Monday, 18 November 2013

Investigations on Performance of DWT based OFDM system for different modulating schemes with varying constellation levels

Vol. 2 No. 1

Year: 2013

Issue : Apr-Jun

Title : Investigations on Performance of DWT based OFDM system for different modulating schemes with varying constellation levels

Author Name : Hariprasad, Dr.ALAMELU NACHIAPPAN

Synopsis :

OFDM (Orthogonal Frequency Division Multiplexing) is one of the major multicarrier systems used in present day wireless communications. The capability to meet out the demand for very high data rate with in the restricted bandwidth makes it more popular. The evolving technology improves the OFDM by replacing the conventional FFT based system with DWT-OFDM. This emerging trend is currently in the laboratory level. This paper discusses about the selection of suitable modulation scheme for DWT OFDM, after simulating the different possible M-ary methods with various constellation levels. Rayleigh fading channel environment for simulation was created using MATLAB program and the results infer that the QAM is the most suited procedure for DWT based OFDM.

Authentication Key Management Analysis For Heterogeneous Networks

Vol. 2 No. 1

Year: 2013

Issue : Apr-Jun

Title : Authentication Key Management Analysis For Heterogeneous Networks

Author Name : R.Narmadha r, Malarkkan

Synopsis :

The integration of LTE –WiMax wireless mobility aids in seamless mobility and cost effective mobile data services with the use of IP core and OFDMA air interface technology. The onslaught of 3G/4G and Wifi/WiMax interworking capabilities introduces a multitude of possibilities like security and Quality of Service (QoS). Each network has several similarities and has its own technology for authentication and link layer security. The interworking is performed on a data link layer using EAP authentication protocol by integrating key authentication procedure. In this paper, security key management for various protocols and its numerical analysis are presented across interworking domain. Interworking security is isolated in view of the fact that the authentication protocol has its limitation. It is desirable to avoid several round trips, delays in handover, computational overhead, hence a fast re-authentication procedure has been proposed in LTE-WiMax network.

A simulation study on Complex Sphere Decoding for MIMO wireless communication system

Vol. 2 No. 1

Year: 2013

Issue : Apr-Jun

Title : A simulation study on Complex Sphere Decoding for MIMO wireless communication system

Author Name : Ranjitham G, K.RShankar Kumar

Synopsis :

MIMO (Multiple input –Multiple Output) technology is a promising and upcoming technology for the future wireless generation system, as it has got high throughput and diversity gain. MIMO makes antennas work smarter by enabling them to combine data streams arriving from different paths and at different times to effectively increase receiver signal-capturing power. MIMO is used in modern wireless standards, including in IEEE 802.11, 3GPP LTE, and mobile WiMAX systems.Sphere decoding algorithm is a lattice reduction algorithm introduced for low complexity MIMO detection SD is a powerful and attractive tool to achieve a high performance close to the Maximum Likelihood (ML),Zero Forcing (ZF) but with less complexity. This paper presents a simulation study on the sphere decoding method and compares the performance with other classical MIMO scheme such as VBLAST and Zero forcing receivers. The simulation tool used is MATLAB communication tool box version 7.1. The performance metric considered is Bit Error Rate (BER) and the channel is assumed to be Rayleigh fading. It is inferred that detection is possible with complexity and gives a better result in terms of Bit Error Rate when comparing general sphere decoding and MMSE.

Secured Wireless Automation using Wireless Sensor Networks

Vol. 2 No. 1

Year: 2013

Issue : Apr-Jun

Title : Secured Wireless Automation using Wireless Sensor Networks

Author Name : Ganesh Subramanian, Sean Laurel Rex , arun kumar

Synopsis :

Today’s process industries have increasingly come to rely on information gained from networks of sensors installed at key points through the factory or field site. Measurement of air pressure, electrical current, weight load, fuel levels, temperature, corrosion, pipe flow, seismic activity – such readings are critical to the effective and efficient safe operation of oil pipelines and refineries, pharmaceutical and chemical companies, food and beverage manufacturers, and power plants. The evolution of sensor technologies has enabled managers and administrators to gain more insight into complex processes. For example, the introduction of microprocessors and digital communications led to Distributed Control Systems (DCSs) and the migration of intelligence into field devices, allowing enterprises to improve operations significantly. The main idea of our work is to provide a low cost, reliable and secured wireless automation using sensor networks through an efficient routing protocol, which would be compatible for industrial and home applications and to offer significantly improved monitoring, reduced energy consumption and power dissipation.

