Papers by Sanjeev Shrivastava
2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
Sensor nodes transmit data packets from source to destination in wireless sensor network for that... more Sensor nodes transmit data packets from source to destination in wireless sensor network for that they utilize multi-hop routing. While sending data more energy is consumed. Hence for gathering data in interesting area mobile elements are instigate. Delay to transmit long data is major problem in numerous proposed data collection algorithm. Hence to resolve this problem proposed a data collection algorithm with mobile elements. Here for collecting event packets rely on moving window mechanism mobile elements are dispatched. Hence experimental result shows our proposed system can lower data delay.
Bookmarks Related papers MentionsView impact
International journal of scientific research in science, engineering and technology, 2019
Wireless sensor networks are the networks, which can detect, break down and afterward convey the ... more Wireless sensor networks are the networks, which can detect, break down and afterward convey the data. The data collection at sensor nodes devours a great deal of vitality however sensor nodes are vitality requirements. The vast majority of the WSN designs comprise of stationary nodes, which are vigorously sent over a detecting zone. As of late, a few WSN models dependent on mobile elements (MEs) have been proposed. The use of Mobile elements brought about a more up to date mode to limit and give a vitality utilization in wireless sensor networks (WSN). The vast majority of them create versatility to manage the issue of data collection in WSNs. The booking of mobile elements needs to address the navigate design and furthermore the season of data collection from individual sensor nodes. Wireless Sensor Network with MEs and give a total course of action of their models, in light of the job of the MEs. Mobile component trajectory control plan to diminish the detected data collection de...
Bookmarks Related papers MentionsView impact
New mobile devices and mobile Internet applications are transforming the traditional concept of c... more New mobile devices and mobile Internet applications are transforming the traditional concept of computing and user’s experience. Applications which even initially do not required Internet connectivity now using Internet to provide update, new features, advertisements and add-on in an application. Context-aware computing is a mobile computing paradigm which makes mobile devices and applications smarter in which applications can discover, interpret the surrounding environment and take advantage of contextual information by using it proactively and intelligently. In this paper a context aware framework is proposed at transport layer. This framework provides information to the mobile applications which improves user’s experience and open new dimensions to provide new features to it. Frame work improve the QoS of the system by incorporating adaptation engine at application layer and transport layer context system at transport layer for an individual’s changing context. Keywords— context ...
Bookmarks Related papers MentionsView impact
Mobile applications and mobile application environment of next generation networks require enhanc... more Mobile applications and mobile application environment of next generation networks require enhanced quality of service (QoS) to support user's service level agreement (SLA). This paper presents an adaptation technique at transport layer to minimize the impact of varying and adverse network condition along with security and priority to satisfy the SLA. The paper extends the transport layer functionalities to manage the SLA by selecting network layer parameters and application layer parameters. The given approach provides a performance based on the analysis of mapping network layer and application layer availability and security to network concerned parameters like security and priority by using fuzzy rules. Network parameters scrutinize at transport layer to get the information about speed, delay, jitter and loss. Application layer provides information such as priority, security to the extended functionalities of transport layer. The objective is preserving the QoS perceived as p...
Bookmarks Related papers MentionsView impact
New mobile devices and mobile Internet applications are transforming the traditional concept of c... more New mobile devices and mobile Internet applications are transforming the traditional concept of computing and user’s experience. Peer to peer (P2P) mobile systems are autonomous and decentralized systems. Each peer in the network is heterogeneous and is not fully reliable. In this paper it has been tried to estimate the creditability of each peer in the network using Mamdani Fuzzy Inference Systems. Application programs or user take decision on various things with the help of proposed fuzzy system. This paper is extension and implementation of fuzzy reference engine of a frame work [1] works at transport layer context system in the transport layer for an individual’s changing context. The proposed system is also useful in solving the large scale data dissemination problem by using creditability of mobile system user. Keywords-Mobile System, Fuzzy Inference System, P2P, Mamdani FIS, Creditability, QoS
Bookmarks Related papers MentionsView impact
Security is the most important parameter for ideal network. Various attacks are of great challeng... more Security is the most important parameter for ideal network. Various attacks are of great challenge and proved as obstacles for constructing the ideal network. Distributed Denial of Service (DDoS) is one of threats which damage the network applications and affect the bandwidth consumption .There are many Legitimate Traffic detecting mitigation algorithms exists to overcome the network attacks. This project mainly concentrates on implementing the Legitimate Chance Inspection Algorithm (LCIA) for Optimizing DDOS Attacks. In LCIA the number of packets being malicious under the Legitimate packets are removed for improving the network performance .There are two challenges in order to overcome the DDoS, firstly there is need to identify the machine from which malicious flow is generated and secondly minimizing the attack of those malicious attack on legitimate traffic flow. In LCIA, basically a mathematical equation and is implemented to find the number of malicious packets in the network.
Bookmarks Related papers MentionsView impact
The Internet Engineering Task Force is working on expanding and extending the TCP/IP model to sup... more The Internet Engineering Task Force is working on expanding and extending the TCP/IP model to support mobility and multimedia and real-time applications on the Internet. Thus, new protocols, amendment of existing protocols have been developed. Also there has been a significant increase of interest in enhancing quality of service (QoS) constraints in mobile systems. The proposed network system architecture and mechanisms to provide real-time services to mobile users. Mobility experiences wide variations of quality of service and to obtain mobility independent service guarantees, a mobile system needs to make advance resource reservations. In this paper Transport Layer Management System (TLMS) is introduced at Transport Layer of TCP/IP reference model. TLMS ensure user's service level agreement (SLA) by monitoring, controlling and allocation of resources at server side with the help of application layer and network layer adaptation engine.
Bookmarks Related papers MentionsView impact
Uploads
Papers by Sanjeev Shrivastava