Survey on Security Threats in Cloud Computing IJTSRD
Cloud computing is a new and innovative technology, which serves resources as a service to cloud user. Cloud computing technology provides optimum utilization of computing resources in less cost, which attract organization to be part of cloud customer market. Day by day cloud users are getting increases. Cloud serves IaaS, PaaS, SaaS and DaaS as […]
A Combinational Buffer Management Scheme in Mobile Opportunistic Network IJTSRD
Nodes in Mobile Opportunistic Network (MON) have to cache packets to deal with the intermittent connection. The buffer management strategy obviously impacts the performance of MON, and it attracts more attention recently. Due to the limited storage capacity of nodes, traditional buffer management strategies just drop messages based on the property of message, and they […]
Grid-Based Multipath with Congestion Avoidance Routing Protocol IJTSRD
This Paper gives information about Grid base multipath wireless sensor network. We give a brief introduction about wireless sensor network, how sensor works in this network. How the Routing is done and if there is congestion detected in sensors networks and then how it can be solved. Routing protocols are also classified in several types […]
Enhanced Performance for Military Vehicles Using Clustering Algorithm in VANET IJTSRD
Vehicular Ad-hoc networks are established between mobile vehicles equipped with wireless interfaces that could be either of heterogeneous or homogeneous nature. Vehicles and road side fixed equipment’s both of them can be either private belonging to individuals or companies or public means of transport service providers. In this network every participating vehicle works as single […]
M2M Networking Architecture for Data Transmission and Routing IJTSRD
We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server-free and router-free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases: routing and data […]