Handoff Management Using MSCTP AND MIP

Vol. 2 No. 1

Year: 2013

Issue : Apr-Jun

Title : Handoff Management Using MSCTP AND MIP

Author Name : B. Jaiganesh, R. Ramachandran

Synopsis :

Mobile Communication devices such as cellular phone, laptops, and PDAs are typically equipped with multiple radio access interfaces in the current trend. The opportunity to attach to more than one access network at a time makes users capable of roaming over access technologies and administrative domains seamlessly. Soft HO can easily be implemented and load balancing is possible to leverage when the amount of traffic exceeds the capacity of one single radio access interface. The aim of this Research work is to present the relative presentation of MIP and Seamless IP diversity based Generalised Mobility Architecture using the simulation setup using mSCTP for the video streaming. To set the research work in background, it explains the latest work which has been complete to advance the capability of MIP.

Friday, 26 July 2013

Application Of Live Streaming Video In Multimedia Technology

Vol. 1 No. 4

Year: 2013
 
Issue:
Jan-Mar

Title : Application Of Live Streaming Video In Multimedia Technology  

Author Name : Saranya. M

Synopsis :  

Streaming video from the server is being an everlasting problem for all of us till now. The videos cannot be seen from the server so easily by the user. The user has to wait for the videos to buffer, which is the streaming process. If more than two persons are watching the same video at the same time, user may face so much of buffering problem, clarity in the video content also. The problem occurs because each individual user does not have their individual path to the server, which they use. This problem can be overcome by the concept of subway tunnel. “Subway tunnel” which means that a secondary path is created to the user from the server they use. So if the bandwidth of the user’s path cannot withstand with the content, the user can take the subway path to transfer the video content. Bit streaming method is used for streaming the video content from the server. This method helps us to stream the video content without any loss in the content of the video & quality. By this way the users (i.e., multiple users) can able to overcome the problem of streaming videos from the server.

Bit Error Rate (BER) performance analysis of DSSS-FEC coherent and non-coherent MFSK under Rayleigh and Rician fading channels

Vol. 1 No. 4

Year: 2013
 
Issue:
Jan-Mar

Title : Bit Error Rate (BER) performance analysis of DSSS-FEC coherent and non-coherent MFSK under Rayleigh and Rician fading channels 

Author Name : T.A.SHANMUGA SUNDARAM, Dr.ALAMELU NACHIAPPAN
  
Synopsis

Forward Error Correction is an efficient technique to correct, preferably burst errors, caused over several blocks of transmitted data. Besides this, narrowband interference (NBI) is an unavoidable major cause for transmission errors in wireless communication, which is much severe in unlicensed band like ISM band. It is needed to spread the encoded data before being modulated to overcome both burst errors and interference. Direct Sequence Spread Spectrum (DSSS) is a good support for wireless networks with nodes preferred to consume less power due to its less implementation complexity. This paper is the simulated comparative analysis of BER performance of FEC coded coherent and non-coherent M-ary FSK under the impact of both Rayleigh and Rician fading channels. BCH, RS, Cyclic and Linear Block codes are used in this simulation. Simulation results show that, RS Encoder – Decoder pair gives good BER performance over Rayleigh fading channel, especially with integer inputs and its performance should be enhanced for Rician fading channel.

Minimum Spanning Tree based Protocol for Heterogeneous Wireless Sensor Networks

Vol. 1 No. 4

Year: 2013
 
Issue:
Jan-Mar

Title : Minimum Spanning Tree based Protocol for Heterogeneous Wireless Sensor Networks
   
Author Name : Gaurav Bathla 
  
Synopsis :  
 
Potential use of wireless sensor networks (WSNs) can be seen in various fields like disaster management, battle field surveillance and border security surveillance since last few years. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Researchers in all fields of wireless sensor network believe that nodes are homogeneous, but some nodes may be of different energy to prolong the lifetime of a WSN and its reliability. In this paper an attempt is made to calculate energy required for all the nodes to be placed in the network in the same structure as was defined under MSMTP protocol in bottom up fashion i.e. energy of all nodes is initialized to zero & after each round transmission & receiving energy required is added to energy of each node. After completing certain number of rounds required energy of each node can be deduced.

HARAQ-Routing Table for On-Chip Congestion Control

Vol. 1 No. 4

Year: 2013
 
Issue:
Jan-Mar

Title : HARAQ-Routing Table for On-Chip Congestion Control  

Author Name : swetha priyanka, G Rajesh  

Synopsis

When the Message latency increases in Networks-On-Chip Performance of the channel decreases due to congestion. In Mesh topology, minimal methods can distribute messages over two directions at each switch, but in high traffic loads this methods are inefficient. We present a non-minimal methods can overcome this blocking problem in high traffic loads and reduce the waiting time of messages by delivering them via alternative paths called HARAQ.To avoid creating cycles in network, the algorithm define all allowed turns including 180-degree turns on a single channel. To select a less congestion path from output channel to the destination region based on local and global information in the learning method.