Volume-14 ~ Issue-1
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Implementation of Cellular IP and Its Performance Analysis |
| Country | : | India |
| Authors | : | Sujoy Halsana |
| : | 10.9790/0661-1410112 ![]() |
Abstract: In the current Cellular IP architecture, only one gateway serves the entire CIP network. So, the gateway is single point of failure for all the mobile hosts who rely on it to be connected to the Internet. Cellular IP requires that a mobile host be using exactly one gateway to the Internet backbone with Mobile IP at a time. When multiply gateways are used in a cellular IP network, the optimal design for the multiple domains is needed. The cellular IP protocol provides better performance for hand-off than other protocol using micro-mobility. A set of base station cluster together on the same cellular IP network. This kind of domain base network is superior to mobile IP in support of routing optimization and QoS. Experiment were conduct to explore load our protocol and survey the packet loss. This result so that the load of control packet is negligible for cellular IP and the number of lost packet can be successfully reduced. This thesis developed to design cellular IP architecture and fault detection mechanism and recover the protocol of cellular IP.
Keywords; Protocol Overview, Network Model, Routing, Handoff, Paging, Security, Implement Cellular IP Network Model, Protocol Details, Simulation Results, Conclusions.
[1] P. Bhagwat, C. Perkins, S. Tripathi, "Network Layer Mobility: an Architecture and Survey", IEEE Personal Communications Magazine, Vol. 3, No. 3, pp. 54-64, June 1996.
[2] Andr_as G. Valk_o, "Cellular IP: A New Approach to Internet Host Mobility", ACM Computer Communication Review, January 1999.
[3] "WaveLAN Air Interface," Data Manual, AT&T Corporation, Doc. No. 407-0024785 Rev. 2(draft), July 11, 1995.
[4] M. Mouly, M-B. Pautet, "The GSM System for Mobile communications," published by the authors, ISBN 2-9507190-0-7, 1992.
[5] C. Perkins, editor, "IP Mobility Support", Internet RFC 2002, October 1996.
[6] S. Blake, D. Black, M. Carlson, E. Davis, Z. Wang, W. Weiss, "An Architecture for Di erentiated Services", Internet RFC 2475, December 1998. [7] A. T. Campbell, Gomez, J., Kim, S., Turnyi, Z., Wan, C-Y, and A, Valko, "Design, Implementation and Evaluation of Cellular IP", IEEE Personal Communications, June/July 2000.
[8] Andrew T. Campbell, Jaview Gomez, Sanghyo Kim, and Chieh-Yih Wan, "Comparison of IP Micromobility Protocols", IEEE Wireless Communications, February 2002.
[9] Zach D. Shelby, Petri Mahonen, Dionisios Gatzounas, Alessandro Inzerilli, and Ville Typpo, "Cellular IP route Optimization", <draft-shelby-ciprouteoptimizationn-00.txt".
[10] A. Valko, "Cellular IP – new approach of Internet host mobility", ACM Computer Communication Reviews, January, 1999.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Wimax is a wireless metropolitan area network (MAN) technology that provides interoperability, carrier class broadband wireless connectivity to fixed, portable for the last mile. Wimax (Worldwide interoperability for microwave access) is based on IEEE 802.16 standards that provide wireless access to metropolitan area networks and there are several security problems The Wimax technology has great impact in wireless communication and has notched the top position in the wireless technology. But there still are a lot of securities concerns while using such wireless technologies, especially for Wimax where we have to transfer secure data at high rate from one station to another station. Wimax works at the longer distances so there is more security required to protect the communication from attacks and threats. Wimax is a wireless network which is considered to be more vulnerable to attacks and threats than wired network as data transfer publicity in open areas. For secure the communication in Wimax various algorithms and security protocols are used. The researchers have developed various mechanisms which have made a great impact on secure communications in Wimax. Various encryption and authentication mechanisms are being used for secure communication. The concept of use multiple keys with RSA algorithms using PKM (Privacy & Key management) protocol has been used for secure communication. This concept is extended in this paper by combining PGP (Pretty Good Privacy) protocol with RSA algorithm to further improve the secure communication in Wimax. This paper compares the performance of Hard Wimax and Soft Wimax using PKM and PGP protocols over RSA. The performance is analyzed over NS 2.34 simulator using delay, throughput and packet delivery as performance metrics. Keywords - PGP, PKM, RSA, WIMAX, WMAN.
