Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.description.abstractABSTRACT newline newline newline newline newlineTime slot communication involves a group of nodes communicating in specific time slots with intrinsic topology control schemes to maintain the network capacity for adhoc and sensor networks with guaranteed metrics Research in this area has attracted a lot of attention so as to reduce the traffic and ensure reliable transmission in the network A set of communication links between nodes use explicitly or implicitly optimal routing mechanisms in a wireless adhoc sensor network Desirable metrics include controllable parameters such as transmission power directional antennas and multi channel communications In this work the power consumption of nodes is minimized by topology control where each node instead of using its maximal transmission power sets its power to a certain level so that an effective network topology can be formed to satisfy a certain constraint The research work forms a dynamic topology and typically functions that can send data packets with or without checksum and with or without connection oriented technique Basically topology control aims to sustain this data propagation topology and enhance the network connectivity to provide reliable QoS Quality of Service and prolong the network lifetime Especially the most basic requirement of a network is that it be connected i e check for link state is done in this work newlineBroadcasting is a basic operation in wireless ad hoc networks with many applications including route discovery In broadcasting a node called the source node disseminates a message to all reachable nodes in the network A straightforward method of achieving this is through flooding in which each node retransmits every message that it receives for the first time A network with all the nodes in the communication range of each other requires only one transmission to deliver a message to all the nodes in the network newline newlineDependability of the nodes in a group network is very important for its successful applications in the engineering area Conventionally when a node has a failure it i e data from that node it needs to be identified and then discard it from the existing network and then reorganize with faultless nodes to continue with the normal operation This should be done without a tradeoff with the functional coverage of the networks In this research a novel self healing algorithm is implemented and tested such that the faulty node itself opts out of the network thereby avoiding the need for an extra logical or physical layer module to perform the detection newlineThe generic framework for intrusion detection and collsionless data transmission in time slot mode of communication scheme is cooperative based In this work this is supplemented by performing two popular encryption schemes namely Data Encryption standard DES and advanced encryption standard AES following an existing first layer security model for identifying the trusted nodes Thus the initial layer tracks the node details and identifies all legitimate hosts accessing the data server and subsequently performs intrusion detection The encryption and the time slot communication is implemented easily in Linux based hardware with the code written in python and uses open source tools This eliminates the need for licensed software and other vendor related problems Additionally an energy friendly scheme is proposed to draw smoother and lower current for minimizing battery charge consumption so as to suit for hard real-time applications Conventional reported works are more suited for soft real time applications only and are observed to be less energy friendly The studied metrics include but not limited to latency throughput number of collisions among the broadcasting nodes queuing model study effect of variable arrival and departure rates of packets etc along with comparison studies newlineKeywords Slotted time communication Network security AES Encryption scheme DES encryption scheme BlowFish encryption scheme Link state algorithm Schedulers Queuing model Input and virtual output queuing newline newline
dc.publisher.universityDr. M.G.R. Educational and Research Institute
dc.publisher.institutionDepartment of Electronics and Communication Engineering
Appears in Departments:Department of Electronics and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_cover page ,table.pdfAttached File436.07 kBAdobe PDFView/Open
02_chapter.pdf2.4 MBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.