5 research outputs found

    Temporary Redundant Transmission Mechanism for SCTP Multihomed Hosts

    Get PDF
    In SCTP’s Concurrent Multipath Transfer, if data is sent to the destined IP(s) without knowledge of the paths condition, packets may be lost or delayed. This is because of the bursty nature of IP traffic and physical damage to the network. To offset these problems, network path status is examined using our new mechanism Multipath State Aware Concurrent Multipath Transfer using redundant transmission (MSACMT-RTv2). Here the status of multiple paths is analyzed, initially and periodically thereafter transmitted. After examination, paths priority is assigned before transmission. One path is temporarily employed as redundant path for the failure-expected path (FEP); this redundant path is used for transmitting redundant data. At the end of predefined period, reliability of the FEP is confirmed. If FEP is ensured to be reliable, temporary path is transformed into normal CMT path. MSACMT-RTv2 algorithm is simulated using the Delaware University ns-2 SCTP/CMT module (ns-2; V2.29). We present and discuss MSACMT-RTv2 performance in asymmetric path delay and with finite receiver buffer (rbuf) size. We extended our experiment to test robustness of this algorithm and inferred exhaustive result. It is inferred that our algorithm outperforms better in terms of increasing the throughput and reducing the latency than existing system

    Load Balance: Energy Efficient Routing Protocol in Wireless Sensor Network

    No full text
    Energy  consumption  is  one  of  the  major  issue  in Wireless Sensor Network  (WSN)  which reduces the lifetime of the network. In this developed work an  Cluster based Energy Efficient Routing Protocol (CBEERP) , which is  gathering the sensor hubs  in the system  into  clusters,  in this manner it productively decreased the flooding  traffic  during  discover the routing. The proposed CBEERP will balance the Energy in the Group by using some second order nodes. The reinforcement High effective hubs replace the cluster head after the cluster reaches to its threshold energy level. This CBEERP will help the effectiveness and lifetime of the system

    Incursion Recognition Mechanism Based on Secure Network System

    No full text
    Internet based computing dissimilar services such as server storage and applications are shared on the internet. This makes cloud computing one of the most promising and rapidly growing technologies. As it relies on sharing computer resources, it is prone to various security risks. Individual such security issue is Distributed Denial of Services attack on cloud. A DDos assault can begin from anyplace in the system and normally overpowers the casualty server by sending countless. This paper deals with the prevention of DDos attacks and how honey pot approach can be used in cloud computing to counter DDos attacks

    Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data

    No full text
    The explosive increase of data brings new challenges to the data storage and supervision in cloud settings. These data typically have to be processed in an appropriate fashion in the cloud. Thus, any improved latency may originanimmense loss to the enterprises. Duplication detection plays a very main role in data management. Data deduplication calculates an exclusive fingerprint for each data chunk by using hash algorithms such as MD5 and SHA-1. The designed fingerprint is then comparing against other accessible chunks in a database that dedicates for storing the chunks. As an outcome, Deduplication system improves storage consumption while reducing reliability. Besides, the face of privacy for responsive data also arises while they are outsourced by users to cloud. Aiming to deal with the above security challenges, this paper makes the first effort to honor the notion of distributed dependable Deduplication system. We offer new distributed Deduplication systems with privileged reliability in which the data chunks are distributed across a variety of cloud servers. The protection needs an different of using convergent encryption as in foregoing Deduplication systems
    corecore