From The Desk of HOD - akgec

Page created by Sheila Edwards
 
CONTINUE READING
From The Desk of HOD - akgec
From The Desk of HOD

Keeping with the motto of Acquire Knowledge and Grow, under patronage of our Director,
Dr. R.K. Agarwal, department has published the Vol. 5, No. 2 a half-yearly Journal. The aim
of publishing Journal of Computer Application (JCA) is to inculcate habit of writing and
reading a technical paper among faculty and students. Topics and contents have been selected
to educate our students on current state of the art technology of common applications in
simplistic manner without going through the mathematical details. Length of topics have
deliberately been kept very short to accommodate most of the writers, and keep the interest of
readers as well. My sincere appreciation to all writers specially to students of MCA department.
Enjoy the reading and kindly offer your valuable suggestion for improvement in our subsequent
issues.

Looking ahead for your support.

Prof. S. L. Kapoor
From The Desk of HOD - akgec
From The Desk of HOD - akgec
CONTENTS

S. No. TITLE                                                                             Page No.

1     Security in ADHOC Sensor Networks                                                      5-10
      Dr. Lalit Kishore Arora

2     Cleaning Online World                                                                 11-13
      Saroj Bala

3     Current status of Machine Translation in India                                        14-16
      Pooja Arora

4     Evolution of edge Technology in mobile communications for gsm - a review article      17-21
      Sanjeev K. Prasad

5     Energy Efficient Skewed Tree based indexing Scheme for Skewed                         22-26
      Access Patterns in Wireless Environment
      Mani Dwivedi

6     A Survey on Parallel Genetic Algorithms                                               27-29
      Ruchi Gupta

7     StarUML: An open-source UML modeling tool                                             30-32
      Aditya Pratap Singh

8     Electronic Paper Display Technologies                                                 33-35
      Arpna Saxena

9     5G Technology of Mobile Communication: A Survey                                       36-39
      Anjali Singh

10    Usage of Domain Testing For Early Prediction of Testability of Software               40-43
      Pratima Singh

11    SQUARE – An Electronic Payment System                                                 44-45
      Snehlata Kaul

12    Introduction to Programming with RAPTOR                                               46-48
      Dr. B.K. Sharma
From The Desk of HOD - akgec
Journal of Computer Application, Volume 5, No. 2, July-December 2014
Ajay Kumar Garg Engineering College, Ghaziabad

                                                                 4
From The Desk of HOD - akgec
SECURITY IN ADHOC SENSOR NETWORKS
                                                    Dr. Lalit Kishore Arora
                                        Assistant Professor, MCA Department, AKGEC, GZB

Abstract— An adhoc network is a group of wireless mobile                describe several new attacks on ad hoc network routing
computers (or nodes), in which individual nodes cooperate by            protocols. Second, we present the design and performance
forwarding packets for each other to allow nodes to communicate         evaluation of a new on-demand secure ad hoc network
beyond direct wireless transmission range. Prior research in            routing protocol, called Ariadne, that withstands node
ad hoc networking has generally studied the routing problem
                                                                        compromise and relies only on highly efficient symmetric
in a non-adversarial setting, assuming a trusted environment.
This paper presents attacks against routing in ad hoc networks,         cryptography. Relative to previous work in securing ad hoc
and the design and performance evaluation of a new secure on-           network routing protocols, Ariadne is more secure, more
demand ad hoc network routing protocol, called Ariadne.                 efficient, or more general (e.g., Ariadne does not require
Ariadne prevents attackers or compromised nodes from                    trusted hardware and does not require powerful
tampering with uncompromised routes consisting of                       processors). Ariadne can authenticate routing messages
uncompromised nodes, and also prevents many types of Denial-            using one of three schemes: shared secret keys between
of-Service attacks. In addition, Ariadne is efficient, using only       all pairs of nodes, shared secret keys between
highly efficient symmetric cryptographic primitives.                    communicating nodes combined with broadcast
                                                                        authentication, or digital signatures. We primarily discuss
Keywords: Adhoc Networks, Ariadne, DoS, Symmetric
cryptographic, OnDemand Routing Protocol                                here the use of Ariadne with TESLA [10,11], an efficient
                                                                        broadcast authentication scheme that requires loose time
                                                                        synchronization. Using pair wise shared keys avoids the
                    I. INTRODUCTION                                     need for synchronization, but at the cost of higher key
An ad hoc network is a group of wireless mobile                         setup overhead; broadcast authentication such as TESLA
computers (or nodes), in which nodes cooperate by                       also allows some additional protocol optimizations.
forwarding packets for each other to allow them to
communicate beyond direct wireless transmission range. So                            II. DYNAMIC SOURCE ROUTING
far, researchers in ad hoc networking have generally                    We base the design of our secure on-demand ad hoc
studied the routing problem in a non-adversarial network                network routing protocol, Ariadne, on the basic operation
setting, assuming a trusted environment; relatively little              of the Dynamic Source Routing protocol (DSR) [15], since
research has been done in a more realistic setting in which             DSR operates entirely on- demand and has been well
an adversary may attempt to disrupt the communication.                  studied through both simulation and real test bed
We focus here on on-demand (or reactive) routing                        implementation [8,14,]. Unlike periodic protocols (e.g.,
protocols for ad hoc networks, in which a node attempts                 [4,9,5]), which exchange routing information between nodes
to discover a route to some destination only when it has a              periodically in an attempt to always maintain routes to all
packet to send to that destination. On-demand routing                   destinations, on-demand protocols exchange routing
protocols have been demonstrated to perform better with                 information only when a new route is needed to deliver a
significantly lower overheads than periodic (or proactive)              packet to some destination. On-demand approaches to
routing protocols in many situations [8,14,12], since the               routing in ad hoc networks often have lower overhead than
protocol is able to react quickly to the many changes that              periodic protocols, since they transmit routing information
may occur in node connectivity, yet is able to reduce (or               only in response to actual packets to be sent or in
eliminate) routing overhead in periods or areas of the                  response to topology changes affecting routes actively in
network in which changes are less frequent. In this paper,              use. In a secure routing protocol, reduced overhead has
we make two contributions to the area of secure routing                 the added benefit of reducing the number of routing
protocols for ad hoc networks. First, we give a model for               packets that need to be authenticated, thereby reducing
the types of attacks possible in such a system, and we                  the computational overhead needed for security.

