IJCNIS Vol. 4, No. 4, May. 2012
Cover page and Table of Contents: PDF (size: 129KB)
This research is carried out to develop IP Multimedia Subsystem (IMS) based Mobile Mass Examination (MoMEx) System. MoMEx system is intended to improve on management of examination process for large number of examinees. IMS based application is considered to be the next generation mobile applications that enable developers to take advantage of mobile networks resources. IMS-based application is attributed with robustness and improved Quality of Experience (OoE) for mobile users. Such quality is needed to ensure users reliabilities on the system. In This paper, we cover the analysis and design phase of MoMEx system. We have designed set of questionnaires aimed to gathering insights how much the concept of mobile exam and assessment will be accepted among the students and faculty members. Based on the results obtained, we concluded the functional requirements of MoMEx system prior to implementation phase.[...] Read more.
The quest for reliable data transmission in today’s computer networks and internetworks forms the basis for which routing schemes need be improved upon. The persistent increase in the size of internetwork leads to a dwindling performance of the present routing algorithms which are meant to provide optimal path for forwarding packets from one network to the other. A mathematical and analytical routing model framework is proposed to address the routing needs to a substantial extent. The model provides schemes typical of packet sources, queuing system within a buffer, links and bandwidth allocation and time-based bandwidth generator in routing chunks of packets to their destinations. Principal to the choice of link are such design considerations as least-congested link in a set of links, normalized throughput, mean delay and mean waiting time and the priority of packets in a set of prioritized packets. These performance metrics were targeted and the resultant outcome is a fair, load-balanced network.[...] Read more.
Present paper is an effort to build an energy efficient mechanism which can preserve the privacy of the location of base station and the source nodes so that the adversary cannot take down these nodes. Core functionality of WSN includes routing of the sensed data through predetermined optimized routes to the base station thus producing pronounced traffic near the sink node adding up to the revelation of either location of direction of location of base station. To overcome this revelation of base station the traffic patterns may be disguised by introducing fake packets to the generated traffic of original data. Many anti traffic analysis strategies have been proposed and implements with the objective of attaining traffic uniformity in network. But the inclusion of fake packets adds up communication overhead in the network as a whole. Hence the problem undertaken in the current research effort is to optimize the energy consumption at the node level for fake packet generation.[...] Read more.
Network security is the prevailing and challenging factor in computer communications. Computer security and communication security are interrelated and essential features in the internetworking system. Network security is ascertained by many factors like authentication, authorization, digital signatures, cryptography, steganography etc. Among them authentication is playing an important role in networked communications, where the communicating partners are to be identified each other legitimately. Authentication process ensures the legitimacy of the communicating partners in networked communication. In an authentication process, the originator of the communication and the respondent transact some identification codes to each other, prior to start of the message transaction. Several methods have been proposed regarding the authentication process for computer communication and smart card based networks from time to time. We introduced a new scheme to enhance and ensure the remote authentication through secure and dynamic authentication using a smart card, which is relatively a different approach. This scheme discusses the authentication procedure for smart card based network systems. This article introduces a dynamic authentication scheme, which includes a number of factors, among them the password, password index, and date of modification are important factors, which decide the dynamicity in authentication. The static approach authentication schemes are vulnerable to different types of attacks in networked communication. This dynamic authentication scheme ensures the authentication, confidentiality, reliability, integrity and security in network communications. This article discusses the implementation of this scheme and to analyze the security and performance factors to ensure the dynamic mutual authentication and to enhance the security features in authentication for smart card based networks.[...] Read more.
Due to the significance of Data, in this new age, its’ security has become a major issue in the I.T. industry. Cyber attacks from various sources are demanding its prevention in the new era of information security. Digital forensic is a relatively new fields that is the collection, analysis and documentation of a Cyber attacks. It is becoming increasingly important as criminals aggressively expand the use of technology in their enterprise of illegal activities. Digital forensics investigators have access to a wide variety of tools, both commercial and open source, which assist in the preservation and analysis of digital evidence. A small percentage of cyber criminals being convicted confirm the difficulty in detection of digital crime and its consequent procedural proving in the court of law. An established forensic analyst mines the crucial evidence from susceptible locations to comprehend attacker’s intension. The typical goal of an investigation is to collect evidence using generally acceptable methods in order to make the evidence is accepted and admitted on the court. Efficient digital Tools and procedures are needed to effectively search for, locate, and preserve all types of electronic evidence. Main focus of this paper is the complete investigation procedure of storage media. Our paper also explains emerging cyber crimes and its digital forensic investigation procedures using digital forensic tools and techniques.[...] Read more.
The research work aims to explore the nature, role and relevance of the wireless technologies such as WiMAX connectivity for rural area of Jalgoan district, India. It focuses on development of the WiMAX(Worldwide Interoperability for Microwave Access) network model using OPNET MODELER 14.5 and observe overall performance with fixed , mobile node with two base station .The model is Proposed to connect 50GKC (nodes), which are distributed all over coverage area of Jalgoan district using WiMAX connectivity. The 50 number of GKC are proposed to work in between 783Gram panchayats of Jalgoan district which is supposed to run with the support of Gram panchayat head . The scope of WiMAX is to provide last mile wireless broadband access for fixed and mobile users as an alternative to the wire line DSL and cable access. The physical and MAC layer of this technology refer to the IEE802.16e standard which supports five different data delivery service classes that can be used in order to satisfy QOS requirement of different applications such as VOIP, videoconference, FTP, web etc. The work is divided in three scenarios (network model), each scenario consist of different number of nodes with two BS and performance is observed with audio and video application such as VOIP and MPEG .All simulation results based on optimized network and area considered between two base station. The work provide the high speed wireless connectivity platform to build Electronic Governance project in Jalgoan district.[...] Read more.
All the proposed window based congestion control protocols use a single slow start algorithm. It has been shown in literature that slow start inefficiently utilizes bandwidth in a network with high bandwidth delay product (BDP). A multiple startup algorithm (E-speed start) was proposed in this work. E-speed start specifies a multiple selectable startup for Transmission Control Protocol (TCP). It is proposed that startup speed for TCP be selectable from n-arry startup algorithms. In E-speed start, a binary start was implemented based on a calculated value β which depends on the available bandwidth and other network conditions. A model for E-speed start was derived using utility maximization theory and the principle of decentralised solution. The model derived was shown to be stable by linear approximation, Laplace transform and by using the concept of Nyquist Stability criterion.[...] Read more.
Recently, many research works have been focused on the fiber optic devices for optical communication systems. One of the main interests is on the optical amplifiers to boost a weak signal in the communication systems. In order to overcome the limitations imposed by electrical regeneration, a means of optical amplification was sought. The competing technology emerged: the first was Raman amplification. One reason was that the optical pump powers required for Raman amplification were significantly higher than that for Erbium doped fiber amplifier (EDFA), and the pump laser technology could not reliably deliver the required powers. However, with the improvement of pump laser technology Raman amplification is now an important means of expanding span transmission reach and capacity. We have deeply studied an analytical model for optical distributed Raman amplifiers (DRAs) in the transmission signal power and pump power within Raman amplification technique in co-pumped, counter-pumped, and bi-directional pumping direction configurations through different types of fiber cable media. The validity of this model was confirmed by using experimental data and numerical simulations.[...] Read more.