8 results on '"Roshan Singh Sachan"'
Search Results
2. Performance Evaluation of a LAN under Different Ethernet Wiring Standards with Different Frame Size
- Author
-
Roshan Singh Sachan, R. H. Goudar, and Mohammad Wazid
- Subjects
Ethernet ,business.industry ,Computer science ,Retransmission ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Ethernet flow control ,Point (geometry) ,business ,Frame size ,Computer network ,Carrier Ethernet - Abstract
In this paper we simulate an office LAN using IT Guru Opnet 9.1 and then we calculate the performance of this network under 10BaseT and 100BaseT Ethernet wiring standards with different frame size and finally we compare the results i.e. which standard perform better for which frame size. We find that numbers of collision counts at hubs are always more in 10BaseT, because of the nature of this standard. Hubs are always more utilized in 10BaseT, because of more retransmission attempts due to high number collisions under 10BaseT. Initially when frame size is 1500 Bytes, we find that 100BaseT standard is performing well because the switch filters more traffic. We again reduce the frame size to 1024 Bytes in this case performances are equivalent. When we further reduce frame size to 512 Bytes we get a shocking result because 10BaseT standard performs well and the switch filters more traffic. Then we come to point that if we have a low traffic LAN and we fix frame size to 512 Bytes then we have to use 10BaseT Ethernet wiring standard in the implementation of LAN because it will give us good performance as compares to 100BaseT. To our best knowledge this is the first paper that calculates the performance of a LAN under these assumptions. General Terms Guided Media, Unguided Media, Collision count, Utilization, Traffic Received and Traffic Forwarded.
- Published
- 2012
- Full Text
- View/download PDF
3. Effective Clustering Technique for Selecting Cluster Heads and Super Cluster Head in MANET
- Author
-
R. H. Goudar, Mohammad Wazid, Roshan Singh Sachan, Avita Katal, and Devesh Pratap Singh
- Subjects
Engineering ,Optimized Link State Routing Protocol ,business.industry ,Head (linguistics) ,Cluster (physics) ,Mobile ad hoc network ,Data mining ,business ,Cluster analysis ,computer.software_genre ,computer ,Computer network - Published
- 2013
- Full Text
- View/download PDF
4. E-TCP for efficient performance of MANET under JF delay variance attack
- Author
-
Avita Katal, R. H. Goudar, Roshan Singh Sachan, and Mohammad Wazid
- Subjects
business.industry ,Network packet ,Computer science ,Transmission Control Protocol ,Packet drop attack ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Open network architecture ,Throughput ,Denial-of-service attack ,Mobile ad hoc network ,business ,Computer network - Abstract
MANETs have some special characteristics such as open network architecture, shared wireless medium and highly dynamic topology which make them much prone to different attacks. Denial Of service (DoS) attack, the most common of all, if occurs becomes difficult to detect and defend. One of such attacks is JellyFish attack which is further categorized as JF Reorder Attack, JF Periodic Dropping Attack and JF Delay Variance Attack. In JF delay variance attack, a JF attacker node intrudes into forwarding group and delays data packets unnecessarily for some amount of time before forwarding them which results in high end-to-end delay in the network. The performance of the network also becomes worse. JF Attack disrupts the whole functionality of Transmission Control Protocol (TCP) as in the presence of JellyFish Delay Variance Attack source retransmits packets again and again causing congestion in the network. Some amendments are required in TCP for JF Attack prone networks. In this paper a modified TCP which is capable of handling congestion in the network caused by JF Attackers is proposed. In the presence of this modified protocol named as Efficient Transmission Control Protocol (ETCP) the performance of the network (i.e. throughput, end-to-end delay etc) improves.
- Published
- 2013
- Full Text
- View/download PDF
5. Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network
- Author
-
Roshan Singh Sachan, Avita Katal, Devesh Pratap Singh, Mohammad Wazid, and R. H. Goudar
- Subjects
Network packet ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Denial-of-service attack ,Throughput ,Computer security ,computer.software_genre ,Base station ,Packet drop attack ,Network performance ,business ,computer ,Wireless sensor network ,Block (data storage) ,Computer network - Abstract
Wireless Sensor Networks (WSNs) are prone to various attacks in which Blackhole a kind of Denial of Service (DoS) attack is very difficult to detect and defend. In blackhole attack, an intruder captures and re-programs a set of nodes in the network to block the packets they receive instead of forwarding them towards the base station. As a result any information that enters the blackhole region is captured and not able to reach destination causing high end-to-end delay and low throughput. Previously little amount of work is done for detection and prevention of the Blackhole attack in the WSN making its detection and prevention very crucial as per network performance is concerned. In this paper initially the affect of Blackhole attack is measured on the network parameters followed by the proposal of a novel technique for the detection and prevention of Blackhole attack in WSN.