                                                                    5
From The Desk of HOD - akgec
Journal of Computer Application, Volume 5, No. 2, July-December 2014
Ajay Kumar Garg Engineering College, Ghaziabad

                         III. TESLA                                  Most routing disruption attacks are caused by malicious
In this paper, we describe Ariadne primarily using the               injection or altering of routing data. To prevent these
TESLA [10,11] broadcast authentication protocol for                  attacks, each node that interprets routing information must
authenticating routing messages, since TESLA is efficient            verify the origin and integrity of that data; that is, it must
and adds only a single Message Authentication Code                   authenticate the data. Ideally, the initiator of the Route
(MAC) to a message for broadcast authentication. Adding              Discovery can verify the origin of each individual data field
a MAC (computed with a shared key) to a message can                  in the ROUTE REPLY.
provide secure authentication in point-to-point
communication; for broadcast communication, however,                 We need an authentication mechanism with low
multiple receivers need to know the MAC key for                      computation and communication overhead. An inefficient
verification, which would also allow any receiver to forge           authentication mechanism could be exploited by an attacker
packets and impersonate the sender. Secure broadcast                 to perform a Denial-of-Service (DoS) attack by flooding
authentication thus requires an asymmetric primitive, such           nodes with malicious messages, overwhelming them with
that the sender can generate valid authentication                    the cost of verifying authentication. Thus, for point-to-
information, but the receivers can only verify the                   point authentication of a message, we use a message
authentication information. TESLA differs from traditional           authentication code (MAC) (e.g., HMAC [3]) and a shared
asymmetric protocols such as RSA [7] in that TESLA                   key between the two parties. However, setting up the
achieves this asymmetry from clock synchronization and               shared keys between the initiator and all the nodes on the
delayed key disclosure, rather than from computationally             path to the target may be expensive. We thus also propose
expensive one-way trapdoor functions. To use TESLA for               using the TESLA broadcast authentication protocol for
authentication, each sender chooses a random initial key             authentication of nodes on the routing path. However, we
KN and generates a one-way key chain by repeatedly                   also discuss MAC authentication with pairwise shared
computing a one-way hash function H on this starting                 keys, for networks capable of inexpensive key setup, and
value: KN-1 = H[KN], KN-2 = H[KN-1], . . . . In general, Ki          we discuss digital signatures for authentication, for
= H[Ki+1] = HN-i [KN]. To compute any previous key Kj                networks with extremely powerful nodes.
from a key Ki, j < i, a node uses the equation Kj = Hi-j [Ki
]. To authenticate any received value on the one-way                 As a general design principle, a node trusts only itself for
chain, a node applies this equation to the received value to         acquiring information about which nodes in the network
determine if the computed value matches a previous                   are malicious. This approach helps avoid blackmail attacks,
known authentic key on the chain. Coppersmith and                    where an attacker constructs information to make a
Jakobsson present efficient mechanisms for storing and               legitimate node appear malicious. In our design, we assume
generating values of hash chains [13].                               that a sender trusts the destination with which it
                                                                     communicates, for authenticating nodes on the path
                        IV. ARIADNE                                  between them. This assumption is straightforward, as the
                                                                     destination node can control all communication with the
A. Design goals                                                      sender anyway. However, the destination node can
We aim for resilience against Active-1-x and Active-y-x              potentially blackmail nodes on the path to the sender. The
attackers. Ideally, the probability that the routing protocol        sender thus needs to keep a separate blacklist for each
de-livers messages degrades gracefully when nodes fail or            destination.
are compromised. Our goal is to design simple and
efficient mechanisms achieving high attack robustness.               In general, ad hoc network routing protocols do not need
These mechanisms should be sufficiently general to allow             secrecy or confidentiality. These properties are required to
application to a wide range of routing protocols. Defending          achieve privacy or anonymity for the sender of messages.
against an Active-0-x attacker is relatively easy. A network-        Even in the Internet, it is challenging to achieve sender
wide shared secret key limits the attacker to replaying              anonymity, and this area is still the subject of active
messages. Thus the main attacks remaining are the                    research. Our protocol does not prevent an attacker from
wormhole and rushing attacks Packet leashes [25] can                 injecting data packets.
prevent both attacks because they prevent an Active-0-x
attacker from retransmitting packets. These approaches also          B. Basic Ariadne Route Discovery
trivially secure a network routing protocol that uses                In this section, we describe the basic operation of Route
tamper proof hardware, since the strongest attacker in such          Discovery in Ariadne. We first overview the features of the
an environment is an Active-0-x attacker, assuming all               protocol in three stages: we present a mechanism that
routing and security functionality (including packet                 enables the target of a Route Discovery to verify the
leashes) is implemented in the secure hardware.                      authenticity of the ROUTE REQUEST; we then present

