9 research outputs found

    A Survey of QoS Routing Protocols for Ad Hoc Networks

    Get PDF
    The aim of this paper is to give a big survey in enhancing the balance of the routing load and the consumption of resources using network layer metrics for the path discovery in the MAODV protocol. A ad hoc network (AD HOC NETWORKS) consists of a collection of wireless mobile nodes, which form a temporary network without relying on any existing infrastructure or centralized administration. The bandwidth of the ad hoc networks architecture is limited and shared between the participating nodes in the network, therefore an efficient utilization of the network bandwidth is very important. Multicasting technology can minimize the consumption of the link bandwidth and reduce the communication cost too. As multimedia and group-oriented computing gains more popularity for users of ad hoc networks, the effective Quality of Service (QoS) of the multicasting protocol plays a significant role in ad hoc networks. In this paper we propose a reconstruction of the MAODV protocol by extending some featuring QoS in MAODV. All simulations are prepared with the NS2 simulator and compare the performance of this algorithm with the MAODV algorithm. The achieved results illustrate faster path discovery and more performing routing balance in the use of MAODV-Extension.This paper would give relatively a modest support in Mobile Technology according to QoS communication

    The evaluation of Network Performance and CPU Utilization during transfer between virtual machines

    Get PDF
    The aim of this paper is to test the performance of network communication between virtual machines during the live migration while a controlled failure occurs. Also we want to test the CPU utilization between the virtual machines in different hosts and to make a comparison with the live migration in different physical nodes. We want to introduce a script in C++ which will improve the performance of migration during the failure controller phase. Another script is built to test the CPU utilization on host computers when memory utilization is increased or decreased. We have used Httperf benchmark to test this script. Requests are sent from client machine to server machine with IPs of C class located in different hosts. These requests are some files in C which execute a multiplication of 2 square matrices with range 5, at the moment they arrive in the destination node. We have used Para-virtualization approach (Xen-Hypervisor), because it gives more flexibility and tolerance to researchers

    OAuth2.0 in Securing APIs

    Get PDF
    Today’s modern applications are mostly designed around API’s. API’s are used for a variety of things such as passing data to another webservice reading data from a database etc. The problem with this is that not all the API’s are secure. Most of the today’s API’s are old and rely only on an authentication token where the user data often had to share their credentials with the application to enable such an API call on their behalf or string them, which is often hardcoded. We will focus on OAUTH 2.0 as new protocol in securing our API’s. This is a new protocol based on delegation of authorization, dynamically changing authentication string based on user session or application session. We will go on this different mode of authentication and show you how to use them properly. We will set up this with a Web API integrated with OAUTH and a client application that will stimulate the requests to our API’s
    corecore