Networking in computers enables sharing of information by interconnecting the computing devices. The sharing
of information is possible through transmission media. The transmission media is classified as wired or wireless.
Wired media have limitation in geography. But wireless is not bounded by geography. In the wireless world the
first wireless technology was infrared and it was a very slow technology. So, inventions were continued to find a
better wireless technology, finally we got Bluetooth, Wi-Fi ,WI-MAX and Gi-Fi. In this paper we discussed
about different Wired and Wireless Technologies and given a proposed idea to extend the limit of Gi-Fi beyond
10 meters.
Analysis of wifi and wimax and wireless network coexistenceIJCNCJournal
Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown by most people. However, compared with WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi.
Review and Analysis of WiMAX Technology using different Modulation scheme wit...ijtsrd
The last few decades, there has been a incredible growth in the wireless communication technology. The growing demand of multimedia services and the growth of Internet related contents lead to increasing interest to high speed communications. The Wireless communication technology, affordable wireless service has become a reality. In wireless communication, radio propagation refers to the behavior of radio waves when they are propagated from transmitter to receiver. In the course of propagation, radio waves are mainly affected by three different modes of physical phenomena: reflection, diffraction, and scattering. In this paper, we analysis of MIMO-OFDM system employing different Modulation scheme is analysed using AWGN channel. The Simulation results show that this is a novel technique for next generation wireless systems using MATLAB toll R2013a. Arvind Yadav | Er. Praveen Kumar Patidar"Review and Analysis of WiMAX Technology using different Modulation scheme with AWGN Channel" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11662.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11662/review-and-analysis-of-wimax-technology-using-different-modulation-scheme-with-awgn-channel/arvind-yadav
Review of the Security Challenges of Fiber Optics Technologies in Network Con...inventionjournals
The increasing number of people who transfer data from one place to another daily demands that the telecom industries develop a sophisticated strategy to guaranty quality data transferred without compromise or interception. Some of these industries in a bid to meet up with this demand employ any means of data transfer possible to them. Internet connectivity requires physical transfer of data from one place to another. This can be achieved either through wire or wirelessly. Connection through wire could be by UTP, Coaxial or Fiber Optics. Experience showed that wired is more advantageous when considering bandwidth utilization, performance, reliability, resiliency and security, many people are toeing this way and fiber optics their major choice. Fiber optics can be bundled as cable and used for data transmission through which light propagates with little attenuation, which makes it advantageous for long distance communication. The massive choice of fiber optics of recent has increase the security challenges bedevilling it, as it is now the prime target of network attackers. This has increased its vulnerability. Fiber optic is experiencing some security issues like splicing, clamping, cutting and tapping in developing countries like Nigeria. The paper tries to evaluate the security challenges bedevilling the optic fiber
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
A study of 5 g network structural design, challenges and promising technologi...IJARIIT
In the near prospect, beyond 4G has the major objectives or difficulty that need to be addressed are improved
capacity, better data rate, decreased latency, and enhanced quality of service. To meet these demands, radical improvements
need to be made in cellular network architecture. This paper presents the consequences of a detailed study on the fifth
generation (5G) cellular network structural design, challenges and some of the solution for promising technologies that are
supportive in improving the structural design and gathering the demands of users. In this comprehensive review focuses 5G
cellular network architecture, huge various input many output technologies, and device-to-device communication (D2D). Next,
to with this, some of the promising technologies that are addressed in this paper include intrusion supervision, variety sharing
with cognitive radio, ultra-dense networks, multi-radio access technology organization, full duplex radios, and millimeter wave
solutions for 5G cellular networks. In this paper, a universal possible 5G cellular set of connections architecture is proposed,
which shows that D2D, small cell access points, network cloud, and the Internet of Things can be a part of 5G cellular network
architecture. A comprehensive study is integrated concerning present research projects being conducted in different countries
by research groups and institutions that are working on 5G technologies. Finally, this paper describes cloud technologies for 5G radio access networks and software defined networks.
Analysis of wifi and wimax and wireless network coexistenceIJCNCJournal
Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown by most people. However, compared with WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi.
Review and Analysis of WiMAX Technology using different Modulation scheme wit...ijtsrd
The last few decades, there has been a incredible growth in the wireless communication technology. The growing demand of multimedia services and the growth of Internet related contents lead to increasing interest to high speed communications. The Wireless communication technology, affordable wireless service has become a reality. In wireless communication, radio propagation refers to the behavior of radio waves when they are propagated from transmitter to receiver. In the course of propagation, radio waves are mainly affected by three different modes of physical phenomena: reflection, diffraction, and scattering. In this paper, we analysis of MIMO-OFDM system employing different Modulation scheme is analysed using AWGN channel. The Simulation results show that this is a novel technique for next generation wireless systems using MATLAB toll R2013a. Arvind Yadav | Er. Praveen Kumar Patidar"Review and Analysis of WiMAX Technology using different Modulation scheme with AWGN Channel" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11662.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11662/review-and-analysis-of-wimax-technology-using-different-modulation-scheme-with-awgn-channel/arvind-yadav
Review of the Security Challenges of Fiber Optics Technologies in Network Con...inventionjournals
The increasing number of people who transfer data from one place to another daily demands that the telecom industries develop a sophisticated strategy to guaranty quality data transferred without compromise or interception. Some of these industries in a bid to meet up with this demand employ any means of data transfer possible to them. Internet connectivity requires physical transfer of data from one place to another. This can be achieved either through wire or wirelessly. Connection through wire could be by UTP, Coaxial or Fiber Optics. Experience showed that wired is more advantageous when considering bandwidth utilization, performance, reliability, resiliency and security, many people are toeing this way and fiber optics their major choice. Fiber optics can be bundled as cable and used for data transmission through which light propagates with little attenuation, which makes it advantageous for long distance communication. The massive choice of fiber optics of recent has increase the security challenges bedevilling it, as it is now the prime target of network attackers. This has increased its vulnerability. Fiber optic is experiencing some security issues like splicing, clamping, cutting and tapping in developing countries like Nigeria. The paper tries to evaluate the security challenges bedevilling the optic fiber
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
A study of 5 g network structural design, challenges and promising technologi...IJARIIT
In the near prospect, beyond 4G has the major objectives or difficulty that need to be addressed are improved
capacity, better data rate, decreased latency, and enhanced quality of service. To meet these demands, radical improvements
need to be made in cellular network architecture. This paper presents the consequences of a detailed study on the fifth
generation (5G) cellular network structural design, challenges and some of the solution for promising technologies that are
supportive in improving the structural design and gathering the demands of users. In this comprehensive review focuses 5G
cellular network architecture, huge various input many output technologies, and device-to-device communication (D2D). Next,
to with this, some of the promising technologies that are addressed in this paper include intrusion supervision, variety sharing
with cognitive radio, ultra-dense networks, multi-radio access technology organization, full duplex radios, and millimeter wave
solutions for 5G cellular networks. In this paper, a universal possible 5G cellular set of connections architecture is proposed,
which shows that D2D, small cell access points, network cloud, and the Internet of Things can be a part of 5G cellular network
architecture. A comprehensive study is integrated concerning present research projects being conducted in different countries
by research groups and institutions that are working on 5G technologies. Finally, this paper describes cloud technologies for 5G radio access networks and software defined networks.