                                                                 6
Security in ADHOC Sensor Networks

three alternative mechanisms for authenticating data in             Finally, no key list is required in the REPLY. Ariadne Route
ROUTE REQUESTs and ROUTE REPLYs; and we present                     Discovery using MACs is the most efficient of the three
an efficient per-hop hashing technique to verify that no            alternative authentication mechanisms, but it requires pair
node is missing from the node list in the REQUEST. After            wise shared keys between all nodes. When Ariadne is
this overview, we present in detail the operation of Route          used in this way, the MAC list in the ROUTE REQUEST is
Discovery in Ariadne when TESLA is used as the                      computed using a key shared between the target and the
authentication mechanism. In the following discussion, we           current node, rather than using the TESLA key of the
assume that some initiator node S performs a Route                  current node. The MACs are verified at the target and are
Discovery for a target node D, and that they share the              not returned in the ROUTE REPLY. As a result, the target
secret keys KSD and KDS, respectively, for message                  MAC is not computed over the MAC list in the REQUEST.
authentication in each direction. Target authenticates              In addition, no key list is required in the REPLY.
ROUTE REQUESTs. To convince the target of the
legitimacy of each field in a ROUTE REQUEST, the initiator          Per-hop hashing. Authentication of data in routing
simply includes in the REQUEST a MAC computed with                  messages is not sufficient, as an attacker could remove a
key KSD over unique data, for example a timestamp. The              node from the node list in a ROUTE REQUEST. We use
target can easily verify the authenticity and freshness of          one-way hash functions to verify that no hop was omitted,
the ROUTE REQUEST using the shared key KSD.                         and we call this approach per-hop hashing. To change or
                                                                    remove a previous hop, an attacker must either hear a
Three techniques for route data authentication.                     ROUTE REQUEST without that node listed, or it must be
In a Route Discovery, the initiator wants to authenticate           able to invert the one way hash function.
each individual node in the node list of the ROUTE REPLY.
A secondary requirement is that the target can authenticate         Ariadne Route Discovery with TESLA. We now describe
each node in the node list of the ROUTE REQUEST, so                 in detail the version of Ariadne Route Discovery using
that it will return a ROUTE REPLY only along paths that             TESLA broadcast authentication. We assume that every
contain only legitimate nodes. In this section, we present          end-to-end communicating source–destination pair of nodes
three alternative techniques to achieve node list                   A and B share the MAC keys KAB and KBA. We also
authentication: the TESLA protocol, digital signatures, and         assume that every node has a TESLA one-way key chain,
standard MACs.                                                      and that all nodes know an authentic key of the TESLA
                                                                    one-way key chain of each other node. Route Discovery
When Ariadne Route Discovery is used with TESLA, each               has two stages: the initiator floods the network with a
hop authenticates the new information in the REQUEST.               ROUTE REQUEST, and the target returns a ROUTE REPLY.
The target buffers and does not send the REPLY until                To secure the ROUTE REQUEST packet, Ariadne provides
intermediate nodes can release the corresponding TESLA              the following properties: (1) the target node can
keys. The TESLA security condition is verified at the               authenticate the initiator (using a MAC with a key shared
target, and the target includes a MAC in the REPLY to               between the initiator and the target); (2) the initiator can
certify that the security condition was met. TESLA requires         authenticate each entry of the path in the ROUTE REPLY
each packet sender to choose a a pessimistic upper bound            (each intermediate node appends a MAC with its TESLA
t on the end-to-end network delay between nodes for                 key); and (3) no intermediate node can remove a previous
sending this packet, in order to select the TESLA key it            node in the node list in the REQUEST or REPLY (a one-
will use to authenticate it. Choices of t do not affect the         way function prevents a compromised node from removing
security of the protocol, although values that are too small        a node from the node list). A ROUTE REQUEST packet in
may cause the Route Discovery to fail. Ariadne can                  Ariadne contains eight fields: _ROUTE REQUEST, initiator,
choose t adaptively, by increasing t when a Discovery               target, id, time interval, hash chain, node list, MAC list_.
fails. In addition, the target of the Discovery could provide       The initiator and target are set to the address of the
feedback in the ROUTE REPLY when t was chosen too                   initiator and target nodes, respectively. As in DSR, the
large. If Ariadne Route Discovery is used with digital              initiator sets the id to an identifier that it has not recently
signatures, instead, the authentication differs in that no          used in initiating a Route Discovery. The time interval is
Route Discovery chain element is required. In addition, the         the TESLA time interval at the pessimistic expected arrival
MAC list in the ROUTE REQUEST becomes a signature                   time of the REQUEST at the target, accounting for clock
list, where the data used to compute the MAC is instead             skew; specifically, given τ, a pessimistic transit time, the
used to compute a signature. Rather than computing the              time interval could be set to any time interval for which the
target MAC using a Message Authentication Code, a                   key is not released within the next τ + 2_ time. The
signature is used.                                                  initiator of the REQUEST then initializes the hash chain to

