473 research outputs found

    Enhanced Mobility Solution In Mobile Ipv6 Network

    Get PDF
    The performance of Network Mobility (NEMO) used to manage network mobility does not provide satisfactory result in terms of delay, throughput and session continuity when dealing with multihomed mobile network. Enhanced Mobility Solution in Mobile IPv6 Network is extremely complex; the study addressed the multihoming issues of MIPV6 Networks on the basis of NEMO Basic Support, analyzes the benefits of multihoming and discusses implementation issues of all classes of multihoming possibilities. Additionally, Policy-based routing, as one of the multihoming benefits, is studied in particular. A framework based on policy based routing protocol was proposed for handling both the inbound and the outbound traffic on a mobile network, under specified policies which consider packet characteristics, current network situation and user preferences. The interface selection algorithm was based on NEMO implementation structure using a technique of mutihoming which was extended to MIPv6 concepts The outcome of this research work are: a designed policy protocol for policy messages communication between the Mobile Router and the Home Agent, the framework is simulated using Network Simulator (NS2) with an extension of mobiwan, the result shows the end to end delay, average end to end delay, overhead, optimal routing path, average inter-packet latency and throughput of the developed system. The information from the analysis of the result shows that the enhanced solution has drastically reduced average packet delay to minimum with 72.5 %( 0.040s to 0.011s), and end-end delay with 75 %( 0.020s to 0.005s) compared with NEMO solution. Overhead in the mobile network was maintained by 10bytes per nested level by keeping the session. The solution is important by enterprises in making decision to acquire internet connectivity for the purpose of connectivity redundancy and traffic load distribution optimization. This result is very important for time sensitive application that requires stable network condition

    A quality of service architecture for WLAN-wired networks to enhance multimedia support

    Get PDF
    Includes abstract.Includes bibliographical references (leaves 77-84).The use of WLAN for the provision of IP multimedia services faces a number of challenges which include quality of service (QoS). Because WLAN users access multimedia services usually over a wired backbone, attention must be paid to QoS over the integrated WLAN-wired network. This research focuses on the provision of QoS to WLAN users accessing multimedia services over a wired backbone. In this thesis, the IEEE 802.11-2007 enhanced data channel access (EDCA) mechanism is used to provide prioritized QoS on the WLAN media access control (MAC) layer, while weighted round robin (WRR) queue scheduling is used to provide prioritized QoS at the IP layer. The inter-working of the EDCA scheme in the WLAN and the WRR scheduling scheme in the wired network provides end-to-end QoS on a WLAN-wired IP network. A mapping module is introduced to enable the inter-working of the EDCA and WRR mechanisms

    Pyrazole-based analogs as potential antibacterial agents against methicillin-resistance staphylococcus aureus (MRSA) and its SAR elucidation

    Get PDF
    Methicillin-resistant Staphylococcus aureus (MRSA) is becoming lethal to humanity due to easy transmission and difficult-to-treat skin and flimsy diseases. The most threatening aspect is the rapid resistance development of MRSA to any approved antibiotics, including vancomycin. The development of new, efficient, and nontoxic drug candidate to fight against MRSA isolates is the need of the hour. The intriguing molecular structure and versatile bioactive pyrazole core attracting to development required novel antibiotics. This review presents the decade developments of pyrazole-containing derivatives with a broad antibacterial movement against diverged bacterial strains. In specific, we correlated the efficacy of structurally diversified pyrazole analogs against MRSA and discussed different angles of structure-activity relationship (SAR). The current survey highlights pyrazole hybrids' present scenario on MRSA studies, covering articles published from 2011 to 2020. This collective information may become an excellent platform to plan and develop new pyrazole-based small MRSA growth inhibitors with minimal side effects. (C) 2020 Elsevier Masson SAS. All rights reserved

    A Model-Based Simulator for Content Delivery Network using SimEvents MATLAB-Simulink