Impact of Frequency Offset on Interference between Zigbee and Wifi for Smart ...IOSR Journals
Abstract: The Zigbee is a low cost communication technology used for low data rate communication system such as industrial automation etc. Because of its low complexity it is widely adopted for many applications. But the utilization of the same spectrum band by the WLAN system causes interference between both the systems. The proposed approach presents an analysis of this interference effect on Zigbee system when operated with WLAN sources at different distances and different power. It also analyzes the effect when a frequency offset is established between both systems. The simulation results shows that a small offset can provide sufficient improvement in the performance. Keywords: Smart Grids, Zigbee Network, Mesh Network, Wireless LAN (WLAN), BER
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communicationsSitha Sok
ZTE COMMUNICATIONS No.2 2016
Fresh off the Press! The April issue focuses on optical wireless communications. Harald Hass, "the father of Li-Fi", and his student contributed to this special issue.
This is the idea of using existing power lines for communication purposes. Power line communications (PLC)
enables network communication of voice, data, and video over direct power lines. High-speed PLC involves
data rates in excess of 10 Mbps. PLC has attracted a lot of attention and has become an interesting subject of
research lately.
Presented by Reshma M.R.
Wi-Fi, which stands for “Wireless Fidelity”, is a radio technology that networks computers so
they connect to each other and to the Internet without wires.
WiMAX, meaning Worldwide Interoperability for Microwave Access, is a
telecommunications technology that provides wireless transmission of data using a variety of
transmission modes, from point-to-point links to portable internet access
QoS of Wi-Fi performance based on signal strength and channel for indoor camp...journalBEEI
The implementation of Wi-Fi on campuses brings huge benefits for campus users in communications and education development. Some campuses face existing poor quality of service (QoS) on the Wi-Fi performance which is also unjustified and issues on unsatisfied connections. This research aims to analyses the Wi-Fi performance of the campus network for three indoor access points. Signal strength, usage percentage, channel utilization, and the number of clients count per access points are measured. Results show that 56% is the highest signal percentage and the lowest signal percentage is at 1%. Access point of Ustudent is the highest at 53% and lowest at 38%. The highest signal strength of -45dBm is found and the other two are below by -2 dBm. The lowest signal strength is at -95 dBm. SSID CCNA_1 is identified has the best signal strength compared to other SSIDs because it runs on 5 GHz frequency. The most channels used are channels 1, 4, and 6. Respectively 151, 67, and 57 users are connected to Ustudent, UHotspot, and CCNA_1. This study is significant for the QoS in a campus network in providing good network services. Thus, the QoS on Wi-Fi performance is improvised, monitored and analyzed for continues supports users in the campus network successfully.
Big data Mining Using Very-Large-Scale Data Processing PlatformsIJERA Editor
Big Data consists of large-volume, complex, growing data sets with multiple, heterogenous sources. With the
tremendous development of networking, data storage, and the data collection capacity, Big Data are now rapidly
expanding in all science and engineering domains, including physical, biological and biomedical sciences. The
MapReduce programming mode which has parallel processing ability to analyze the large-scale network.
MapReduce is a programming model that allows easy development of scalable parallel applications to process
big data on large clusters of commodity machines. Google’s MapReduce or its open-source equivalent Hadoop
is a powerful tool for building such applications.
Mechanical and Chemical Properties of Bamboo/Glass Fibers Reinforced Polyeste...IJERA Editor
The chemical resistance of Bamboo/Glass reinforced Polyester hybrid composites to acetic acid, Nitric acid,
Hydrochloric acid, Sodium hydroxide, Sodium carbonate, Benzene, Toluene, Carbon tetrachloride and Water
was studied. The tensile and impact properties of these composites were also studied. The effect of alkali
treatment of bamboo fibers on these properties was studied. It was observed that the tensile and impact
properties of the hybrid composites increase with glass fiber content. The author investigated the interfacial
bonding between Glsss/Bamboo fiber composites by SEM. These properties found to be higher when alkali
treated bamboo fibers were used in hybrid composites. The hybrid fiber composites showed better resistance to
the chemicals mentioned above. The elimination of amorphous hemi-cellulose with alkali treatment leading to
higher crystallinity of the bamboo fibers with alkali treatment may be responsible for these observations.