                                                                7
Journal of Computer Application, Volume 5, No. 2, July-December 2014
Ajay Kumar Garg Engineering College, Ghaziabad

MACKSD (initiator, target, id, time interval) and the node           C. Thwarting the effects of routing misbehavior
list and MAC list to empty lists. When any node A                    The protocol described so far is vulnerable to an Active-1-
receives a ROUTE REQUEST for which it is not the target,             1 attacker that happens to be along the discovered route.
the node checks its local table of _initiator, id_values             In particular, we have not presented a means of
from recent REQUESTs it has received, to determine if it             determining whether intermediate nodes are, in fact,
has already seen a REQUEST from this same Route                      forwarding packets that they have been requested to
Discovery.                                                           forward. Watchdog and pathrater [15] attempt to solve this
                                                                     problem by identifying the attacking nodes and avoiding
If it has, the node discards the packet, as in DSR. The              them in the routes used.
node also checks whether the time interval in the
REQUEST is valid: that time interval must not be too far in          Instead, we choose routes based on their prior performance
the future, and the key corresponding to it must not have            in packet delivery. Introducing mechanisms that penalize
been disclosed yet. If the time interval is not valid, the           specific nodes for routing misbehavior (such as is done in
node discards the packet. Otherwise, the node modifies the           watchdog and pathrater) is subject to a blackmail attack,
REQUEST by appending its own address, A, to the node                 where a sufficient number of attackers may be able to
list in the REQUEST, replacing the hash chain field with             penalize a well-behaved node. Our scheme relies on
H[A, hash chain], and appending a MAC of the entire                  feedback about which packets were successfully delivered.
REQUEST to the MAC list. The node uses the TESLA key                 The feedback can be received either through an extra end-
KAi to compute the MAC, where i is the index for the time            to-end network layer message, or by exploiting properties
interval specified in the REQUEST. Finally, the node                 of transport layers, such as TCP with SACK [16]; this
rebroadcasts the modified REQUEST, as in DSR. When the               feedback approach is somewhat similar that used in IPv6
target node receives the ROUTE REQUEST, it checks the                for Neighbor Unreachability Detection [17]. Stronger
validity of the REQUEST by determining that the keys                 properties are obtained when the routing protocol sends
from the time interval specified have not been disclosed             such feedback packets along a route equal to the reversed
yet, and that the hash chain field is equal to H_ηn,H_ηn-            route of the triggering packet; otherwise, a malicious node
1,H_. . . ,H_ η 1,MACKSD (initiator, target, id, time                along one route may drop the acknowledgment for a
interval)_ . . .___,where ηi is the node address at position         packet transmitted along a functioning route. A node with
i of the node list in the REQUEST, and where n is the                multiple routes to a single destination can assign a fraction
number of nodes in the node list. If the target node                 of packets that it originates to be sent along each route.
determines that the REQUEST is valid, it returns a ROUTE             When a substantially smaller fraction of packets sent along
REPLY to the initiator, containing eight fields: _ROUTE              any particular route are successfully delivered, the node
REPLY, target, initiator, time interval, node list, MAC list,        can begin sending a smaller fraction of its overall packets
target MAC, key list_. The target, initiator, time interval,         to that destination along that route. However, if the
node list, and                                                       fraction of packets chosen to be sent along a route that
                                                                     appears to be misbehaving were to reach zero, a short-lived
MAC list fields are set to the corresponding values from             jamming attack that is now over could still prevent the
the ROUTE REQUEST, the target MAC is set to a MAC                    future use of that route.
computed on the preceding fields in the REPLY with the
key KDS, and the key list is initialized to the empty list.          To avoid this possible DoS attack, we choose the fraction
The ROUTE REPLY is then returned to the initiator of the             of packets sent along such a route to be some small but
REQUEST along the source route obtained by reversing the             nonzero amount, to allow the occasional monitoring of the
sequence of hops in the node list of the REQUEST. A                  route. A packet sent for this purpose can be a normal data
node forwarding a ROUTE REPLY waits until it is able to              packet, or, if all packets are secured using end-to-end
disclose its key from the time interval specified; it then           encryption, a padded “probe” packet can be used. Because
appends its key from that time interval to the key list field        DSR often returns multiple ROUTE REPLY packets in
in the REPLY and forwards the packet according to the                response to a Route Discovery, the presence of multiple
source route indicated in the packet. Waiting delays the             routes to some destination in a node’s Route Cache is
return of the ROUTE REPLY but does not consume extra                 quite common. T sirigos and Haas [2] also discuss the use
computational power. When the initiator receives a ROUTE             of multiple routes for increasing reliability, although they
REPLY, it verifies that each key in the key list is valid,           do not discuss this technique with respect to secure
that the target MAC is valid, and that each MAC in the               routing protocols. Malicious nodes can also be avoided
MAC list is valid. If all of these tests succeed, the node           during Route Discovery. Each ROUTE REQUEST can
accepts the ROUTE REPLY; otherwise, it discards it.                  include a list of nodes to avoid, and the MAC that forms

