A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Pothalaiah, Sake
- Implementation of Adaptive Zone Routing Protocol for Wireless Networks
Authors
1 Sri Indu college of Engineering and Technology, Affiliated to JNTU, Hyderabad, Ibrahimpatnam, R.R. Dist.-501510, IN
Source
Wireless Communication, Vol 2, No 11 (2010), Pagination: 401-410Abstract
Mobile Ad hoc wireless NETworks (MANETs) that do not need any fixed infrastructure. They are characterized by dynamic topology due to node mobility, limited channel bandwidth, and limited battery power of nodes. The key challenge in the design of ad hoc networks is the development of dynamic routing protocols that can efficiently find routes between two communicating nodes. Thus, many ad hoc routing protocols have been proposed in recent years. All these routing protocols attempt to provide a high data packet delivery ratio and low routing control traffic at the same time. These routing protocols can be classified into three categories: proactive, reactive and hybrid routing protocols.Keywords
Ad hoc, ZRP, DSDV, Zone Routing, AZRP.- Performance Analysis of Duplicate Address Detection Schemes in DYMO Routing Protocol for MANETs
Authors
1 Dept of ECE, CE, Jawaharlal Nehru Technological University, IN
2 Department of ECE, College of Engineering JNTU. Kukatpalli, IN
Source
Wireless Communication, Vol 2, No 10 (2010), Pagination: 357-361Abstract
MANET (Mobile Ad Hoc Networks) is a wireless network in which all movable nodes can communicate with each other without depend on a fixed infrastructure. Here packet forwarding and routing is achieved by intermediate nodes. In reactive protocols, a routing path is acquired on-demand when a source desires to send data packets to destination. In order to send and receive packets between two nodes, they should have their unique address in the network. Since IP is also used in MANETs, a unique IP address should be assigned to each node. Therefore, IP address auto-configuration schemes have been developed to remove the overhead of manual configuration. Mobility is one of the reasons for partitioning of the network. When a node having unique IP address in one partition, moves into another partition, there may arise a chance of duplication of the IP address. Since, IP address has to be unique, address conflicts need to be detected through a DAD (Duplicate Address Detection) procedure. This paper mainly focused on passive DAD schemes such as LOC-SD-INT (Location Source Destination with Intermediate nodes) over DYMO routing protocol. In this paper improved accuracy of detecting address conflicts, improved detection success ratio and reduced detection delay to detect address conflicts has been achieved. Through extensive simulations using the ns-2 simulator, PDAD schemes verify and better results are achieve when compare to the PACMAN scheme.Keywords
MANET, DAD, LOC-SD-NT, DYMO, PACMAN.- Remote Data Acquisition System Based on Arm Processor
Authors
1 ECE Department, Sri Indu College of Engg., IN
2 Department in ECE, Sri Indu College of Engineering, IN
3 ECE Department, Sri Indu College of Engg, IN
Source
Programmable Device Circuits and Systems, Vol 2, No 11 (2010), Pagination: 158-162Abstract
Data acquisition system is an embedded system, which collects the data at predefined time intervals from different sensors for different physical measurements like temperature, vibration, light, Voltage variations, etc. In fact, anything that you need to measure. In stand-alone data acquisition system, the output may be in the form of display, buzzer, memory storage devices etc. These devices placed in different locations are used to collect the data and, this data can be transmitted to centrally located PC servers, for further analysis and storage via different communication mediums TCP/IP. This can also be called as Remote Data acquisition system. The microcontroller based embedded device that collects the data from the sensors and transmit to remote PC server via modem .The main purpose of using IP, is to transfer the collected data from different locations and to overcome the limitation of serial communication. This data acquisition system consists of two parts Control unit and Communication unit. The control unit is having one micro-controller interfaced with A to D converter, which converts analog signals to digital form. The microcontroller will be interfaced with modem and then the data is sent through LAN OR WAN.
Keywords
Embedded ARM, Remote I/O Data, Data Acquisition and Monitoring.- A New Approach to Telugu Text Steganography by Shifting Inherent Vowel Signs
Authors
1 Sri Indu College of Engineering and Technology (Affiliated to JNTU, Hyderabad) Ibrahimpatnam RR District-501510, IN
Source
Networking and Communication Engineering, Vol 2, No 11 (2010), Pagination: 444-448Abstract
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves.
Cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. Wide ranges of algorithms have been introduced using text, audio, video and images files as covering media. This paper presents a new approach for steganography in Telugu texts. Taking the typical structure of Telugu alphabets into consideration, in this approach, by shifting inherent vowel signs either left or right, we hide the secret message. The approach shows good result on the sample collected from different Telugu newspaper.