OPTIMAL COMMUNICATION OF REAL TIME DATA ON SECURE CDMA IP RAN NETWORK
Abstract: This paper presents an optimal and secure communication of real time data over a CDMA based IP RAN network. In the process of data transmission, a new coding approach for security enhancement and quality improvement based on spectrum utilization and antenna coding is suggested. The traffic model is developed for image and audio data transmission over a wireless channel, having an interference of AWGN noise with fading effects. An optimal spectrum sensing approach for proper resource allocation is developed, and communicated using the secure WeP protocol. The developed approach is evaluated for different communication parameters and compared in comparisons to conventional modeling of CDMA system. The obtained results illustrates an improvement in quality metrics for the developed system, in comparison to the conventional modeling.
Key Word: Optimal Communication, Image and audio data, secure coding, CDMA system, channel coding.
I. Introduction
It has become a primal requirement in current communication system to provide high rate services with higher accuracy and faster data exchange. With the evolution of new communication architectures, the data exchange has got no boundness in forwarding the data to any range. Due to integration of different networks, data are exchange over wireless network and internet network, forming a Internet protocol – Radio access Network (IP-RAN). Due to
But how does it work? The internet, based on the concept of “packet switching”, involves the travelling of small packets of data over one or more networks (Frenzel, 2013). This can be compared to “electronic postcards”, meaning that “a computer generates a piece of data and flings it into the net, just like the postal system, except 100 million times faster” (Cerf, 2013). This concept allows one computer to speak to many different computers around the network by sending out these “electronic postcards”. However, before these networks can work seamlessly together, they must use a common protocol, or set of rules for transmitting and receiving these packets of data. There are several protocols currently in use, including the OSI Model, the TCP/IP Model, UDP, HTTP, and FDP (Mitchell, 2014), but the most commonly used is Transmission Control Protocol/Internet Protocol (TCP/IP) (Gilmer, 2011). Even as early as 1977, TCP/IP was being used by other networks to link to ARPANET (Kozierok,
routing. In this chapter, we introduce some popular routing protocols in each of the three
decided by this protocol. This protocol can be used to send data over various area networks like
To implement proposed and existing schemes and compared in terms of throughput, delay and packetloss
In some previous researches, IPv6 is proposed to be the alternative; by means of 128 bits, IPv6 can define 10^38 address which is should be enough for addressing the worthy and useful objects. Hence, create a new IPv6 packet with a suitable encapsulation is required.
In this paper we will be investigating IPv6 networks and systems. IPv6 benefits over IPv4 are explained through a list of researched advantage and disadvantage between the two Internet Protocols. Transition strategies towards IPv6 through different technologies is demonstrated. This paper will also attempt to discuss why IPv6 is better than IPv4 and is it necessary to migrate to the new-generation Internet protocol.
Perhaps one of the greatest inventions of out time is the Internet. Without a doubt, the net has had a profound effect on almost every aspect of our lives. The formation of the Internet has changed the way we do business, communicate, entertain, retrieve information, and even educate ourselves. Nevertheless, the Internet might have never materialized if it had not been for some innovated thinkers from the Advanced Research Project Agency, who created "ARPANET." In collaboration with several educational and research institutions, the agency created the packet-switching technologies that form the basis of the Internet today.
The main role of the transport layer is to provide end-to-end service between two or more applications running on various hosts. It segregates the applications and provides a simple interface for application developers. We also know that transport layer also performs flow control, error control and reliable delivery which is required for communicating applications to run with performance. These applications and end users use the transmission control protocol or the user datagram protocol to transmit the data. However, the future applications might require even better functionality. To solve this, the Internet Engineering Task Force (IEFT) has approved stream control transmission protocol.
The two TCP/IP transport layer protocols (TCP and UDP), are very crucial for the smooth operation of network services for both the computer applications and application layer protocols such as HTTP, FTP, SMTP and Telnet. These two transport layer protocols TCP and UDP execute these services via the employment of IP. They use IP in the efficient routing of packets to their respective destination networks (Steinke,2001).The TCP is further noted by Steinke (2001) to be responsible for the provision of a reliable and yet connection-oriented byte-stream packet delivery while its counterpart UDP is noted to be responsible for the provision of a connectionless but rather unreliable packet delivery. In this paper we explain the work of the two TCP/IP transport layer protocols (TCP and UDP). In addition, describe how TCP and UDP manage key functions such as reliability, port addressing, and segmentation.
Advancements in the information technology sector have brought many benefits to the people all around the world. Today with computer networking, we can chat, speak and see each other over a long distance. Data communication refers to the transmission of the digital signals over a communication channel between the transmitter and receiver computers. Communication is possible only with wired and wireless connectivity of the computers with each other.
Control characters are used when sending data to a printer, monitor, modem, or other device. XOFF (usually referenced by CTRL+S) is used by the transmitting side at the end of the data pulsed to say that the transmission batch is complete. XON (usually referenced by CTRL+Q) is used to start the transmission, and is found at the beginning of the data pulse. (ComputerHope, 2004)
In 1969, DOD’s ARPA (Advanced Research Project Agency) began an effort to develop redundant and survivable strategic communication architecture. (APUS, n.d., Week 1 Lesson) This DOD attempt gave birth to Transmission Control Protocol (TCP)/Internet Protocol (IP). TCP /IP soon found its widespread uses in the web and many networking applications (because they were very reliable and effective). TCP/IP made “web-enabled” devices possible. In addition, TCP/IP would connect to the internet (if desired) for remote
Abstract—The basic ideas and technologies for security of 40G/100G Ethernet are briefly described. Some potential security-related problems referring to physical security and the possible preventive measure, and the information security of its data are analyzed in line with its characteristics. Several practical methods for the enhancement of its information security based on the identity authentication and data encryption are proposed.
In the recent years as we know that there is a tremendous growth in the number of Internet users who like to remain connected to the Internet when they visit a distant Internet site. The main problem lies with the Internet protocol; the present Internet protocol versions do not support host mobility that is packets are routed according to IP addresses to their destinations. These addresses are linked with a stable network location. For
Cellular communication has become an important factor in our daily life. It could be targeted by any hacker to steal the important information with destructive purpose. Therefore, we need to provide strong security for users so that hackers failed to achieve their purpose. In this article it has been discussed limitations of 3G cellular networks, major security issues along with some severe level attacks. Then it has also been discussed in this article that what step 3G networks has taken to prevent those issues.