Impact of Frequency Offset on Interference between Zigbee and Wifi for Smart ...IOSR Journals
Abstract: The Zigbee is a low cost communication technology used for low data rate communication system such as industrial automation etc. Because of its low complexity it is widely adopted for many applications. But the utilization of the same spectrum band by the WLAN system causes interference between both the systems. The proposed approach presents an analysis of this interference effect on Zigbee system when operated with WLAN sources at different distances and different power. It also analyzes the effect when a frequency offset is established between both systems. The simulation results shows that a small offset can provide sufficient improvement in the performance. Keywords: Smart Grids, Zigbee Network, Mesh Network, Wireless LAN (WLAN), BER
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communicationsSitha Sok
ZTE COMMUNICATIONS No.2 2016
Fresh off the Press! The April issue focuses on optical wireless communications. Harald Hass, "the father of Li-Fi", and his student contributed to this special issue.
This is the idea of using existing power lines for communication purposes. Power line communications (PLC)
enables network communication of voice, data, and video over direct power lines. High-speed PLC involves
data rates in excess of 10 Mbps. PLC has attracted a lot of attention and has become an interesting subject of
research lately.
Presented by Reshma M.R.
Wi-Fi, which stands for “Wireless Fidelity”, is a radio technology that networks computers so
they connect to each other and to the Internet without wires.
WiMAX, meaning Worldwide Interoperability for Microwave Access, is a
telecommunications technology that provides wireless transmission of data using a variety of
transmission modes, from point-to-point links to portable internet access
QoS of Wi-Fi performance based on signal strength and channel for indoor camp...journalBEEI
The implementation of Wi-Fi on campuses brings huge benefits for campus users in communications and education development. Some campuses face existing poor quality of service (QoS) on the Wi-Fi performance which is also unjustified and issues on unsatisfied connections. This research aims to analyses the Wi-Fi performance of the campus network for three indoor access points. Signal strength, usage percentage, channel utilization, and the number of clients count per access points are measured. Results show that 56% is the highest signal percentage and the lowest signal percentage is at 1%. Access point of Ustudent is the highest at 53% and lowest at 38%. The highest signal strength of -45dBm is found and the other two are below by -2 dBm. The lowest signal strength is at -95 dBm. SSID CCNA_1 is identified has the best signal strength compared to other SSIDs because it runs on 5 GHz frequency. The most channels used are channels 1, 4, and 6. Respectively 151, 67, and 57 users are connected to Ustudent, UHotspot, and CCNA_1. This study is significant for the QoS in a campus network in providing good network services. Thus, the QoS on Wi-Fi performance is improvised, monitored and analyzed for continues supports users in the campus network successfully.
Big data Mining Using Very-Large-Scale Data Processing PlatformsIJERA Editor
Big Data consists of large-volume, complex, growing data sets with multiple, heterogenous sources. With the
tremendous development of networking, data storage, and the data collection capacity, Big Data are now rapidly
expanding in all science and engineering domains, including physical, biological and biomedical sciences. The
MapReduce programming mode which has parallel processing ability to analyze the large-scale network.
MapReduce is a programming model that allows easy development of scalable parallel applications to process
big data on large clusters of commodity machines. Google’s MapReduce or its open-source equivalent Hadoop
is a powerful tool for building such applications.
Mechanical and Chemical Properties of Bamboo/Glass Fibers Reinforced Polyeste...IJERA Editor
The chemical resistance of Bamboo/Glass reinforced Polyester hybrid composites to acetic acid, Nitric acid,
Hydrochloric acid, Sodium hydroxide, Sodium carbonate, Benzene, Toluene, Carbon tetrachloride and Water
was studied. The tensile and impact properties of these composites were also studied. The effect of alkali
treatment of bamboo fibers on these properties was studied. It was observed that the tensile and impact
properties of the hybrid composites increase with glass fiber content. The author investigated the interfacial
bonding between Glsss/Bamboo fiber composites by SEM. These properties found to be higher when alkali
treated bamboo fibers were used in hybrid composites. The hybrid fiber composites showed better resistance to
the chemicals mentioned above. The elimination of amorphous hemi-cellulose with alkali treatment leading to
higher crystallinity of the bamboo fibers with alkali treatment may be responsible for these observations.
Hybrid system with multi-connected boost converterIJERA Editor
Environmentally friendly solutions are becoming more prominent than ever as a result of concern regarding the
state of our deteriorating planet. This paper presents a new system configuration of the front-end rectifier stage
for a hybrid wind/photovoltaic energy system. This configuration allows the two sources to supply the load
separately or simultaneously depending on the availability of the energy sources. The inherent nature of this
Cuk-SEPIC fused converter, additional input filters are not necessary to filter out high frequency harmonics.
Harmonic content is detrimental for the generator lifespan, heating issues, and efficiency. The fused multiinput
rectifier stage also allows Maximum Power Point Tracking (MPPT) to be used to extract maximum power from
the wind and sun when it is available. An adaptive MPPT algorithm will be used for the wind system and a
standard perturb and observe method will be used for the PV system. Operational analysis of the proposed
system will be discussed in this paper. Simulation results are given to highlight the merits of the proposed
circuit
On The Substitution of Energy Sources: The Effect of Flex Fuel Vehicles in th...IJERA Editor
The substitution process resultant of the competition between two energy sources for the same market based on
dynamic forecasting model derived from biomathematics, previously applied by authors in the Brazilian
gasoline/hydrated ethanol consumption market is analyzed. The hydrated ethanol restriction supply due to
decreasing production as a consequence of international price of sugar increasing was the prevailing motive of
the forecast breaking. Again the stop and go process adopted by sugarcane private sector was the main reason of
hydrated ethanol decreasing production
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...IJERA Editor
Sharing of Information in a cloud environment is inevitable in onward of cloud computing environment.