                                                                 8
Security in ADHOC Sensor Networks

the initial hash chain element (h0) is then also computed            given the disclosed (or known) symmetric keys.
over that list of nodes. Malicious nodes cannot add or
remove nodes from this list without being detected by the                           V. ARIADNE EVALUATION.
target. Choosing which nodes to avoid in this way is
beyond the scope of this paper.                                      Security analysis
                                                                     Intuitively, Ariadne Route Discovery is successful when at
D.Thwarting malicious route request floods                           least one of the REPLYs returned by the target is a
The chain can then be used to sign any set of immutable              working route. Since the target of a Route Discovery
fields in the initial ROUTE REQUEST, and the signature               returns a route for each of its neighbors, if the first
distributed with the REQUEST. In our design, the only                REQUEST from a particular Discovery to reach any
immutable field is the target address, since the identifier is       neighbor of the target has passed through no malicious
the chain element used for the current Route Discovery,              nodes, that Discovery will succeed. To more formally
and the time interval can also be derived from that chain            characterize the security offered by Ariadne, we define a
element. As a result, the one-time signature scheme needs            minimum broadcast latency path between a source and a
to sign very few bits, and steps in the Route Discovery              destination to be any path that forwards a Route
chain can be very inexpensive. For example, in a network             Discovery most quickly from the source to the destination.
with 50 nodes, it suffices to represent 49 possible targets          We call a route that only consists of uncompromised
(since the initiator is never the target). If the Merkle–            nodes an uncompromised route. Ariadne prevents
Winternitz construction is used with two signature chains            compromised nodes from disturbing uncompromised routes.
of length 7 and a checksum chain of length 13, each                  In particular, Ariadne provides two properties assuming
ROUTE REQUEST is just 20 bytes longer, and one step in               reliable broadcast:
the hash chain costs just 27 hash operations. If each node
is permitted to initiate one Route Discovery per second,             z    If there exists an uncompromised neighbor of a
the amortized cost of using Merkle–Winternitz chains in                   destination such that the minimum latency path
this network is just 1350 hash operations per second.                     between the initiator of the Discovery and that
                                                                          neighbor is uncompromised, then an uncompromised
E. Optimizations for Ariadne                                              route from the initiator to the target will be returned
Caching improvements. When Ariadne is used with                           in a ROUTE REPLY.
broadcast authentication such as TESLA, additional route             z    If at least one REPLY returned as a result of the first
caching is possible. In the basic Route Discovery                         property represents a shortest route from the initiator
mechanism is only the initiator of the Discovery can use                  to the target, Ariadne may route packets along one
the route in the ROUTE REPLY, since the target MAC                        such uncompromised route.
field of the REPLY can only be verified by the initiator.
However, if the appropriate data is also broadcast                                      VI. CONCLUSIONS
authenticated, any node along a path returned in a REPLY             This paper has presented the design and evaluation of
can use that route to reach the target. For example, if              Ariadne, a new secure ad hoc network routing protocol.
TESLA is used as the broadcast authentication protocol, a            Ariadne provides security against one compromised node
target authenticator is placed the packet in addition to the         and arbitrary active attackers, and relies only on efficient
target MAC, and is computed using a TESLA key that is                symmetric cryptographic operations. Ariadne operates on-
not expected to be disclosed until _ after the last REPLY            demand, dynamically discovering routes between nodes
reaches the initiator (where_ is the maximum time                    only as needed; the design is based on the basic opera-
difference between two nodes). That TESLA key is then                tion of the DSR protocol. Rather than generously applying
disclosed, after appropriate delay, by sending it to the             cryptography to an existing protocol to achieve security,
initiator along each path traversed by a REPLY. Reduced              however, we carefully re-designed each protocol message
overhead. When Ariadne is used with symmetric                        and its processing. The security mechanisms we designed
authentication (such as TESLA or pairwise shared keys),              are highly efficient and general, so that they should be
some fields can be calculated by the receiver rather than            applicable to securing a wide variety of routing protocols.
included in the packet In particular, the MAC list in both
the ROUTE REQUEST and ROUTE REPLY can be                                                  REFERENCES
eliminated, and hi can be computed using MAC KAi                     [1]. P. Rohatgi, A compact and fast hybrid signature
                                                                          scheme for multicast packet authentication, in: Pro-
_REQUEST, S,D, id, ti, hi-1, (A1, . . . ,Ai)_. The verifier               ceedings of the 6th ACM Conference on Computer
(initiator with delayed broadcast authentication, and target              and Communications Security (November 1999) pp.
with pairwise shared keys) can then recomputed each hi                    93– 100.

