Computer Science And Technology - Master Dissertation
Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/80
Browse
Item A Novel Approach for Information Hiding in Punjabi Language(Central University of Punjab, 2016) Kumar, Arun; Kaur, AmandeepThe Internet is global in scope and rapidly growing. With this growth, internet security threats are also increasing. The Internet is the global information exchange media, which is open and insecure, needs more and better security provision. In the era of computer network virtually all business, government and academic organizations interconnect their local area network with a collection of interconnected networks. Data transmission in a public communication system is not secure because of interception and improper manipulation by an opponent Therefore, the attractive solution for this problem is steganography, which is the art and science of writing concealed messages in such a way that no one, apart from the sender and intend recipient, can notice the existence of the message. Thus, confidentiality and integrity principle of security can be achieved. There have been wide ranges of algorithms introduced using a text file as cover media. This thesis explains a two layered hiding technique that provides high security than other techniques. The use of local language ensures more security to the information exchange as the awareness of the local language is limited. The proposed approach uses the local language Punjabi as cover text. In proposed approach, the cover media is pre-existing media, not system generated media. Therefore, a user will be free to use the cover media taken from any Punjabi newspaper, magazine or book and the syntax of a sentence and sequence of sentence both will be true grammatically. Even though the opponent has a very good command on the Punjabi language, they will not found any suspicious.Item Performance evaluation of manet routing protocols dsdv, tora enhanced tora(Central University of Punjab, 2014) Kaur, Amandeep; MeenakshiWireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access and share a wide pool of resources and information across the globe. Mobile ad hoc networks (MANETs) are a kind of infrastructure less wireless networks in which all the nodes act as peers and themselves configure the network. Mobile ad hoc networks are an open area of research because of its applicability in a number of areas like tactical networks, emergency services and education. One of the major challenges in networking is the efficient, accurate, reliable, secure and immediate delivery of data from source to destination. Therefore, the efficient routing of data across the mobile ad hoc network is a major concern of researchers all over the world. Several routing protocols have been developed to send data efficiently across mobile ad hoc networks. These protocols have been divided into three categories- Proactive, Reactive and Hybrid. The performance evaluation of these protocols has been going on since a long time. Most of the current research focuses on the pause times, simulation times and network size to measure the performance of various mobile ad hoc network routing protocols. A very few work has been done on the performance analysis of protocols by varying the underlying mobility models and traffic patterns. This dissertation work is focused on the improvement of the poor performance of TORA with the rise in number of traffic connections. This behavior has been credited to the link sensing mechanism of Internet MANET Encapsulation protocol (IMEP). IMEP is a multi-purpose network-layer protocol that supports the operation of many routing protocols including TORA. It provides mechanism for sensing the status of links in TORA. This link sensing mechanism has been investigated and proposed modification by K. H. Lim and A. Datta has been implemented to observe improvement in the overall performance of Enhanced-TORA protocol in comparison with original TORA. iv Through this research, investigations have been made into the behavior of DSDV, and TORA mobile ad hoc routing protocols by varying the underlying mobility models (Random Waypoint, Random Direction and Manhattan Grid model) and Traffic patterns (FTP, TELNET, HTTP). The metrics used to analyze the performance are Throughput, Average End to End delay, Routing overhead, Packet Delivery Ratio and Packet Loss. This research draws an analysis whether under which mobility model and traffic pattern combination these protocols give the best performance. Results show that DSDV gives best performance under Manhattan Grid Mobility model and FTP traffic pattern. Whereas, TORA and Enhanced-TORA give best performance under Random Direction Mobility model and FTP traffic. The performance of Enhanced-TORA is then compared with original TORA using 10 traffic connections under Random Direction mobility model and FTP Traffic and it was observed that Enhanced-TORA outperformed original TORA thereby eliminating the problem of performance degradation with rise in number of connections