Security in accessing cloud information has to consider many issues such as authentication, cost, time in
uploading and many other criteria. Authentication of data is must for utilizing the others data and uploading our
own data has become tedious. Getting Certificate and for every access is long process and cost increases. Ring
signature gives an assurance to the user to build an unidentified and accurate information sharing system. It
allows a data individualistic to innominate authenticate his data which can be put into the cloud for storage or
analysis purpose. In Identity-Based (ID Based ) Ring Signature Members of this cluster can easily share data
avoiding the pricey certificate verification as done in the usual procedure. Forward Security re authentication
overhead is avoided in Ring Signature by using RSA Algorithm we further provide increased level of security in
reduced time, efficient and simple manner.
On-state Torque Optimization for Synthesized MR FluidIJERA Editor
Magneto-Rheological (MR) fluids are the suspension of magnetizable particles in a carrier fluids and their
rheological properties viscosity etc. can be changed by varying the magnetic field applied to it. Due to such
variable characteristics, these MR fluids find wide application in various automotive industries devices e.g. MR
brakes and MR clutches etc. In MR brakes, the MR fluids generate a resisting torque (between housing and
rotor) within milliseconds on the application of magnetic field. In the present work, the optimal values of MR
fluid constituents is obtain which give the high values of on-state torque. For this, 18 samples of MR fluids are
prepared and their compositions are selected using L-18 orthogonal array. Further, an experimental approach is
used to determine and validate the torque generated by the MR fluid samples. For this purpose, experimental
setup is designed and fabricated in-house. ANOVA is used to statistically analyze the significant factors which
affect the on-state torque which in-turn gives the optimal composition of MR fluid. For this optimal composition,
on-state torque of the MR fluid sample came out to be 0.887587 N-m.
An Analysis of the Existing Frameworks in Cloud Computing Adoption and Introd...IJERA Editor
The coming up of cloud computing in recent years has evolved an interest from different organisations,
institutions and users to take advantage of web applications. This is a result of the new economic model for the
Information Technology (IT) department that cloud computing promises. The model promises a shift from an
organisation required to invest heavily for limited IT resources that are internally managed, to a model where
the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud
computing also promises scalability of resources and on-demand availability of resources. Although, the
adoption of cloud computing promises various benefits to an organisation, a successful adoption of cloud
computing in an organisation requires an understanding of different dynamics and expertise in diverse domains.
Currently, there are inadequate guidelines for adopting cloud computing and building trust. This paper aims to
evaluating a shortlist of eleven frameworks for Cloud Computing and concludes that none of them addresses all
Cloud adoption challenges fully so that a new framework is required. Later we explain our proposal for the
framework discusses and topics related to the proposed framework.
Conceptual Model of Information Technology and Its Impact on Financial Univer...IJERA Editor
Information technology is heart of information system; however, it‟s proved information system with data,
information and knowledge from the component of information technology (hardware, software, database and
network communication) because they play a critical role in any organization and affects managers and their
organizations in financial University performance. Information Technology can be defined as the used of
electronic means which involve access storage, processing of electronic technology to handling of information.
The study aimed to made Conceptual model and investigate the uses Information Technology for employee at
Private University in the north of Jordan from their perspective of Users‟ satisfactions and impact of
Information Technology on University performance of employee. The study method was a descriptive survey
which uses questionnaire to collect data, questionnaire was justified and developed by the researcher to measure
the university performance based on previous studies its applied to (90) employee from University in the north
of Jordan. The study was using SPSS to analyses data. The results indicate that uses Information Technology for
employee at University in the north of Jordan there were a statistically significant relationship between the
Information Technology and University performance of employee at University in the north of Jordan; however
the sample reported a significant in the hypotheses and accepted. The study have Conclusion should gives more
attention to focus on and beneficial of using Information technology applications.
Identification of Sex of the Speaker With Reference To Bodo Vowels: A Compara...IJERA Editor
This work presents an application of Fundamental Frequency (Pitch), Linear Predictive Cepstral Coefficient
(LPCC) and Mel Frequency Cepstral Coefficient (MFCC) in identification of sex of the speaker in speech
recognition research. The aim of this article is to compare the performance of these three methods for
identification of sex of the speakers. A successful speech recognition system can help in non critical operations
such as presenting the driving route to the driver, dialing a phone number, light switch turn on/off, the coffee
machine on/off etc. apart from speaker verification-caste wise, community wise and locality wise including
identification of sex. Here an attempt has been made to identify the sex of Bodo speakers through vowel
utterance by following Pitch value, LPCC and MFCC techniques. It is found here that the feature vector
organization of LPCC coefficients provides a more promising way of speech-speaker recognition in case of
Bodo Language than that of Pitch and MFCC.
Fibrous Scaffold Produced By Rotary Jet Spinning TechniqueIJERA Editor
Poly(L-lactic acid) (PLLA)/ poly(ɛ-caprolactone) (PCL) mesh was produced by Rotary Jet Spinning (RJS)
process. RJS is a simple method which fabricates three-dimensional fibers by exploiting a high-speed rotating
nozzle o form a polymer jet which undergoes stretching before solidification without the need of high voltage.
Blend meshes were characterized by scanning electron microscopy (SEM), thermo gravimetric analysis (TGA),
differential scanning calorimeter (DSC) and infrared spectroscopy Fourier transform (FTIR). SEM imagens
provides information about the morphological structure, which confirmed the production of fibers using RJS.