                                                                 9
Journal of Computer Application, Volume 5, No. 2, July-December 2014
Ajay Kumar Garg Engineering College, Ghaziabad

[2]. Tsirigos and Z.J. Haas, Multipath routing in mobile ad           [13]. D. Coppersmith and M. Jakobsson, Almost optimal
      hoc networks or how to route in the presence of to-                   hash sequence traversal, in: Proceedings of the 4th
      pological changes, in: Proceedings of the IEEE                        Conference on Financial Cryptography (FC’02), Lec-
      MILCOM 2001 (October 2001) pp. 878–883.                               ture Notes in Computer Science (2002) pp. 102–119.
[3]. K. Zhang, Efficient protocols for signing routing                [14]. P. Johansson, T. Larsson , N. Hedman, B. Mielczarek
      messages, in: Proceedings of the Symposium on Net-                    and M. Degermark, Scenario-based performance analy-
      work and Distributed Systems Security (NDSS’98)                       sis of routing protocols for mobile ad-hoc networks,
      (March 1998).                                                         in: Proceedings of the 5th Annual ACM/IEEE Inter-
[4]. B. Bellur and R.G. Ogier, A reliable, efficient topology               national Conference on Mobile Computing and Net-
      broadcast protocol for dynamic networks, in: Proceed-                 working (MobiCom’99) (August 1999) pp. 195–206.
      ings of the 18th Annual Joint Conference of the IEEE            [15]. S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating
      Computer and Communications Societies (INFOCOM’                       routing misbehaviour in mobile ad hoc net-
      99) (March 1999) pp. 178–186.                                         works, in: Proceedings of the 6th Annual IEEE/ACM
[5]. Qayyum, L. Viennot and A. Laouiti, Multipoint relay-                   International Conference on Mobile Computing and
      ing: An efficient technique for flooding in mobile wire-              Networking (MobiCom 2000) (August 2000) pp. 255–
      less networks, Technical Report, RR-3898, INRIA (Feb-                 265.
      ruary 2000).                                                    [16]. M. Mathis, J. Mahdavi, S. Floyd and A. Romanow,
[6]. Y. Rekhter and T. Li, A Border Gateway Protocol 4                      TCP selective acknowledgment options, RFC 2018
      (BGP-4), RFC 1771 (March 1995).                                       (October 1996).
[7]. R.L. Rivest, A. Shamir and L.M. Adleman, A method                [17]. T. Narten, E. Nordmark and W.A. Simpson, Neighbor
      for obtaining digital signatures and public-key                       discovery for IP, Version 6 (IPv6), RFC 2461 (Decem-
      cryptosystems, Communications of the ACM 21(2)                        ber 1998).
      (1978) 120–126.
[8]. J. Broch, D.A.Maltz, D.B. Johnson, Y.-C. Hu and J.G.                                      Dr. Lalit Kishore Arora, has been
      Jetcheva, A performance comparison of multi-hop                                          working as engineering professor since
      wireless ad hoc network routing protocols, in: Pro-                                      1998. Presently, he is an Assistant Pro-
      ceedings of the 4th ACM/IEEE International Confer-                                       fessor in the department of Computer
                                                                                               Applications at Ajay Kumar Garg Engi-
      ence on Mobile Computing and Networking
                                                                                               neering College, Ghaziabad, Utter
      MobiCom’98) (October 1998) pp. 85–97.                                                    Pradesh. He completed both graduation
[9]. C.E. Perkins and P. Bhagwat, Highly dynamic Destina-                                      and post-graduation in computer science
      tion-Sequenced Distance-Vector routing (DSDV) for                                        from Gurukul Kangri Vishwa Vidyalaya,
      mobile computers, in: Proceedings of the                                                 Haridwar, UK. He has received Ph.D
      SIGCOMM’94 Conference on Communications                                                  degree in computer science from
      Architectures, Protocols and Applications (August               Gurukul Kangri Vishwa Vidyalaya, Haridwar, UK in 2013.
      1994) pp. 234–244.                                              His research interest includes Interconnection Networks, Wireless
[10]. Perrig, R. Canetti, D. Song and J.D. Tygar, Efficient           Networks and Sensor Networks. He published several research
                                                                      papers in National and International journals. He has strong
      and secure source authentication for multicast, in:
                                                                      programming skills in object oriented programming languages. He
      Proceedings of the Network and Distributed System               also authored several books on object oriented programming lan-
      Security Symposium, NDSS’01 (February 2001) pp.                 guages, such as C#.NET, JAVA, and C++. He has contributed
      35– 46.                                                         several times to curriculum design and development in well
[11]. Perrig, R. Canetti, J.D. Tygar and D. Song, Efficient           known universities in India and abroad. Besides authoring text-
      authentication and signing of multicast streams over            books, he enjoys participating in conferences and seminars about
      lossy channels, in: Proceedings of the IEEE Sympo-              technology and other socially relevant topics.
      sium on Security and Privacy (May 2000) pp. 56– 73.
[12]. C.E. Perkins and E.M. Royer, Ad-hoc on-demand dis-
      tance vector routing, in: Proceedings of the 2nd IEEE
      Workshop on Mobile Computing Systems and Ap-
      plications (WMCSA’99) (February 1999) pp. 90–100.