[1] Lu, K., Qian, Y. and Chen, H. (2007), "A Secure and Service-Oriented Network Control Framework for Wimax Networks", IEEE Communication Magazine, May 2007.
[2] Habib, M., Ahmed, M. (2010), "A Review of Some Security Aspects of Wimax & Converged Network", IEEE 2010 Second International Conference on Communication Software and Networks.
[3] Altaf,A., Ahmed,A.and Javed,M. (2008), "Security Enhancement for Privacy and Key Management Protocol in IEEE 802.16e-2005".IEEE Ninth ACIS International Conference on Software Engineering, Artificial Intelligence,Networking and Parallel/Distributed Computing.
[4] Taha, A., Abdel-Hamid, A., and Tahar, S. (2009), "Formal Verification of IEEE 802.16 Security Sub layer Using Scyther Tool", 2009 ESR Grops France.
[5] http://freewimaxinfo.com/pkm-protocol.html.
[6] Altaf,A., Ahmed,A.and Javed,M. (2008), "Security Enhancement for Privacy and Key Management Protocol in IEEE 802.16e-2005".IEEE Ninth ACIS International Conference on Software Engineering, Artificial Intelligence,Networking and Parallel/Distributed Computing.
[7] http://en.wikipedia.org/wiki/Pretty_Good_Privacy.
[8] http://en.wikipedia.org/wiki/RSA_28algorithm
[9] Yang, F. (2011), "Comparative Analysis on TEK Exchange between PKMv1 and PKMv2 for Wimax", IEEE 2011 School of Information and Security Engineering, Zhongnan University of Economics and Law.
[10] Xu, S., Huang, T., and Matthew, M. (2008), "Modelling and Analysis of IEEE 802.16 PKM Protocol using CasperFRD", IEEE 2008.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Sliced Ridgelet Transform for Image Denoising |
| Country | : | India |
| Authors | : | V. Krishna Naik, Prof. Dr. G. Manoj Someswar, R. B. Dayananda |
| : | 10.9790/0661-1411721 ![]() |
Abstract: Image denoising based on ridgelet transforms gives better result in image denoising than standard wavelet transforms. In this research work, the researcher introduces a new approach for image denoising that is based on ridgelets computed in a localized manner and that is computationally less intensive than curvelets, but similar donising performance. The projection of image at a certain angle is computed at a certain angle, but only on a defined slice of the noisy image. After that, ridgelet transform of each slice is computed , to produce the ridgelet coefficients for an image.The denoising operation corresponds to a simple thresholding of these ridgelet coefficients.
[1] A. Averbuch, R. R. Coifman, D. L. Donoho, M. Israeli, and J. Waldén, ―Polar FFT, rectopolar FFT, and applications,‖ Stanford Univ., Stanford, CA, Tech. Rep., 2000.
[2] ―Monoscale ridgelets for the representation of images with edges,‖Dept. Statist., Stanford Univ., Stanford, CA, Tech. Rep., 1999, submitted for publication.
[3] , ―Curvelets—A surprisingly effective nonadaptive representationfor objects with edges,‖ in Curve and Surface Fitting: Saint-Malo 1999,A. Cohen, C. Rabut, and L. L. Schumaker, Eds. Nashville, TN: Vanderbilt Univ. Press, 1999.
[4] G.Y. Chen, T.D. Bui, A. Krzy˙zak, Image denoising with neighbour dependency and customized wavelet and threshold, Pattern Recognition 38 (1) (2005) 115–124.
[5] D.L. Donoho, A.G. Flesia, in: J. Stoecker, G.V. Welland (Eds.), Digital ridgelet transform based on true ridge functions, Beyond Wavelets, Academic Press, New York, 2001.
[6] G.Y. Chen, T.D. Bui, A. Krzy˙zak, Rotation invariant pattern recognition using ridgelet, wavelet cycle-spinning and Fourierfeatures, Pattern Recognition 38 (12) (2005) 2314–2322.
[7] J.L. Starck, E.J. Candes, D.L. Donoho, Astronomical image representation by the curvelet transform, Astron. Astrophys. 2 (2003) 785–800.