Data obtained by thermal analyzes indicated the immiscible property of PLLA/PCL blend and also the total
solvent evaporation. As a preliminary in vitro assay it was investigated using Vero cells, was not found any sign
suggesting cell toxicity, indicating biocompatibility. Thus, this report suggests the use of PCL/PLLA mesh as
fiber scaffold substrate for tissue engineering
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...IJERA Editor
ASIC Chips and Digital Signal Processors are generally used for implementing digital filters. Now days the
advanced technologies lead to use of field programmable Gate Array (FPGA) for the implementation of Digital
Filters.The present paper deals with Design and Implementation of Digital IIR Chebyshev type II filter using
Xilinx System Generator. The Quantization and Overflow are main crucial parameters while designing the filter
on FPGA and that need to be consider for getting the stability of the filter. As compare to the conventional DSP
the speed of the system is increased by implementation on FPGA. Digital Chebyshev type II filter is initially
designed analytically for the desired Specifications and simulated using Simulink in Matlab environment. This
paper also proposes the method to implement Digital IIR Chebyshev type II Filter by using XSG platform. The
filter has shown good performance for noise removal in ECG
Petrological and Geochemical Studies on Granitoids in BibinagarBhongir Area, ...IJERA Editor
The Granitoids of the Bibinagar- Bhongir area in the Nalgonda district are purely high potassic calc alkaline and
meta aluminous and A-type belongs to Peninsular Gneissic Complex of the Eastern Dharwar Craton. The
petrographic study of granitoids indicates that of pure magmatic origin in the form of different magmatic
textures viz. perthitic, porphyritic and poiklitic textures. Geochemically the granitoids are rich in K2O & Na2O
suggesting source from calc-alkaline magma. The Granitoids are falling mostly in the volcanic arc field on Yb
vs Ta discrimination plot. The REE pattern shows strong Eu negative anomaly, suggesting early separation of
plagioclase and the enhanced level of LILE relative to HFSE in Bibinagar-Bhongir granitoids points to the
subduction zone enrichment and/or crustal contamination of the source region.
Gas-Particulate Models of Flow through Porous StructuresIJERA Editor
A recently developed general model of gas-particulate flow is sub-classified in this work. The model takes into
account both the Darcy resistance and the Forchheimer effects, and is valid for variable particle number density
and flow through variable porosity media. The form of governing equations is discussed when the particle
relaxation time is small.
Liquid Level Estimation in Dynamic Condition using Kalman FilterIJERA Editor
The aim of this paper is to estimate true liquid level of tank from noisy measurements due to dynamic conditions
using kalman filter algorithm. We proposed kalman filter based approach to reduce noise in liquid level
measurement system due to effect like sloshing. The function of kalman filter is to reduce error in liquid level
measurement that produced from sensor resulting from effect like sloshing in dynamic environment. A prototype
model was constructed and placed in dynamic condition, level data was acquired using ultrasonic sensor to
verify the effectiveness of kalman filter. The tabulated data are shown for comparison of accuracy and error
analysis between both measurements with Kalman filter and statistical averaging filter. After several test with
different liquid levels and analysis of the recorded data, the technique shows the usefulness in liquid level
measurement application in dynamic condition.
Energy Storage: CFD Modeling of Phase Change Materials For Thermal Energy Sto...IJERA Editor
To optimize the utilization of thermal conversion systems it is needed to integrate them with thermal energy
storage. Between many types of base materials, the phase change materials (PCMs) are the most adequate
mediums to store and release the thermal energy. PCMs have high latent heat of fusion and, in general, low
thermal conductivity, therefore, nanomaterials are used as additives to enhance the properties of base materials
as PCMs.
Paper presents an exhaustive classification of PCMs and nanomaterials used in thermal energy storage
technologies in addition an assessment about their modeling through computational fluid dynamics (CFD).
Goal was to emphasize CFD use as an effective tool to increase engineering development of thermal energy
storage technologies
Effect of MR Fluid Damping during Milling of CFRP LaminatesIJERA Editor
Machining of fiber reinforced composites is an essential activity taken up in order to integrate them with other
components. Carbon fiber reinforced polymer (CFRP) composites are difficult to machine owing to the nonhomogeneity
of their constituent materials and abrasive nature. As these materials involve more than one phase,
the variation of cutting forces is rather large, which leads to tool chatter and poor surface finish. Therefore the
proper selection of the tool, process parameters and the ability to control the machining forces would result in
better tolerances and improved surface finish. In this study, multiple slots are machined in CFRP laminates
under different machining conditions of spindle speed, feed and depth of cut. A comparative study is made by
conducting the same set of experiments under the influence of the magneto- rheological (MR) damping in order
to assess the tool deflection. It is observed that the MR fluid damping reduces the tool deflection and thus
improves the quality of machined surfaces.
An Overview of Landslide Forecasting Using Wireless Sensor Network and Geogra...IJERA Editor
Landslides are natural disasters cause losses in many human lives and damage properties every year around the
globe. Using of physical and electronic monitoring makes possible in prediction and prevention losses from
landslide. Today, the wireless sensor network technology has been developed rapidly for landslide predictions.
The primary object of this present paper is to overview the landslide prediction method using wireless sensor
networks (WSN) and geographical information systems (GIS). The paper focuses on various landslide
conditioning factors, WSN design requirement, and small scale down slope model similar to study area (hazard
location). Landslide prediction database to support warning system are also discussed.
Experimental Analysis of Cable Distance Effect on Signal Attenuation in Singl...IJECEIAES
Losses during transmission and high demand of high data rate by the end users have become the biggest challenges facing the telecommunication industries worldwide with Nigeria inclusive. Fiber optic cable as a channel of communication has been adapted worldwide in solving these problems but there is a little limitation in the place of multimode fiber in long distance communication. This paper focuses on the effect of changes in distance on transmitted bandwidth on single mode and multimode fiber. Two cases were considered during this research; (a) with optical amplifier placed in between multimode fiber and (b) without optical amplifier in between multimode fiber. Readings were taken at various distances when specific bandwidth ranging from 50Mbps to 500Mbps was transmitted from the base station to the various distances and it was observed that there was no significant changes in bandwidth received at specified distances (100, 200, 300, 400, 500 etc) m when using single mode fiber, there was a drastic reduction in bandwidth when it get to a distance of 300m when using multimode. When optical amplifier was placed in between the multimode fiber at some selected distances after 400m from the transmitting BTS, it was noticed that the drastic reduction in transmitted bandwidth was almost eliminated, thereby proven that multimode fiber can be use in long distance communication provided optical amplifiers are incorporated in between the distance to bust the signal strength.