    Get PDF
    Abstract—Simulation methodology has become popular among network researchers due to the availability of various sophisticated and the flexibility of simulation packages in model construction and the result’s validation. The objective of our research is to introduce a discrete simulator tools known as SimEvents toolbox that runs on MATLAB-Simulink with the advantages of graphical user interface (GUI) system and a total customized simulator design. In this paper, we design a model-based network simulator named as “CDNlink”. CDNlink is designed based on a queuing model and functioned to study the content delivery networks (CDN). As a result, we have designed the simulator for Client, Router, DNS, and Server. Moreover, we simulate the CDN system for packet round trip time (RTT) and server’s queue length.Keywords—simulink, content delivery network, model-based simulation, simevents, cdnlink

    An autonomous router-based solution to detect and defend low rate DDoS attacks

    Get PDF
    Internet security was not a concern when the Internet was invented, but we cannot deny this fact anymore. Since all forms of businesses and communications are aligned to the Internet in one form or the other, the security of these assets (both infrastructure and content) is of prime importance. Some of the well known consequences of an attack include gaining access to a network, intellectual property thefts, and denial of service. This thesis focuses on countering flood-type attacks that result in denial of service to end users. A new classification of this denial of service attacks, known as the low rate denial of service, will be the crux of our discussion. The average rate of this attack is so low that most routers or victims fail to detect the attack. Thus far, no solution can counter the low rate attacks without degrading the normal performance of the Transmission Control Protocol. This work proposes a router-based solution to detect and defend low as well as high rate distributed denial of service attacks (DDoS). A per flow approach coupled with the Deterministic Packet Marking scheme is used to detect and block attack flows autonomously. The solution provides a rapid detection and recovery procedure during an attack

    VLSI implementation of 4×4 Mesh topology for network-on-chip

    Get PDF
    Nowadays, every electronic system, ranging from a small mobile phone to a satellite sent into space, has a System-on-Chip (SoC). Over the years, SoCs have undergone rapid evolution and are still progressing at a swift pace. But, due to this explosive evolution of semiconductor industry, the devices are scaling down at a rapid rate and hence, the SoCs today have become communication-centric. However, the existing bus architectures comprising of wires for global interconnection in SoC Designs are undergoing a design crisis as they are not able to keep up with the rate of scaling down of devices. In response to this crisis,Network-on-Chip (NoC) is an upcoming archetype, and is becoming a leading contender to replace the conventional bus architectures. Many Network-on-Chip topologies have been introduced in an attempt to tackle various chip architecture needs and routing techniques. A network simulator NS2 has been utilized in an attempt to simulate the functioning of some of the topologies like Mesh, Binary Tree, Torus and Butterfly Fat Tree (BFT). Their performances in various traffic scenarios has been assessed and compared taking throughput, maximum end-to-end latency and dropping probability as parameters. It can be inferred from simulation results that with respect to throughput and dropping probability, Torus topology has an upper hand over the others whereas BFT topology provides lower latency as compared to others. The Mesh topology is well-suited for incorporating regular-sized processing elements on a single chip. It is also quite simpler to design and incorporate various routing protocols into it as opposed to others. Thus, to validate the functioning of NoC on hardware, 4×4 Mesh architecture has been designed in VHDL and the same has been synthesized for Virtex II Pro FPGA

    A Crosslayer Routing Protocol (XLRP) for Wireless Sensor Networks

    Get PDF
    The advent of wireless sensor networks with emphasis on the information being routed, rather than routing information has redefined networking from that of conventional wireless networked systems. Demanding that need for contnt based routing techniques and development of low cost network modules, built to operate in large numbers in a networked fashion with limited resources and capabilities. The unique characteristics of wireless sensor networks have the applicability and effectiveness of conventional algorithms defined for wireless ad-hoc networks, leading to the design and development of protocols specific to wireless sensor network. Many network layer protocols have been proposed for wireless sensor networks, identifying and addressing factors influencing network layer design, this thesis defines a cross layer routing protocol (XLRP) for sensor networks. The submitted work is suggestive of a network layer design with knowledge of application layer information and efficient utilization of physical layer capabilities onboard the sensor modules. Network layer decisions are made based on the quantity of information (size of the data) that needs to be routed and accordingly transmitter power leels are switched as an energy efficient routing strategy. The proposed routing protocol switches radio states based on the received signal strength (RSSI) acquiring only relevant information and piggybacks information in data packets for reduced controlled information exchange. The proposed algorithm has been implemented in Network Simulator (NS2) and the effectiveness of the protocol has been proved in comparison with diffusion paradigm
    corecore