                                                                 10
CLEANING ONLINE WORLD
                                                           Saroj Bala
                                       Assistant Professor, MCA Department, AKGEC, GZB
                                                     saroj_kkr@rediffmail.com

Abstract— These days global warming and energy efficiency               real world, shifting investment from legacy coal, gas and
have been put on top of the list of the world global challenges.        nuclear power plants to renewable energy technologies.
So, same for Cloud computing, a big challenge is to be able to
reduce its carbon and energy footprints, while keeping up with          In US states like North Carolina, Nevada and Iowa, these
the high growth rate of storage, server and communication
                                                                        companies’ commitments to clean energy are resulting in
infrastructures. In this article, we presented some findings of
reports on the approaches taken by different companies towards          large amounts of wind and solar power displacing coal, gas
green clicks.                                                           and nuclear plants or preventing them from being built, to
                                                                        the tangible benefit of the global climate and communities
                                                                        living in those states.
                    1. INTRODUCTION
For the estimated 2.5 billion people around the world who               The environmental rationale for technology companies to
are connected to the internet, it is impossible to imagine              act has been clear for many years, as a rapid shift to
life without it. The internet has rewoven the fabric of our             renewable energy is necessary to stem the worst impacts
daily lives and become a foundation of the global                       of climate change. Now, costs for renewable energy
economy. On a daily basis, new businesses that use the                  continue to drop, prices for fossil fuel-based electricity are
internet as their foundation are disrupting and often                   rising, and leading companies perceive those price cues.
replacing long-standing business models and industries.                 They are also heeding customers who increasingly value
From music and video to communications and mail, more                   sustainability. Unfortunately, despite the leadership and
and more of our offline world is moving online. We can                  innovation demonstrated by green internet pioneers, other
expect that trend to continue and accelerate as the global              companies lag far behind, with little sense of urgency,
online population reaches 50% of the world’s projected                  choosing to paper over their growing dirty energy
population, moving from 2.3 billion in 2012 to an expected              footprints with status quo solutions such as renewable
3.6 billion people by 2017[3].                                          energy credits and carbon offsets while rapidly expanding
                                                                        their infrastructure.
While the online world appears to grow at the expense of
some traditional business models in the offline world, it is            Other internet companies have refused to pay even lip
rapidly creating increased demand for at least one offline              service to sustainability, and are simply buying dirty energy
product: electricity. The rapid growth of the cloud and our             straight from the grid. Those companies, most notably
use of the internet have produced a collective electricity              Amazon Web Services, are choosing how to power their
demand that would currently rank in the top six if                      infrastructure based solely on lowest electricity prices,
compared alongside countries; that electricity demand is                without consideration to the impact their growing electricity
expected to increase by 60% or more by 2020 as the online               footprints have on human health or the environment.
population and our reliance on the internet steadily
increase.                                                                        2. CHALLENGES & OPPORTUNITIES
                                                                        Greenpeace second report [2] have analyzed a total of 19
Critically, the internet’s growing energy footprint has thus            global IT companies that are leading the sector’s move to
far been mostly concentrated in places where energy is the              the cloud. These companies, while less well-known than
dirtiest. Since Greenpeace first report [1], few leading data           branded giants like Google or Amazon, operate the data
center operators have taken key steps toward building a                 centers behind much of the Internet. This update now
green internet, particularly those companies that have                  includes over 300 data centers in the survey, up from
committed to build a 100% renewably powered platform.                   approximately 80 in the previous edition. The evaluation
These commitments are having a profound impact in the                   has been updated to account for how these colocation

                                                                   11
Journal of Computer Application, Volume 5, No. 2, July-December 2014
Ajay Kumar Garg Engineering College, Ghaziabad

companies are pursuing opportunities to play a meaningful            helped set a new bar for the industry, illustrating in very
role in driving renewable energy deployment to meet the              concrete terms that a 100% renewable internet is within its
internet’s energy needs.                                             reach, and providing several models of intervention for
                                                                     other companies that want to build a sustainable Internet.
(1)   Six major cloud brands – Apple, Box, Facebook,
      Google, Rackspace, and Salesforce – have committed
      to a goal of powering data centers with 100 %
      renewable energy and are providing the early signs of
      the promise and potential impact of a renewably
      powered internet.
(2)   A number of leading brands, most notably Apple and
      Facebook, have made significant improvements in
      their energy transparency, discarding the previous
      creed within the sector of withholding energy data.
      Transparency still remains weak overall among many
      brands, particularly colocation providers.                     Facebook continues to grow and dominate the global social
(3)   Amazon Web Services (AWS), which provides the                  media landscape with 1.23 billion monthly active users.
      infrastructure for a significant part of the internet,         Facebook has made huge strides forward since 2012 to
      remains among the dirtiest and least transparent               become one of the clear green internet leaders. Radical
      companies in the sector, far behind its major                  improvements in transparency and efforts to deliver
      competitors, with zero reporting of its energy or              significant wind energy investment in Iowa have helped
      environmental footprint to any source or stakeholder.          drive Facebook into the top tier of companies creating the
      Twitter lags in many of the same areas.                        green internet. By building on the advocacy it has started
(4)   As a result of pressure by three major brands (Apple,          with energy utilities to drive more clean energy investment,
      Facebook and Google) located in North Carolina,                and continuing to find ways to bring renewable energy to
      Duke Energy, the largest utility in the US, adopted a          scale to power its data centers in North Carolina and Iowa,
      Green Source Rider, opening the market to renewable            Facebook is setting a clear bar for other major social media
      electricity purchases for large customers in North             networks and internet companies to follow.
      Carolina.
(5)   Google maintains its leadership in building a
      renewably powered internet, as it significantly
      expands its renewable energy purchasing and
      investment both independently and through
      collaboration with its utility vendors.
(6)   Facebook continues to prove its commitment to build
      a green internet, with its decision to locate a data
      center in Iowa driving the largest purchase of wind
      turbines in the world.
(7)   Apple is the most improved company since last full
      report, and has shown itself to be the most
      innovative and most aggressive in pursuing its
      commitment to be 100% renewably powered.                       Google has continued to lead the major internet brands in
                                                                     purchasing renewable energy at scale to power its massive
                 3. FEW BRAND NAMES                                  online ecosystem. The company is now reporting electricity
Here, some top brands are discussed.Apple’s aggressive               consumption of 3,315 GWh, with 34% of its operations
pursuit of its commitment to power with 100% renewable               powered by clean energy. Google’s use of power purchase
energy has given the company the inside track among the              agreements to procure clean energy has been adopted by
IT sector’s leaders in building a green Internet. Apple has          others in the sector, like Microsoft, and it has successfully
made good on its pledge by building the largest privately            influenced utilities in Oklahoma and North Carolina to offer
owned solar farms at its North Carolina data center, working         new renewable energy options by using its immense
with its utility in Nevada to power its upcoming data                business clout. As Google expands its footprint to Latin
center there with solar and geothermal energy, and                   America and Asia, it will need to maintain its innovative
purchasing wind energy for its Oregon and California data            edge to make sure that it continues to source clean energy
centers. Apple’s commitment to renewable energy has                  even in countries that feature dirty electric grids.

