The BIT-Jan-Apr 2013

The BIT-Jan-Apr 2013

INFORMATION TECHNOLOGY GENERATION CLOUD COMPUTING WIRELESS NETWORK ARCHITECTURE JANUARY-APRILthe 2013 the Bullettin ofBIT Information Technology TECHNOLOGY 4G A Dream from “Always Connected” to “Always Best Connected” PAGE 4 FACULTY CORNER TRAFFIC FAULTY visit ROUTER For Tcp Congestive Loss Control Over Wireless Network PAGE 5 NEW @ IT TRENDING NEW TECHNOLOGIES PAGE 18 http://rajagiritech.ac.in Department of Information Technology Rajagiri School of Engineering & Technology Rajagiri Valley, Kakkand, Kochi HOD’S MESSAGE Way To Excellence – Role Of Alumni Alumni are the ambassadors of an educational institution in society and industry. They are impor- tant stakeholders of college and lifelong family members of an institution working at various fields thethe Bullettin of Information BIT Technology and at wide geographical locations. Alumni can support the institution and its students by giving truthful feedback on design and scope of the courses, promote entrepreneurship, enlarge outreach, promote industrial interaction and research, training to students, placement, scholarship etc. They can give guidance for orga- ON CREATIVE DESK nizing college programs like teaching, research, innovation and technology transfer to meet the present market and industry needs. Alumni support is very important for the growth and prosperity of the college. They can give valu- Editors able and trusted feedback along with newer ideas needed from time to time to keep the insti- Prof. Kuttyamma A.J. tute in top gear ahead of time. The college and its alumni can function together as one family to (HOD- Department of Information Technology) reach excellence. Mariam Varghese Alumni can support the institute in many ways: Assistant Professor • They can contribute to make education quality and cost competitive. Chinchu Krishna S Assistant Professor • They can bring latest professional advancement in college. • They can bridge the gap between industry and institute. Student Editors • They can bring best within the students. Ashwin Thomas • They can contribute to bring world class professional vision and mission to college. Smitha J There are various methods to grab the support of alumni: Akhitha M.D • By associating alumni in attaining the goal or vision of the institute.• Having active alumni association. Illustrations • Arranging alumni meet every year in the institute. Krishnadas Naduvath Programmer • Including alumni in the body of governors of the institute. • Arrange faculty members from college to associate with alumni for organizing activities. Photo Courtsey • Build up centres of excellence like patent and IPR, incubator, research park, venture fund etc Google Images under alumni initiative. “Coming together is a beginning, keeping together is a progress, and working together is a success” KUTTYAMMA A J PROFESSSOR & HOD, DIT contents 4 4G Technology A Dream from “Always Connected” to “Always Best Connected” . 5 TRAFFIC FAULTY ROUTER DETECTION For Tcp Congestive Loss Control Over Wireless Network. page 4 6 NEW GENERATION CHIPSET- TEGRA 4 Nvidia has announced their next generation Tegra 4 chipset for simfree smartphones, tablets and notebooks. 7 SIXTH SENSE FOR SALE!! ‘Sixth Sense’ as we all know, is the ‘Godly’ ability to understand the cause and relationship behind many events, which is beyond the understanding of the intellect. 9 GOOGLE GLASSES Google’s Project Glass is Google’s attempt to make wearable computing mainstream page 14 11 DIGITS – WRIST WORN SENSOR Digits is a wrist-worn sensor that recovers the full 3D pose of the user’s hand. This enables a variety of freehand interactions on the move. page 5 page 20 13 ROLLTOP LAPTOPS This newly designed laptop uses flexible OLED display on the panel and keyboard. 14 VIRTUAL KEYBOARD Virtual Keyboard is just another example of today’s computer trend of ‘smaller and faster’. 15 MULTI-TASKING MICRO-LIGHTS Tiny LED Lights now being developed could deliver wi-fi like Internet communications 16 BUYING A SMARTPHONE Everyday new Smartphones are launched. page 13 18 TRENDING NEW TECHNOLOGIES Virtual Keyboard is just another example of today’s computer trend of ‘smaller and faster’. 20 Department Activities the BIT, the Bullettin of Information Technology 3 Faculty Corner 4G Technology A Dream from “Always Connected” to “Always Best Connected” PREETHA KG Assistant Professor, DIT OR FOURTH GENERATION mobile systems focus on seamlessly integrat- ing the existing wireless technologies including GSM, wireless LAN, and Bluetooth. 