Review of the Security Challenges of Fiber Optics Technologies in Network Con...inventionjournals
The increasing number of people who transfer data from one place to another daily demands that the telecom industries develop a sophisticated strategy to guaranty quality data transferred without compromise or interception. Some of these industries in a bid to meet up with this demand employ any means of data transfer possible to them. Internet connectivity requires physical transfer of data from one place to another. This can be achieved either through wire or wirelessly. Connection through wire could be by UTP, Coaxial or Fiber Optics. Experience showed that wired is more advantageous when considering bandwidth utilization, performance, reliability, resiliency and security, many people are toeing this way and fiber optics their major choice. Fiber optics can be bundled as cable and used for data transmission through which light propagates with little attenuation, which makes it advantageous for long distance communication. The massive choice of fiber optics of recent has increase the security challenges bedevilling it, as it is now the prime target of network attackers. This has increased its vulnerability. Fiber optic is experiencing some security issues like splicing, clamping, cutting and tapping in developing countries like Nigeria. The paper tries to evaluate the security challenges bedevilling the optic fiber
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity
and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX
(Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are
increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE
and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards
through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for
LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink.
However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to
provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network
simulator and observation of TCP performance investigated. The Evaluation of the network performance with
TCP is mainly based on congestion window behavior, throughput, average delay and lost packet.
This paper presents a comparative study of IEEE 802.11 a/b/g/n wireless LAN standards in an ELearning classroom network using adhoc networks as communication support. The evaluation is performed through a series of scenarios schematizing communication between students and practitioners in an educational context. The first objective is to plan the physical layer via the choice of the suitable transmission standard that satisfy the implementation specifications. Given the real-time traffic considered, a good traffic transmission must be ensured.
Gi-Fi stands for Gigabit Wireless. GIFI or Gigabit Wireless is the world’s first transceiver integrated at 60GHz a wireless transmission system which is ten times faster than WI-FI.
It is fabricated using (CMOS) technology, the technology used to print silicon chips.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
A Study on Guided and Unguided Transmission Medias and a Proposed Idea to Extend the Limit of Gi-Fi
1. Dr J Sebastian Nixon. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.11-16
www.ijera.com 11 | P a g e
A Study on Guided and Unguided Transmission Medias and a
Proposed Idea to Extend the Limit of Gi-Fi
Dr J Sebastian Nixon1
, Dr A Francis Saviour Devaraj2
1 & 2
Professor, Department of CS & IT, College Of Natural & Computational Science, Wolaita Sodo University
Federal Democratic Republic Of Ethiopia,
ABSTRACT
Networking in computers enables sharing of information by interconnecting the computing devices. The sharing
of information is possible through transmission media. The transmission media is classified as wired or wireless.
Wired media have limitation in geography. But wireless is not bounded by geography. In the wireless world the
first wireless technology was infrared and it was a very slow technology. So, inventions were continued to find a
better wireless technology, finally we got Bluetooth, Wi-Fi ,WI-MAX and Gi-Fi. In this paper we discussed
about different Wired and Wireless Technologies and given a proposed idea to extend the limit of Gi-Fi beyond
10 meters.
Keywords: Bluetooth, CMOS, GiFi, Repeater, WiFi, WiMax.
I. INTRODUCTION
Nowadays, due to existence of distributed
systems, thanks to the power of internet, be it
government or private sectors they share
information throughout the organization in a more
efficient and productive manner. This can be
possible only by networking the computers. To
make the Network there are two options one is
wired network and the second is Wireless network.
Our focus is to improve GiFi, which is a wireless
network. The wireless network uses radio
frequencies, microwave to connect computer.
Wireless networks have given the flexibility to be
mobile and this improves availability. This paper
focuses on different hardware requirements, the
range and benefits of wired and wireless networks.
Finally a method is proposed to improve the
transmission limit of GiFi.
This paper is logically split into 6 sections.
Section 1 is about introduction. Section 2 discusses
about guided or wired communications. Section 3
gives an introduction about unguided or wireless
communications, Section 4 elaborates about GiFi,
Section 5 proposes the new model of GiFi with
repeater booster like devices and section 6 is
conclusion.
II. GUIDED OR WIRED
COMMUNICATIONS
To connect the computing devices different types
of cables are used. They are:
2.1 Coaxial Cable
Figure 1: Coaxial cable
In early days of networks, network people
used coaxial cable (as shown in figure 1) to connect
computers together. Coaxial cable was one of the
common cable used for LAN. The other name for
coaxial cable is ThinNet. Coaxial cable are of two
types:
baseband
broadband
Coaxial cable is terminated with British
Naval Connectors (BNC). Terminators used with
BNC/thin coaxial cabling must be 50-ohm
terminators. Table 1 furnishes the facts about
coaxial cable.
Table 1: coaxial cable facts
Cable type Coaxial
Maximum
Bandwidth
10 megabits per second
Transmission
distance
Long distance – 185
meters maximum
Usage Cable TV networks
RESEARCH ARTICLE OPEN ACCESS
2. Dr J Sebastian Nixon. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.11-16
www.ijera.com 12 | P a g e
2.2 Twisted-Pair Cable
Figure 2: Twisted pair cable
Twisted-pair cable (as shown in the figure
2) is separated categorized into five types as
specified by the TIA/EIA 568-A standard.
Table 2: categories of twisted pair cable &
applications
Sno Category Appication
1 Category-1 Telephone Systems
2 Category-2 Token Ring Networks
3 Category-3 Ethernet Networks
4 Category-4 Ethernet Networks
5 Category-5 Lan
In a unshielded twisted-pair (UTP) cable
there are 1to 4 pairs (2 to 8 wires). Each pair is
twisted around each other at a different rate. Each
pair has a color-coded, confining to the standards.
