Analysis For Energy Efficient Network Model Considering Multiple Criteria
Keywords:
Mobile cloud computing, Fiber Optics, Attenuation, AES ENCRYPTIONAbstract
Proposed work has been proposed to minimize the queuing delay probability of congestion of packet size. The overall performance of energy efficient model gets boosted in case of proposed work at sender & receiver end. The gets reduced in case of proposed work. Attenuation is a measure of the loss of signal strength or light power that occurs as light pulses propagate through a run of multimode or single-mode fiber. Specially, the Measurements has been defined as the decibels or may be dB/km. Attenuation in fiber optics has been measured for wavelength 1310 nm and 1550 nm. It has been simulated with respect to distance, joints, and connector. Proposed work would boost the network lifetime and grow packet delivery ratio.
References
J. Tiemann and C. Wietfeld(2019), "Scalability, Real-Time Capabilities and Energy Efficiency in Ultra-Wideband Localization," in IEEE Transactions on Industrial Informatics.
Stefano Buzzi, Chih-Lin, Thierry E. Klein,(2016) “A review of Energy-Efficient methods for five generation Networks along with the further challenges”,
Khandelwal, Divya. (2017). Underwater Wireless Sensor Network: A Review. 10.13140/RG.2.2.16973.74720.
YousefEmami, Reza Javidan (2016) “An Energy-efficient Data Transmission Scheme in
Al-Quzweeni, Taisir E.H. El-Gorashi, L. Nonde, and Jaafar M.H.(2015) “Energy Efficient Network Function Virtualization in 5G Networks”,
KiranjitKaur, SandeepWaraich (2015) “Energy Efficient Wireless Sensor Networks based on Clustering Techniques”, International Journal of Computer Applications Volume 119 – No.11, June 2015
Dr. Mahesh Kumar(2015) TCP & UDP packets analysis using wire shark International Journal of Science, Engineering and Technology Research, Volume 4, Issue 7, July 2015
DavidPointcheval,MihirBellare,PhillipRogaway"Authenticated Key Exchange Secure Against Dictionary Attacks" Lecture Notes in Computer Science Vol.,B. Preneel ed., Springer-Verlag, 2000.
Lee.” Cryptanalysis of Lee–Lee authenticated key agreement scheme “Journal of Advances in Computer Networks, Volume 163, Issue 1, 5 April 2005, Pages 193-198
Ma, Di & Tsudik, Gene. (2010). Security in emerging WIFI networks [Invited Paper]. Wireless Communications, IEEE. 17. 12 - 21. 10.1109/MWC.2010.5601953.
Ferdous, Raihana & Muthukkumarasamy, Vallipuram & Sattar, Abdul. (2010). Trust Management Scheme for Mobile Ad-Hoc Networks. 896 - 901. 10.1109/CIT.2010.167.
Yang, Qing & Lu, Rongxing & Challal, Yacine & Laurent, Maryline. (2017). Security and Privacy in Emerging Wireless Networks. Security and Communication Networks. 2017. 1-2. 10.1155/2017/5618742.
Robert J. Boncella : AN OVERVIEW of WIRELESS SECURITY:” Communications of the Association for Information Systems (Volume 9, 2002) 269-282
Yih-Chun Hu, Member” Wormhole Attacks in Wireless Networks” IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006
Aleksi Penttinen” PRESENT ACTIVITY WITH FUTURE DIRECTION OF RESEARCH ON AD HOC NETWORKING: S” 2002
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.