Analysis For Energy Efficient Network Model Considering Multiple Criteria

Authors

  • Pratibha Department of Computer Science, Technological Institute of Textile and Science, Opposite Baya Tourist Complex, Jagat Colony, Bhiwani, India
  • Dr. Mukesh Kumar Department of Computer Science, Technological Institute of Textile and Science, Opposite Baya Tourist Complex, Jagat Colony, Bhiwani, India

Keywords:

Mobile cloud computing, Fiber Optics, Attenuation, AES ENCRYPTION

Abstract

Proposed work has been proposed to minimize the queuing delay probability of congestion of packet size. The overall performance of energy efficient model gets boosted in case of proposed work at sender & receiver end. The gets reduced in case of proposed work. Attenuation is a measure of the loss of signal strength or light power that occurs as light pulses propagate through a run of multimode or single-mode fiber. Specially, the Measurements has been defined as the decibels or may be dB/km. Attenuation in fiber optics has been measured for wavelength 1310 nm and 1550 nm. It has been simulated with respect to distance, joints, and connector. Proposed work would boost the network lifetime and grow packet delivery ratio.

References

J. Tiemann and C. Wietfeld(2019), "Scalability, Real-Time Capabilities and Energy Efficiency in Ultra-Wideband Localization," in IEEE Transactions on Industrial Informatics.

Stefano Buzzi, Chih-Lin, Thierry E. Klein,(2016) “A review of Energy-Efficient methods for five generation Networks along with the further challenges”,

Khandelwal, Divya. (2017). Underwater Wireless Sensor Network: A Review. 10.13140/RG.2.2.16973.74720.

YousefEmami, Reza Javidan (2016) “An Energy-efficient Data Transmission Scheme in

Al-Quzweeni, Taisir E.H. El-Gorashi, L. Nonde, and Jaafar M.H.(2015) “Energy Efficient Network Function Virtualization in 5G Networks”,

KiranjitKaur, SandeepWaraich (2015) “Energy Efficient Wireless Sensor Networks based on Clustering Techniques”, International Journal of Computer Applications Volume 119 – No.11, June 2015

Dr. Mahesh Kumar(2015) TCP & UDP packets analysis using wire shark International Journal of Science, Engineering and Technology Research, Volume 4, Issue 7, July 2015

DavidPointcheval,MihirBellare,PhillipRogaway"Authenticated Key Exchange Secure Against Dictionary Attacks" Lecture Notes in Computer Science Vol.,B. Preneel ed., Springer-Verlag, 2000.

Lee.” Cryptanalysis of Lee–Lee authenticated key agreement scheme “Journal of Advances in Computer Networks, Volume 163, Issue 1, 5 April 2005, Pages 193-198

Ma, Di & Tsudik, Gene. (2010). Security in emerging WIFI networks [Invited Paper]. Wireless Communications, IEEE. 17. 12 - 21. 10.1109/MWC.2010.5601953.

Ferdous, Raihana & Muthukkumarasamy, Vallipuram & Sattar, Abdul. (2010). Trust Management Scheme for Mobile Ad-Hoc Networks. 896 - 901. 10.1109/CIT.2010.167.

Yang, Qing & Lu, Rongxing & Challal, Yacine & Laurent, Maryline. (2017). Security and Privacy in Emerging Wireless Networks. Security and Communication Networks. 2017. 1-2. 10.1155/2017/5618742.

Robert J. Boncella : AN OVERVIEW of WIRELESS SECURITY:” Communications of the Association for Information Systems (Volume 9, 2002) 269-282

Yih-Chun Hu, Member” Wormhole Attacks in Wireless Networks” IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006

Aleksi Penttinen” PRESENT ACTIVITY WITH FUTURE DIRECTION OF RESEARCH ON AD HOC NETWORKING: S” 2002

Downloads

Published

30-09-2019

How to Cite

Pratibha, & Dr. Mukesh Kumar. (2019). Analysis For Energy Efficient Network Model Considering Multiple Criteria. International Journal for Research Publication and Seminar, 10(3), 70–74. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/1275

Issue

Section

Original Research Article