The UTP cable is inside a protective plastic
insulation sheath. In Category 5 UTP, there are 4
pairs of wires, one wire of solid color and one of
white with the same color stripe in each pair:
1 orange pair
1 brown pair
1 blue pair
1 green pair
The TIA/EIA 568 [7] standard has two
wiring sequences, T568A and T568B. The
sequence of the wires decides how the wires are
terminated on the RJ-45 connector. Either sequence
may be used to set up a network. On a network the
same sequence is used throughout the network. The
signal quality depends upon correctness in pairing
of wires. Table 3 describes about the facts of
twisted pair cable.
Table 3: Twisted pair cable facts
Cable type UTP Cable: Category 5
Maximum Bandwidth 100 megabits per second
Transmission distance Maximum distance is
100 meters.
Usage LAN
2.3 Fiber-Optic Cable
Fiber optic cable (as shown in figure 3)
uses light pulses to transmit information across a
network and hence it is very fast in nature. The
cable may be used over many miles because there
is no electrical EMI and the bandwidth is very high.
Extra care is taken to install a fiber optic cable and
it used for the backbone of a network. To locate a
flaw in the fiber optic cable high end tools are
needed.
The core of the cable consists of glass or
plastic, and it is safeguarded by a layer of gel or
light reflecting plastic. A plastic insulation sheath
then surrounds the entire cable. Fiber Optic
transmission speed is of 10 Gigabits per second.
Figure 3: Fiber-Optic cable
Table 3: Fiber-Optic cable facts
Cable type Fiber Optic Cable
Maximum
Bandwidth
10 Gigabits per
second.
Transmission
distance
Many miles
Usage Any long distance
network cabling
2.4 Repeaters
Repeaters are one of the networking
devices. It is used to enhance a cabling system to
extend beyond its maximum allowed length. It does
this by amplifying the network voltages to travel
further. It is more like amplifiers and are very
inexpensive. The only constraint in repeaters is that
it can only be used to regenerate signals between
similar network segments.
For example (refer figure 4), we can
extend an Ethernet 10Base2 network to 400 meters
with a repeater. But we can’t connect an Ethernet
and Token Ring network together with one.
3. Dr J Sebastian Nixon. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.11-16
www.ijera.com 13 | P a g e
Figure 4: Expanding the network using repeaters
III. UNGUIDED OR WIRELESS
COMMUNICATIONS -
INTRODUCTION
Computer networks have undergone a
huge evolution as shown in figure 5. For many
years cables ruled the world of computer networks.
Then came optical fiber and it played a upper hand
because of its higher bit rates and faster
transmission. It had its own challenges in its
installation and it caused a great difficulty thus we
led to wireless access [1]. First came Bluetooth. It
has been used as wireless access which can cover a
very short distance of 9-10 meter. Next Wi-Fi,
having coverage area of 91meters, has brought a
revolutionary solution to the short comings that
appeared in the previous technology. Those days
the development of technology in Wireless
networks was not fortifiable [1]. But as days went
by due to advancement in technology, WiFi
became part and parcel of life.
The following are the different types of wireless
technologies:
1. Bluetooth
2. Wi-Fi
3. WiMax
4. Gi-Fi
Figure 5: Network evolution
3.1 Bluetooth
Figure 6: Bluetooth
Bluetooth (as shown in figure 6) [2] is one
of the first wireless technology. It connects devices
to transmit data over short distances. The standard
it follows is IEEE802.15 standard. Two types of
network are used:
Piconet
o A piconet is formed by a primary and one or
more secondary stations. All the secondary
stations synchronizes with their clocks. The
number of stations in Piconet is minimum one
primary and maximum seven secondary
stations.
Scatternet.
o To create Scatternet we can combine Piconet,
and secondary in one piconet can be the
primary in another piconet.
Applications
o communication of wireless mouse or keyboard
with computer
o home security devices to connect different
sensors with main security controller
o Synchronization of computers at a conference
etc.
3.2 Wi-Fi
Wi-Fi technology (as shown in figure 7)
on a network must confine to IEEE 802.11
4. Dr J Sebastian Nixon. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.11-16
www.ijera.com 14 | P a g e
standards. With Wi-Fi local area networks (LANs)
can function without cables to connect client
devices. The cost of establishment is reduced
considerably.
Figure 7: WiFi network
It can be used is places where cables
cannot be run, in outdoor areas and historical
buildings where we cannot tamper the history, by
hosting wireless LANs. Nowadays all the laptops
and most of the desktops having wireless
connectivity . Thanks to the advancement and the
competition in hardware, for bringing the price of
chipsets for Wi-Fi. Hence, WiFi has been made
available for public access at ease.
3.3 WIMAX
Figure 8: WIMAX network
WiMAX [3] [4] is the enhanced version of
Wi-Fi technology. The expansion of WiMax is,
Worldwide Interoperability for Microwave Access
(WiMAX). It abides by IEEE802.16 standard. The
features are as follows:
High speed wide area broadband wireless
access.
Long range connectivity
High security
Low power utilization and excellent quality of
service (QOS) – to save battery power.
It has maximum coverage area with 50kms.
Flexible.
WiMAX -three techniques for radio link:
1. SC-A
2. OFDM
3. OFDM-A.
Applications
Portable broadband connectivity
Enterprise data service.
Maintain dedicated links
VOIP services at a reliable and high quality
speed.
IV. GI-FI
With internet spectrum swelling up to 5G
and so on, the requirement to transfer data with
huge size at the faster rate becomes a challenge.
The solution came up, with a new technology
namely Gi-Fi. Gi-Fi provides fast information rate
in Gbps, less power consumption and low cost for
short range communication.
