Wi-MAX stands for the Worldwide Interoperability for Microwave Access and is also known as the IE... more Wi-MAX stands for the Worldwide Interoperability for Microwave Access and is also known as the IEEE 802.16 wireless metropolitan area network. IEEE 802.16e WIMAX (Worldwide interoperable Microwave Access) is the upcoming wireless system which can offer high speed voice, video and data service up to the customer end. In 1998, a working group named 802.16 was formed by the Institute of Electrical and Electronics Engineers (IEEE), and their responsibility is to develop the specifications of broadband wireless access technology. IEEE specifies the different modulation techniques which should be used in WIMAX namely QPSK, 8-QAM, 16QAM and 64 QAM.
Data compression has important application in the
field of file storage and distributed systems. ... more Data compression has important application in the field of file storage and distributed systems. It helps in reducing redundancy in stored or communicated data. This paper studies various compression techniques and analyzes the approaches used in data compression. Furthermore, information theory concepts that relates to aims and evaluation of data compression methods are briefly discussed. A framework for the evaluation and comparison of various compression algorithms is constructed and applied to the algorithms presented here. This paper reports the theoretical and practical nature of compression algorithms. Moreover, it also discusses the future possibilities of research work in the field of data compression.
Abstract - Mobile computing is important due to rise in the number of portable computers. A mobil... more Abstract - Mobile computing is important due to rise in the number of portable computers. A mobile network can be a remote site, secured communication with the home or business network. This mobile network solves many issues related to security and scalability. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth-enabled PDAs to wireless sensor networks, mobile computing its impact on our daily lives. If iPhones and the other handheld devices has spurred excitement and interest in this evolving field. We will investigate some standard protocols and platforms, and the capabilities of the next-generation proposed solutions. we will find to gain an improved where the field is headed, or what are the important remaining unanswered technical challenges. Mobile computing is new style of computer access of the two currently dominant trends: portable computer (computer industry) and wireless communication (telecommunication industry). This paper discusses some key issues realizing a mobile computing wireless environment by examine the characteristics required of main component: wireless communications network, co-ordination software and mobile computers.
The primary goal of component-based software engineering is to address the development of systems... more The primary goal of component-based software engineering is to address the development of systems as an erection of system components, and development component as the reusable entities and maintenance or upgrading of system. Component-based software development (CBSD) is an transpire rule that promises to take software engineering into a new epoch. The CBSD methodologies dealing with COTS components. Component based software development is integrated with a shift from statement-oriented coding to building a system by plugging together with components. The established disciplines from software engineering needs a new methodologies to support the component-based development. This requires traditional methodologies and tools to support the entire component and system's life cycle including organisational, marketing, technological and other aspects. The paper define relevant terms by relating the definitions to the already well-defined terms of object technology. The paper describe new vital activities in the component-based systems life cycle, and also discusses the technical and non-technical issues that need to be resolved for widespread assumption of this approach. This paper also presents several directions for future research and work in this area.
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ELECTRONICS AND INSTRUMENTATION ENGINEERING (IJAREIE), Oct 30, 2014
WiMAX is a wireless digital communication system based on the IEEE 802.16 standard which provides... more WiMAX is a wireless digital communication system based on the IEEE 802.16 standard which provides broadband wireless Internet access at very high rates that is up to 70 Mbps or a data rate of about 3 Mbps within a radius of 30-mile (data rate increases as the distance decreases). With the rapid increase in the wireless broadband use, Need for mobile and MAN are increasing day by day. Audio, Video communication needs high bandwidth signal & less noisy signal. The coverage area becomes high while using WiMax technology. Security becomes one of the most important issues. VPN is used to secure the data while sending and receiving. VPN securely and transparently connect two or more remote networks to form virtually a single network, using centralized security policies for better management and protection .Wimax has many attractive features such as connection-oriented MAC layer, provision of the Quality-of-Service (QS) for different applications, efficient mobility and power save mode features. All these attractive features are protected by VPN connection.
In recent years, there have been rise in the number of applications based on Radio Frequency Iden... more In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers [1]. Initially RFID tags were developed to eventually replace bar codes in supply chains. Their advantages are that they can be read wirelessly and without line of sight, contain more information than barcodes, and are more robust [2]. The paper describes the current technology, including the frequency ranges used and standards [2].
Wireless Services provided across 4G wireless networks are mainly characterized by ubiquity and c... more Wireless Services provided across 4G wireless networks are mainly characterized by ubiquity and convergence. Therefore a user needs to be identified and authenticated to different serving networks and different service providers. Different identities for the same user would be hardly manageable since it would lead identity confusion and heavy management procedures (overlapping zones). Therefore, we need a unique identifier assignment and management techniques in heterogeneous environments. In this paper, we introduce pattern for the Temporal Mobile Subscriber identity (TMSI) and develop the associated secure identity management process. We show that our system, called Advanced Identity Management (AIM) guarantees mutual authentication, privacy, and tracking avoidance, which would be primary importance in 4G wireless network
In recent years, there have been rise in the number of applications based on Radio Frequency Iden... more In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers[1]. Initially RFID tags were developed to eventually replace bar codes in supply chains. Their advantages are that they can be read wirelessly and without line of sight, contain more information than barcodes, and are more robust . The paper describes the current technology, including the frequency ranges used and standards .
Uploads
Papers by Gaurav Sethi
field of file storage and distributed systems. It helps in
reducing redundancy in stored or communicated data. This
paper studies various compression techniques and analyzes
the approaches used in data compression. Furthermore,
information theory concepts that relates to aims and
evaluation of data compression methods are briefly discussed.
A framework for the evaluation and comparison of various
compression algorithms is constructed and applied to the
algorithms presented here.
This paper reports the theoretical and practical nature of
compression algorithms. Moreover, it also discusses the future
possibilities of research work in the field of data compression.
and have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to
name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers
[1]. Initially RFID tags were developed to eventually replace bar codes in supply chains. Their advantages are that they can be read
wirelessly and without line of sight, contain more information than barcodes, and are more robust [2]. The paper describes the current
technology, including the frequency ranges used and standards [2].