-
Mobile Radio Evolution
Issue:
Volume 3, Issue 3-1, November 2015
Pages:
1-6
Received:
2 July 2015
Accepted:
13 July 2015
Published:
17 September 2015
Abstract: All over the world, wireless communication services have enjoyed dramatic growth over the past 25 years. Mobile communication is the booming field in the telecommunications industry. The cellular network is the most successful mobile communication system, used to transmit both voice and data. This paper provides a depth view about the technologies in mobile communication from the evolution of the mobile system. First from the evolution, second generation (2G), third generation (3G), fourth generation (4G) to fifth generation (5G) in terms of performance requirements and characteristic.
Abstract: All over the world, wireless communication services have enjoyed dramatic growth over the past 25 years. Mobile communication is the booming field in the telecommunications industry. The cellular network is the most successful mobile communication system, used to transmit both voice and data. This paper provides a depth view about the technologies ...
Show More
-
Implementation of Software-Efficient DES Algorithm
Mohammad Taghipour,
Arash Moghadami,
Behbood Moghadam Naghdi Shekardasht
Issue:
Volume 3, Issue 3-1, November 2015
Pages:
7-22
Received:
19 August 2015
Accepted:
29 August 2015
Published:
17 September 2015
Abstract: By increasing development of digital telecommunication and the increase of sending and receiving data of various network of data transfer, protection of the safety of data are the most important necessities of the current world. The increase of different bank trading, increasing use of smart cards, moving to electronic government, are the examples of significance of this issue. DES algorithm is introduced by IBM company and is applied for many years by technology and standard institute of US as data encryption standard algorithm and it is also applied in many applications as networks as ATM and smart cards. Software-efficient implementation of this algorithm is one of the important research issues for engineers working in this field as we can perform rapidly on smart cards. In this study, an efficient algorithm implementation by MATLAB and C language is presented and is compared with the latest works in this field.
Abstract: By increasing development of digital telecommunication and the increase of sending and receiving data of various network of data transfer, protection of the safety of data are the most important necessities of the current world. The increase of different bank trading, increasing use of smart cards, moving to electronic government, are the examples ...
Show More
-
Infrastructure Security in a Paediatric Hospital: Architectural Evolution, Virtualization and Network Management Systems
Domenico Cacciari,
Daniel Zotti,
Edoardo Sossa,
Michele Bava
Issue:
Volume 3, Issue 3-1, November 2015
Pages:
23-26
Received:
21 August 2015
Accepted:
22 August 2015
Published:
17 September 2015
Abstract: The match of research activity, paediatric healthcare services offered by the IRCCS Burlo and internet access of long-stay patients produces a complex situation regarding IT security, network architecture and management. Often at the most inopportune time computers and other electronic devices quit working so the IT Staff has to ensure the proper functioning of equipment needed by the hospital’s activity, the access to the network ensuring both intranet and internet protection and a strong access control to prevent as much as possible any fault or data loss. By the IT staff studies came to light the needs of a network infrastructure built ad hoc for the Burlo environment and a strength and secure server farm able to grant a strong service continuity in order to gear secure and reliable workstations. This paper shows how the IT Staff has reached that, implementing some Network Management System and capitalizing on virtualization capability.
Abstract: The match of research activity, paediatric healthcare services offered by the IRCCS Burlo and internet access of long-stay patients produces a complex situation regarding IT security, network architecture and management. Often at the most inopportune time computers and other electronic devices quit working so the IT Staff has to ensure the proper f...
Show More
-
Power Management of Ad Hoc Routing Protocols Using Mobility Impact and Magnetic Resonance
Manish Bhardwaj,
Anshima Singh
Issue:
Volume 3, Issue 3-1, November 2015
Pages:
27-33
Received:
30 September 2015
Accepted:
7 October 2015
Published:
23 October 2015
Abstract: The performance of an ad hoc routing protocol is highly dependent on the mobility model used in the ad hoc networks. Most of previous work used only Random Waypoint mobility model, which is unrealistic in many situations. The mobile nodes are often power constrained so that energy conservation is also an important issue on evaluating protocols performance. This issue can be sort out in this paper with the help of two concepts: energy conservation based on different mobility models and concept of wirelessly recharges the networks node. Most of them focused on metrics such as packet delivery ratio, delay, and route optimality. In this paper, three on demand routing protocols AODV, DSR and TORA would be evaluate at power management metrics. These protocols are simulated and compared under three different mobility models: Random Waypoint, RPGM, and Manhattan Grid and various scenarios.
Abstract: The performance of an ad hoc routing protocol is highly dependent on the mobility model used in the ad hoc networks. Most of previous work used only Random Waypoint mobility model, which is unrealistic in many situations. The mobile nodes are often power constrained so that energy conservation is also an important issue on evaluating protocols perf...
Show More
-
Energy Conservation in Mobile Ad Hoc Network Using Energy Efficient Scheme and Magnetic Resonance
Manish Bhardwaj,
Ashish Bansal
Issue:
Volume 3, Issue 3-1, November 2015
Pages:
34-39
Received:
30 September 2015
Accepted:
7 October 2015
Published:
23 October 2015
Abstract: A mobile ad hoc network is a collection of wireless mobile nodes that communicate with one another without any fixed networking infrastructure. Since the nodes in this network are mobile, the energy management and energy conservation become very critical in mobile ad hoc network. The nodes in this network have limited battery power and limited computational power with a small amount of memory. Such nodes must conserve energy during routing to prolong their usefulness and increase network lifetime. This research paper proposes a scheme that takes into consideration the energy awareness during route selection. This scheme observes power status of each and every node in the topology and further ensures the fast selection of routes with minimal efforts and faster recovery. Along with this scheme also introduce the concept of wirelessly recharge the nodes of the networks. The scheme is incorporated with the AODV protocol and introduces new protocol EEAODV the performance has been studied through simulation over NS-2.34.
Abstract: A mobile ad hoc network is a collection of wireless mobile nodes that communicate with one another without any fixed networking infrastructure. Since the nodes in this network are mobile, the energy management and energy conservation become very critical in mobile ad hoc network. The nodes in this network have limited battery power and limited comp...
Show More