Gi-Fi or gigabit wireless is the world’s
first transceiver integrated on a single chip (as
shown in figure 9) that operates at 60GHz on the
CMOS .process. It will allow wireless transfer of
audio and video data at up to 5 gigabits per second.
It is almost ten times the current maximum wireless
transfer rate, at one-tenth the cost. The Melbourne
University based laboratories of NICTA (National
ICT Australia Limited) [8], Australia’s Information
and Communications Technology Research Centre
of Excellence have chosen to develop this
technology in the 57-64GHz unlicensed frequency
band as the millimeter-wave range of the spectrum
makes possible high component on-chip integration
as well as allowing for the integration of very small
high gain arrays. The available 7GHz of spectrum
results in very high data rates, up to 5 gigabits per
second to users within an indoor environment
within a range of 10 meters. It fulfills the standards
of IEEE 802.15.3C.
Figure 9: Gi-Fi Chip
4.1 Architecture of Gi-Fi
The main component of a GI-FI system is
the subscriber station and it is available to several
access points. It satisfies the standard of IEEE
802.15.3C Wireless PAN [9].The wireless pan is
computer network used for communication
among computer devices (including telephones
and personal digital assistants) close to one
person.
5. Dr J Sebastian Nixon. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.11-16
www.ijera.com 15 | P a g e
An 802.15.3c based system uses a small antenna at
the subscriber station. The antenna is mounted on
the roof of the client.
Figure 10: Architecture of Gi-Fi
4.2 Fundamental Technologies in 802.15.3c
This millimeter-Wave WPAN will operate
in the new and clear band including 57-64 GHz
unlicensed band defined by FCC 47 CFR
15.255[10]. The millimeter-wave WPAN will
allow high coexistence (close physical spacing)
with all other microwave systems in the 802.15
family of WPANs. The quality of service
(interference) is maintained by transmitting
multiple signals simultaneously across the wireless
transmission paths.It uses ultra wide band which
consists of:
1) High bit rate
2) High security
3) Faster data transmission
Two Technologies that help realize GWLAN are:
1. Multiple Input Multiple Output (MIMO)
2. System-On-a-Package(SOP)
Multiple Input Multiple Output (MIMO)
MIMO wireless is an economical
technology that offers flexibility in making 1Gbps
wireless links a possible one. MIMO wireless
allows speeds in Gbps on NLOS wireless networks.
The performance improvements are due to
Array gain
Diversity gain
Spatial Multiplexing Gain
Reduction in Interference.
System-On-A-Package (SOP)
SOP is a better option in the solution for
next-generation wireless networks. Recent
development of materials and processes in
packaging area allows bringing the concept of SOP
into the RF world to meet the strict needs in
wireless communication area. SOP goes ahead one
step beyond Multi Chip Module (MCM) by
enhancing overall performances and adding more
functionality into it.
4.3 Applications Of Gi-Fi
1. Household appliances
2. Office appliances
3. Video information transfer
4. Inter-vehicle communication system
4.4 Advantages And Disadvantages Of Gi-Fi
4.4.1 Advantages Of Gi-Fi Technology
1. High Speed of Data Transfer
2. Low Power Consumption
3. High Security [5,6]
4. Cost Effective
5. Portability
6. High Mobility
4.4.2 Disadvantage of Gi-Fi
The main disadvantage of Gi-Fi Technology is the
Distance Limitation [ up to 10 meters ].
V. PROPOSED METHOD
Even though the Gi-Fi Technology offers
faster information rate in Gbps, less power
consumption and low cost for short range
transmissions as compare to current technologies ,
we are unable to use this technology beyond 10
meters . Our proposed idea is by using some
devices like Repeaters / Signal Boosters we can
extend the Gi-Fi network beyond 10 meters and
communicate with other Gi-Fi networks.
Figure 11: proposed Gi-Fi network with repeaters
VI. CONCLUSION
In this paper, we have discussed about the
pros and cons of guided and unguided transmission
mediums in computer networks, their evolution, a
brief about Gi-Fi, identified the advantages &
disadvantages of Gi-Fi and proposed a model to
improve the transmission distance of Gi-Fi.
REFERENCES
[1]. YP Kosta, Upena D Dalal, Rakesh Kumar
Jha (2010). Security Comparison of
Wired and Wireless Network with
Firewall and Virtual Private Network
6. Dr J Sebastian Nixon. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -1) July 2016, pp.11-16
www.ijera.com 16 | P a g e
(VPN). Recent Trends in Information,
Telecommunication and Computing (ITC).
International Conference on IEEE (pp.
281-283).
[2]. Bluetooth (2009). [Online]. Available at:
http://www.bluetooth.com,
[3]. Rakesh Kumar Jha, Upena D Dalal (2012).
A Journey on WiMAX and its security
issues. In International Journal of
Computer Science and Information
Technologies, 2012 (vol. 1, pp.256-263).
[4]. Rakesh Kumar Jha, UD Dalal (2011).
Security Analysis of WiMAX Network:
With Misbehavior Node Attack. In
Information and Communication
Technologies (WICT), 2011 world
congress on IEEE ( pp.391-398)
[5]. Electronista Staff, “NICTA GiFi Chipset”,
[Online], Available at:
http://www.electronista.com/articles/08/02
/22/nicta.gifi.chipset/, February 2008.
[6]. Gowtham S Shetty, “GiFi: Next
Generation Wireless Technology”,
Seminar report, Visvesvaraya
Technological university Belgaum, 2011.
[7]. TIA/EIA STANDARD Commercial
Building Telecommunications Cabling
Standard
[8]. http://cyberanddigitalworld.blogspot.com
[9]. http://documents.mx/education/gi-fi-
technology-5584a741111e9.html
[10]. http://irjes.com/Papers/vol3-
issue9/E393538.pdf