Entity

Time filter

Source Type

Sonīpat, India

Kaur B.,SUSCET | Kaushal S.,Panjab University
2014 Recent Advances in Engineering and Computational Sciences, RAECS 2014 | Year: 2014

The demand of electronic gadgets such as electronic tablets, mobile phones, GPS devices, and smart computing devices is gaining a lot of popularity these days. The demand for these devices has also increased as these devices have made it easy to perform everyday needs in a mobile and distributed way. With the rise in the requirement of these devices they have become cheap in cost and there has been increase in the demand for communication and networking among wireless devices. In this scenario, the evolution of the Wireless Sensor Networks (WSNs) is fundamentally towards the universality of computing devices. Nowadays sensor nodes are having the capability of sensing and performing data processing in various types of environmental conditions. These sensor nodes are usually available in small size and are cheap in cost. In WSN, the storage capabilities of sensor nodes, their transmission range and processing capabilities are limited. Also, their energy resources are limited. Routing protocols play the crucial role of maintaining the routes in the network, ensuring reliable multi-hop communication in these conditions. This paper presents the analysis of the existing routing protocols to ensure which routing protocol provides a better Quality of Service guarantee. The Quality of Service guaranteed by a routing protocol is analyzed by using different quality of service metrics namely packet delivery ratio, throughput and end to end delay. Also the energy efficiency of the protocols is taken into consideration. © 2014 IEEE. Source


Raj G.,PTU | Sarfaraz M.,Amity University | Singh D.,SUSCET
Proceedings of the 5th International Conference on Confluence 2014: The Next Generation Information Technology Summit | Year: 2014

Cloud computing has recently appear as a promising hosting platform that performs an smart usage of a collection of services, applications, information and infrastructure composed of pools of computer resources for storage with the ability to provide users dynamically scalable, shared resources over the Internet and avoid large forthright fixed costs. However along with these advantages, that is storing of data on the clouds including invaluable information which attracts highly skilled blackhat-hackers thus creating a need for the security to be considered for improving client's trust over the information and services in cloud computing as one of the critical issues. In this survey paper, we have reviewed trust and security relation and proposed an Distributed Trust Model as per actors and their role which help us for managing trust over the services provided by any cloud. In our study, we found that as in distributed approach is implemented in our mechanism; it brings better quality of service and client response. © 2014 IEEE. Source


Raj G.,Punjab Technical University | Kapoor C.,Lovely Professional University | Singh Dr. D.,SUSCET
International Journal of Engineering and Technology | Year: 2013

This age is known as a service oriented age due to the globalization and advancement in technology day by day which lead business developers to deploy their services over the cloud. It lead to the development of new platform that has the capability to easily cope with the business expectations and has introduced a tough competition between the platform providers. These days Services like IaaS has been provided by many cloud service providers along with PaaS and SaaS. We provide a comparative study in between the types of platform (open source cloud platform as OpenStack and proprietary based platform as Eucalyptus) for deployment of IaaS , which has taken into consideration the size of deployment, manageability and fault tolerance, API provisioning /support, performance, compatibility with other platforms and types of services to be hosted. We discussed here about two high demanding IaaS platform provided by OpenStack and Eucalyptus. Both of the platform providers are competitive in terms of deployment of IaaS and service provisioning to its big clients. We also discussed here about the tools that can be used with these cloud platforms to easily install services on these clouds. Source


Raj G.,Punjab Technical University | Singh N.,Lovely Professional University | Singh D.,SUSCET
International Journal of Engineering and Technology | Year: 2013

Million numbers of these users tries to access the data in different type of applications like online shopping etc., which tends to increase the load on a single server. Increase of load on a server results in reduction of throughput and it leads to a strong need of developing and maintaining an efficient system with an appropriate load balancing algorithm that will be used to retrieve the important information with a reasonable response time. The main objective of our study is to propose a load balancing algorithm that can balance the requests coming from different users residing in different locations to retrieve the data from a distributed database environment using some virtualization techniques. Source


Sharma S.,Lovely Professional University | Raj G.,Punjab Technical University | Singh D.,SUSCET
International Journal of Engineering and Technology | Year: 2013

Cloud Computing is the emerging and prominent technology in IT world. Rather than setting up, the infrastructure, platform and services separately for each and every IT industry, are kept collaboratively, which can be accessed by numerous users, in turn reduces the cost of setup and maintenance. Numerous organizations access the services, use the infrastructure and platform from the communal data centres that may lie beyond the reach of the organization. Accessing the data from these data centres necessitates secure communication. While adopting the Cloud Computing Environment, security issues are the major concern for IT industries. Moreover, authentication is required to validate the Client to the Service Broker. In this paper, we have proposed Third Party Authentication, which registers the new clients as well as authenticates the already registered clients. This paper also aims to add a new functionality at the end of Service Broker. For Service Management, we proposed Multi Client broadcast Service (MCBS), by which the Service Broker multicasts and schedule the services, in response to the same kind of service requests sent by multiple clients , under the consideration of various parameters, including network delay, bandwidth available and number of hops between client and Service Broker, service request size and cost. MCBS is integrated with service scheduling based on RR, Priority and Priority based RR scheduling. Source

Discover hidden collaborations