Distributed Packet Buffers for High-Bandwidth Switches and Routers

Distributed Packet Buffers for High-Bandwidth Switches and Routers – projects 2012 High-speed routers rely on well-designed packet buffers that support multiple queues, provide large capacity and short response times. Some researchers suggested combined SRAM/DRAM hierarchical buffer architectures to meet these challenges. However, these architectures suffer from either large SRAM requirement or high time-complexity in the memory management. In this paper, we present scalable, efficient, and novel distributed packet buffer architecture. Two fundamental issues need to be addressed to make this architecture feasible: 1) how to minimize the overhead of an…

Read More

On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks

Projects | Projects 2012 | Projects 2011 | Project | Final year Projects | Real Time Projects | Ns2 Projects On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As the peers participating in unstructured networks interconnect randomly, they rely on flooding query messages to discover objects of interest and thus introduce remarkable network traffic. Empirical measurement studies indicate that the peers in P2P networks have similar preferences, and have recently proposed unstructured P2P networks that organize participating…

Read More

Footprint: Detecting Sybil Attacks in Urban Vehicular Networks

Footprint: Detecting Sybil Attacks in Urban Vehicular Networks In urban vehicular networks, where privacy, especially the location privacy of anonymous vehicles is highly concerned, anonymous verification of vehicles is indispensable. Consequently, an attacker who succeeds in forging multiple hostile identifies can easily launch a Sybil attack, gaining a disproportionately large influence. In this paper, we propose a novel Sybil attack detection mechanism, Footprint, using the trajectories of vehicles for identification while still preserving their location privacy. More specifically, when a vehicle approaches a road-side unit (RSU), it actively demands an…

Read More

A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming

A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming – projects Although random access operations are desirable for on-demand video streaming in peer-to-peer systems, they are difficult to efficiently achieve due to the asynchronous interactive behaviors of users and the dynamic nature of peers. In this paper, we propose a network coding equivalent content distribution (NCECD) scheme to efficiently handle interactive video-on-demand (VoD) operations in peer-to-peer systems. In NCECD, videos are divided into segments that are then further divided into blocks. These blocks are encoded into…

Read More

Efficient audit service outsourcing for data integrity in clouds

projects 2012 Efficient audit service outsourcing for data integrity in clouds – projects 2012 Cloud-based outsourced storage relieves the client’s burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. However, the fact that clients no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data. To avoid the security risks, audit services are critical to ensure the integrity and availability of outsourced data and to achieve digital forensics and credibility on cloud computing. Provable data…

Read More

Secure and privacy preserving keyword searching for cloud storage services

projects 2012 Secure and privacy preserving keyword searching for cloud storage services – projects 2012 Cloud storage services enable users to remotely access data in a cloud anytime and anywhere, using any device, in a pay-as-you-go manner. Moving data into a cloud offers great convenience to users since they do not have to care about the large capital investment in both the deployment and management of the hardware infrastructures. However, allowing a cloud service provider (CSP), whose purpose is mainly for making a profit, to take the custody of sensitive…

Read More

Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques

projects 2012 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques – projects 2012 Abstract: Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques- projects Recommender systems are becoming increasingly important to individual users and businesses for providing personalized recommendations. However, while the majority of algorithms proposed in recommender systems literature have focused on improving recommendation accuracy, other important aspects of recommendation quality, such as the diversity of recommendations, have often been overlooked. In this paper, we introduce and explore a number of item ranking techniques that can generate recommendations that have substantially higher…

Read More

the three-tier security scheme in wireless sensor networks with mobile sinks

projects 2012 projects 2012  – the three-tier security scheme in wireless sensor networks with mobile sinks The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks – projects 2012 Mobile sinks (MSs) are vital in many wireless sensor network (WSN) applications for efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensors. However, in sensor networks that make use of the existing key predistribution schemes for pairwise key establishment and authentication between sensor nodes and mobile sinks, the employment of mobile sinks for data collection elevates…

Read More

CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks

projects 2012 CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks –  projects 2012 Abstract: corman a novel cooperative opportunistic routing scheme in mobile ad hoc networks- projects 2012 The link quality variation of wireless channels has been a challenging issue in data communications until recent explicit exploration in utilizing this characteristic. The same broadcast transmission may be perceived significantly differently, and usually independently, by receivers at different geographic locations. Furthermore, even the same stationary receiver may experience drastic link quality fluctuation over time. The combination of…

Read More

TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks

projects 2012 – tam a tiered authentication of multicast protocol for ad-hoc networks TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks – projects 2012 Abstract: TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks – projects 2012 Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. These applications are characterized by the hostile environment that they serve in and by the multicast-style of communication traffic. Therefore, authenticating the source and ensuring the integrity…

Read More