovery from sensor data is an emerging research area because of its variety of applications are presents for our society. Wireless Sensor Networks (WSN), produce large scale of data in the form of streams. Spatiotemporal Mining in the sensor data provides useful information for different applications.Keywords
WSN, Spatial-Temporal Data Mining.- Modulation Techniques for WiMAX:A Perspective
Abstract Views :179 |
PDF Views:0
Authors
Affiliations
1 School of Studies in Computer Science and IT, Pt. Ravishankar Shukla University, Raipur, Chhattisgarh, IN
1 School of Studies in Computer Science and IT, Pt. Ravishankar Shukla University, Raipur, Chhattisgarh, IN
Source
Research Journal of Science and Technology, Vol 3, No 2 (2011), Pagination: 95-98Abstract
Today, WiMAX (Worldwide Interoperability for microwave access) is one of the vibrating Broad Band wireless Technologies. Various modules have been considered in WiMAX. In this paper we have considered various Modulation Techniques of WiMax. We have discussed related works done for these modules. Different features of various modules have been given and then comparison of these modules has been done. At last conclusion and future works for these modules have been made.Keywords
WiMAX, Modulation Techniques.- State of the Art of Cloud Computing and its Research Issues
Abstract Views :157 |
PDF Views:0
Authors
Affiliations
1 Indian Institute of Information Technology, Deoghat, Jhalwa, Allahabad-211012, IN
2 School of Studies in Computer Sc and I.T, Pt. Ravishankar Shukla University, Raipur (C.G.)-492010, IN
1 Indian Institute of Information Technology, Deoghat, Jhalwa, Allahabad-211012, IN
2 School of Studies in Computer Sc and I.T, Pt. Ravishankar Shukla University, Raipur (C.G.)-492010, IN
Source
Research Journal of Science and Technology, Vol 2, No 6 (2010), Pagination: 147-152Abstract
Cloud computing is a technology that uses the central remote servers and internet to access or maintain data and applications. It allows service consumers and businesses vendors to use applications without any software installation and access their personal files at any time and by any computer with the help of internet access facility. This technology allows more efficient computing by centralizing memory, processing, storage and bandwidth. Cloud computing technology confronted a new computing epitome in the field of internet with operable resources used as services. This forms a new horizon for business venture and projects by cutting down the entry barriers to a greater extent. The objective of this research contribution is to make spotlights on Strengths, Weakness, Opportunities and Threats (SWAT) analysis and research issues of cloud computing.Keywords
Cloud Computing, Future Internet, IaaS, PaaS, SaaS.- Implementation Challenges of IPv6 on Wireless Sensor Networks
Abstract Views :162 |
PDF Views:0
Authors
Affiliations
1 School of Studies in Computer Science and I.T., Pandit Ravishankar Shukla University, Raipur (C.G.), 492010, IN
2 School of Studies in Computer Science and I.T, Pandit Ravishankar Shukla University, Raipur (C.G.), 492010, IN
1 School of Studies in Computer Science and I.T., Pandit Ravishankar Shukla University, Raipur (C.G.), 492010, IN
2 School of Studies in Computer Science and I.T, Pandit Ravishankar Shukla University, Raipur (C.G.), 492010, IN