Immensely Discriminate Routing in Wireless Networks

Author(s):  
Sujatha V ◽  
E. A. Mary Anitha

Wireless networks are predictable to grant essential Internet access multimedia traffic service also increasingly such networks have been emerged in real life. However, the application scenarios is indeterminate as well as largely scalable routing is very difficult. Thus require efficient routing schemes in wireless network. In this paper, we propose Immensely Discriminate Routing protocol is used for multihop routing in wireless network. Here, node distance, node link, node trust and node quality of service is evaluated the next hop. This parameters are determined an efficient path in the wireless network.

2019 ◽  
Vol 01 (03) ◽  
pp. 148-160
Author(s):  
Krishnaraj Natarajan

The wireless network that are formed on the fly, without relying on the previous infrastructure, including the autonomous devices that lie nearby are called the flying wireless networks. Despite of the networks, self-configuring and self-healing nature, it incurs many challenges due to its mobile nature, limited battery span and the lack of the centralized control, so these wireless network requires a perfect routing protocol addressing the challenges and improving the performance of the network, so the paper presents the survey on the various routing protocols that enhances the performance of the flying wireless network. The survey is further continued with the analysis of the routing protocols to evince the capability of the same on the grounds of network life time, energy consumption and the quality of service.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


The forthcoming wireless networks provide the continuous services to their users for different applications by the integration of diverse wireless access technologies known as heterogeneous wireless network. The heterogeneous wireless network improves the Quality of Service for stationary and non-stationary mobile users. Even when users are in mobility the services are provided by means of handoff or handover. In this paper, the integration of three different wireless networks such as LTE, WiMAX and Wi-Fi networks and their vertical handoff performance analysis are presented. These diverse wireless networks which are considered for integration are modeled as a heterogeneous wireless network. This network is designed using QualNet simulator. Furthermore, the designed heterogeneous network, vertical handoff performance is estimated by using factors such as throughput, jitter and End to End delay. With these performance factors, the designed network’s Quality of Service (QoS) is estimated under mobility conditions.


2018 ◽  
Vol 7 (3.34) ◽  
pp. 226
Author(s):  
K Lavanya ◽  
Dr R.Kanthavel ◽  
Dr R.Dhaya

Transferring high quality video stream through a heterogeneous wireless network has many challenges due to the varying data rate and round trip time(RTT) involved in the network and the more stringent quality of service(QoS) requirements of the multimedia application such as on time delivery , minimum delay etc. User datagram protocol (UDP), a connectionless, unreliable transport protocol has been widely used for transferring video frames.UDP cannot guarantee reliable information delivery and  may lead to packet loss. The packet loss, increases with time varying bandwidth availability in the heterogeneous wireless networks. Transmission control protocol(TCP) can be an alternate transport layer protocol to provide reliable delivery of video information. But, using TCP for wireless networks has limitations due to misinterpretation of packet loss, frequent link failure, asymmetric link behaviour etc.,. which minimizes the throughput and in turn degrades the quality of the video frames transmitted. This paper analyses an efficient scheme to use Heterogeneous Environment Retransmission algorithm with SCTP (HERTS) to transfer video data in the heterogeneous environment. By using multi-homing and multi-streaming feature of Stream control transmission protocol (SCTP), the packet delivery rate, through put and delay requirements can be optimized. The transport layer model suggested in this paper aims at reducing the occupancy of the retransmitted packets in the link, by using a separate end to end path allotted for retransmission.  


2021 ◽  
Vol 10 (1) ◽  
pp. 7
Author(s):  
Renas R. Asaad

This paper implements a wireless attack technique by cracking the password on kali Linux OS using Hashcat technique. This study identifies the security weakness, using brute-force attack for online attacking and straight attack for offline attacking. The brute-force attack is also recognized as a detailed search, where it attempts guessing the target password one password at a time until reaching the correct password, which is called a dictionary attack. then using hash algorithms to deal with MD5 hash algorithm and SHA-512 (Linux). In this article, we will learn about the various wireless attacks. These days, wireless networks are everywhere. With users being on the go like never before, having to remain stationary because of having to plug into an Ethernet cable to gain Internet access is not feasible. For this convenience, wireless connections are not as secure as Ethernet connections. In this article, we will explore various methods for manipulating wireless attacks and their techniques including several methods on Linux.


2019 ◽  
Vol 8 (2S3) ◽  
pp. 1598-1602

Throughout the years in wireless networks, congestion control has been widely explored. With the point of improving execution and performance in wireless network many techniques and methods have been built up over the years. It is very necessary to solve the issue of congestion control for the quick extension and execution of wireless technology. When a network link or node carries more data than its capacity then network congestion will occurs. In queueing theory and network congestion it reduces the quality of service. Normal impacts of congestion control include packet loss, blocking of new connections and queueing delay. As a result of congestion is to increment in offered load either just to a little increment or even a reduction in system throughput [1].There are many ways to control the congestion in wireless networks. We studied different techniques in this paper and also work through applying TCP friendly rate control.


2021 ◽  
Author(s):  
Premi.A ◽  
Rajakumar.S

The implementation and operation of a Fifth Generation (5G) network aims to achieve a maximum speed, low potential, improved flexibility, and a change in requirements and technologies from service-oriented to user-oriented. The users need resource allocation and management that is effective. Established networks’ closed infrastructure and ossified services result in particularly in wireless networks, inefficient resource allocation and underutilized network resources. On the basis the standard of a service provider’s utility benefit then customer gratification, various allocation strategies are suggested. Wireless system based 5G another research area aimed at supply distribution and 5G access links is network. In this project, radio resource allocation and mobility assessment of 5G wireless network LEACH routing protocol is implemented. In terms of wireless networks, various architectural integrations of other wireless technologies such as 5G, LTE, Wi-MAX, and so on are highlighted. Furthermore, the project focuses on resource allocation approaches and strategies for cellular networks, as well as comprehensive criteria for future 5G networks


2016 ◽  
Vol 2016 ◽  
pp. 1-9
Author(s):  
Zhaoming Lu ◽  
Tao Lei ◽  
Xiangming Wen ◽  
Luhan Wang ◽  
Xin Chen

Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs) have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet). However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS) strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN) and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience) driven fine-grained resource management could be achieved for wireless network users.


Sign in / Sign up

Export Citation Format

Share Document