- Published
- 2013
- Full Text
- View/download PDF
6. A cluster based intrusion detection and prevention technique for misdirection attack inside WSN
- Author
-
R. H. Goudar, Roshan Singh Sachan, Devesh Pratap Singh, and Mohammad Wazid
- Subjects
Computer science ,business.industry ,Network packet ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Denial-of-service attack ,Throughput ,Computer security ,computer.software_genre ,Software deployment ,Wireless ,business ,Wireless sensor network ,computer ,Vulnerability (computing) ,Computer network - Abstract
Constrained resources, the ad-hoc nature of deployment and the vulnerability of wireless media are some of the most challenging characteristics of Wireless Sensor Network (WSN) which pose a need for unique security solutions. WSNs are susceptible to various attacks, in which Misdirection a kind of Denial of Service (DoS) attack is very difficult to detect and defend. In Misdirection Attack, the intruder misdirects the incoming packets to a node other than the intended node which introduces high end-to-end delay (sometimes infinite) in the network. The performance of the network (i.e. throughput) is also degraded. Thus the detection and prevention of this attack becomes very crucial. In this paper we have proposed a novel Cluster Based Intrusion Detection and Prevention Technique for Misdirection Attack. The network parameters calculated by the use of this technique shows considerable amount of improvement in throughput while introducing small amount of delay.
- Published
- 2013
- Full Text
- View/download PDF
7. Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction
- Author
-
Mohammad Wazid, Avita Katal, R. H. Goudar, Devesh Pratap Singh, and Roshan Singh Sachan
- Subjects
business.industry ,Network packet ,Computer science ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mesh networking ,Telecommunication security ,Throughput ,Denial-of-service attack ,Topology ,Network topology ,business ,Wireless sensor network ,Algorithm ,Computer network - Abstract
Wireless Sensor Network (WSN) has a great potential to be deployed in wide range of applications like consumer, industrial and defense sectors. WSNs are susceptible to various attacks, in which misdirection a kind of Denial of Service (DoS) attack is very difficult to detect and defend. In misdirection attack, the intruder misdirects the incoming packets to a node other than the intended node. Due to this attack, high end- to- end delay (sometimes infinite) is introduced in the network and performance of the network (i.e. throughput) is degraded. In this paper we have done a topological analysis of WSN in the presence of misdirection attack and presented an algorithm for the prediction of delay and throughput. We observed that WSN performs better for tree network topology as compared to mesh topology.
- Published
- 2013
- Full Text
- View/download PDF
8. Performance of a LAN under different ethernet wiring standards
- Author
-
Roshan Singh Sachan, R. H. Goudar, and Mohammad Wazid
- Subjects
Ethernet ,Engineering ,business.industry ,Filter (video) ,Retransmission ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Local area network ,Time duration ,business ,Collision ,Short duration ,Telephone line ,Computer network - Abstract
In modern time people are not using 10BaseT Ethernet wiring standard in the implementation of a local area network (LAN), category 3 cables which is used for the implementation of that standard in a network is become obsolete now, it is only used in telephone lines. Our aim is to find out some parameters under which 10BaseT can work well as compare to 100BaseT standard. We want people to motivate to use 10BaseT standard because under some assumptions 10BaseT standard can work well as compare to 100BaseT. To support our idea we simulate an office LAN using IT Guru Opnet 9.1, then we calculate the performance of this network under 10BaseT and 100BaseT Ethernet wiring standards with increasing time and finally we compare the results i. e. which standard performs better. We find that numbers of collision counts at hubs are always more under 10BaseT, because of the nature of this standard. The hubs are more utilized under 10BaseT, because of more retransmission attempts due high number of collisions in 10BaseT. Hubs perform smartly in case of 100BaseT standard because they filter little bit traffic in this case but they did not filter any traffic in case of 10BaseT. Initially when time is less the switch performs better under 10BaseT because it filtered more traffic, but when we start increasing the time the performance of 100BaseT is going to improve and at one instance of time their performances are become equivalent then after that the performance of 100BaseT is become good. So in our simulation we find that if a LAN is used for a short duration of time, then we have to use 10BaseT standard in the implementation of a LAN because in this case switch filter more traffic so the performance of LAN is good here. When this LAN is used for the long time duration we have to use 100BaseT standard because in this case we got good results as compare to 10BaseT.
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.