A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sathiyaraj, A.
- Superior Routing Protocol for MANET
Authors
1 Computer Science and Engineering, Madurai Kamaraj University, IN
2 Information Technology, Adhiparasakthi Engineering College, IN
3 Anna University, Chennai, IN
Source
Wireless Communication, Vol 4, No 4 (2012), Pagination: 183-188Abstract
Mobile ad hoc networks (MANETs) are swiftly evolving and the notion of ad hoc networking has become one of the most challenging research areas of wireless communications. The rising popularity of real-time applications among end users in MANETs has stimulated a surge of research in routing and providing quality of service (QOS) support in such networks. A number of schemes have been previously proposed to end to end delay and estimate outstanding capacity. The outstanding capacity that is derived from window-based measurements of channel estimation and the end to end delay multiple node-disjoint paths are examined for satisfying QOS in terms of end-to-end delay .In this paper, a new routing protocol (SRP) proposed. It considering outstanding Capacity estimation and End to end delay is a key component of any admission control scheme in MANETs. The novel part of this scheme is a simple additional mechanism to estimate residual capacity delay inIEEE 802.11-based ad hoc networks.Keywords
Mobile Ad Hoc Networks, Quality-Of-Service, Capacity Estimation, Admission Control, Channel Utilization, Delay, Contention Delay, Contention Area, Re-Sequencing Delay, Node-Disjoint Paths.- Exploration of Taxonomical Vulnerabilities in Operating System V
Authors
1 Anna University of Technology, Tiruchirappalli, IN
Source
Networking and Communication Engineering, Vol 4, No 3 (2012), Pagination: 140-145Abstract
Security in computer systems is important to ensure reliable operation and protect the integrity of stored information.Faults in the implementation can be a threat to security for instances like penetrating an operating. These faults must be identified, detected, and corrected to ensure reliability. Thereby, security assessment of a system stands critical and is a difficult problem. Most of the current efforts in security assessment involve searching for known vulnerabilities and finding such unknown vulnerabilities remains a subjective process yet. The process can be improved by understanding the characteristics and nature of known vulnerabilities. The knowledge thus gained can be organized into a suitable taxonomy. This paper provides a significant work done developing taxonomies of vulnerabilities in Operating systems. The vulnerabilities inherent in the Operating system should be addressed appropriately, so they can be eliminated before accelerated by malicious software or hackers.