4G systems support com- 4Gprehensive and personalized services, providing stable system performance and quality service. The 4G wireless uses Orthogonal Frequency Division Multiplexing (OFDM), Ultra Wide Radio Band (UWB), and Millimeter wireless. Data rate of 20mbps is employed and mobile speed will be up to 200km/hr. The high performance is achieved by the use of long term channel prediction, in both time and frequency, scheduling among users and smart antennas combined with adaptive mod- at each unit time for every single service turns out to be a ulation and power control. Frequency band is 2-8 GHz. It gives herculean task. Vertical handoffs, billing frauds, service theft, the ability for worldwide roaming to access cell anywhere. It sup- privacy attacks and the like may also create nuisance in effi- ports interactive multimedia, voice, streaming video, internet and cient selection of network and its utilization. Network architec- other broadband services, high speed, high capacity, and low cost tures will play a key role in implementing the features required per bit, better scheduling and call admission control techniques, to address these issues. infrastructure to handle pre existing 3G systems along with other wireless technologies. One of the most challenging problems facing deployment of 4G technology is how to access several different mobile and 4Gsystems aim at implementing a global communication network wireless networks. by integrating all existing telecommunication standards. The main expectation about 4G is the freedom for the users to choose and Three possible architectures are : switch between services provided by various service providers integrated into the 4G network. A prominent aspect of 4G systems (a) Using a multimode device- A multimode device lets the is the network selection scheme by which the users can choose the user, device, or network initiate handoff between networks best connected network available for each of the services required. without the need for network modification or interworking devices. Major issues which are delaying the commercial release of 4G devices include network selection, vertical handoff, pricing & billing (b) An overlay network—consisting of several universal access issues, jamming and spoofing, location privacy, location coordi- points (UAPs) that store user, network, and device informa- nation, network failure & backup and QoS support. To choose the tion—performs a handoff as the user moves from one UAP suitable technology for each service at a particular place and time, to another. assessing services provided by each of the service providers can be a tedious and complicated task. Because of the heterogeneous (c) Common access protocol -A device capable of automati- nature of the 4G system network selection became a NP-hard cally switching between networks is possible if wireless net- problem. The Network Selection in 4G depends on various crite- works can support a common protocol to access a satellite- ria like bandwidth, security, cost of service, performance in het- based network and another protocol for terrestrial networks. erogeneous network, user preference and so forth. Thus analyz- ing each of these parameter values for all the networks available 4 the BIT, the Bullettin of Information Technology Faculty Corner Traffic Faulty Router Detection for Tcp Congestive Loss Control Over Wireless Network MUJEEBUDHEEN KHAN A.I Assistant Professor, DIT An idea to sort out these problems is to compromised router. develop a compromised router detection HE INTERNET IS not a safe protocol that dynamically infers the precise DESTINATION DETERMINATION: place, unsecured routers are number of congestive packet losses that easily compromised within a will occur. Once the congestion ambiguity In destination determination we imple- minute in internet and even is removed, subsequent packet losses can ment AES algorithm for encrypt/decrypt well secured computers are be safely attributed to malicious actions. process. In this system we use asym- Talso attacked by denial of service. Indeed, Apart from traffic validation here we imple- metric key to evaluate the destination. through combinations of social engineer- ment distributed detection and response. The advantage of the AES is 128-bit ing and weak passwords, attackers have In distributed detection we implement block cipher. The use of this algorithm seized control over thousands of Internet confidentiality using AES encryption algo- prevents hacker attack. routers. Once a router has been com- rithm by asymmetric key. In response we promised in such a fashion, an attacker are using CBUHash hashing technique for This maintains user message confidential- may interpose on the traffic stream and validating integrity verification. Through ity, because if user is sending some infor- manipulate it maliciously to attack others integrity verification we are checking mation to destination it passes through by selectively dropping, modifying, or whether the message was modified or not. several

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    24 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us