                                                                12
Cleaning Online World

                                                                       [1]   Greenpeace. How Clean is your Cloud?
Journal of Computer Application, Volume 5, No. 2, July-December 2014
Ajay Kumar Garg Engineering College, Ghaziabad

                          CURRENT STATUS OF MACHINE
                             TRANSLATION IN INDIA
                                                          Pooja Arora
                                       Assistant Professor, MCA Department, AKGEC, GZB

Abstract— A survey of the machine translation systems that            languages. The newspapers in regional languages are
have been developed in India for translation from English to          required to translate news in English received from
Indian languages and among Indian languages reveals that the          International News Agencies. With the limitations of human
MT softwares are used in field testing or are available as web        translators most of this information (reports and
translation service. These systems are also used for teaching
                                                                      documents) is missing and not percolating down. A
machine translation to the students and researchers. Most of
these systems are in the English-Hindi or Indian language-            machine assisted translation system or a translator's
Indian language domain. The translation domains are mostly            workstation would increase the efficiency of the human
government documents/reports and news stories. There are a            translators.
number of other MT systems that are at their various phases of
development and have been demonstrated at various forums.             As is clear from above, the market is largest for translation
Many of these systems cover other Indian languages beside             from English into Indian languages, primarily Hindi. Hence,
Hindi.                                                                it is no surprise that a majority of the Indian Machine
                                                                      Translation (MT) systems have been developed for
                                                                      English-Hindi translation.
                    1. INTRODUCTION
India has a diverse list of spoken languages. At least 30
                                                                      Machine Translation activities in India are relatively young.
different languages and around 2000 dialiects have been
                                                                      The earliest efforts date from the mid 80s and early 90s.
identified. The Constitution of India has stipulated the
                                                                      The prominent among these efforts are the research and
usage of Hindi and English to be the two languages of
                                                                      development projects at Indian Institute of Technology
official communication for the national government.
                                                                      (IIT) Kanpur (http://www.cse.iitk.ac.in/users/rmk/proj/
Additionally, it classifies a set of 22 scheduled languages
                                                                      proj.html#mt), Computer and Information Sciences
which are languages that can be officially adopted by
                                                                      Department, University of Hyderabad (http://
different states for administrative purposes, and also as a
                                                                      www.uohyd.ernet.in/), National Center for Software
medium of communication between the national and the
                                                                      Technology (NCST), Mumbai (now, Center for Development
state governments, as also for examinations conducted for
                                                                      of Advanced Computing (CDAC), Mumbai) (http://
national government service. The 22 scheduled languages
                                                                      www.ncst.ernet.in/) and Center for Development of
are Assamese, Bengali, Bodo, Dogri, Gujarati, Hindi,
                                                                      Advanced Computing (CDAC), Pune (http://www.cdac.in/).
Kannada, Kashmiri, Konkani, Maithili, Malayalam, Manipuri,
                                                                      The Department of Information Technology, Ministry of
Marathi, Nepali, Oriya, Punjabi, Sanskrit, Santali, Sindhi,
                                                                      Communications and Information Technology, Government
Tamil, Telugu and Urdu. English is very widely used in the
                                                                      of India, through its Technology Development in Indian
media, commerce, science and technology and education.
                                                                      Languages (TDIL) Project (http://tdil.mit.gov.in) since 1990-
Many of the states have their own regional language,
                                                                      ‘91 and Department of Official Languages, Ministry of
which is either Hindi or one of the other scheduled
                                                                      Home Affairs, Government of India, since 1989-90 have
languages. Only about 5% of the population speak English.
                                                                      played instrumental roles by funding these projects. The
In a large multi-lingual society like India, there is a great
                                                                      following domains have been identified for the
demand for translation of documents from one language to
                                                                      development of domain specific translation systems:
another. Most of the state governments work in the
                                                                      government administrative procedures and formats,
respective regional languages whereas the Union
                                                                      parliamentary questions and answers, pharmaceutical
Government's official documents and reports are in
                                                                      information, legal terminology and important judgments, and
bilingual form (Hindi/English). In order to have a proper
                                                                      so on.
communication there is a need to translate these
documents and reports in the respective regional

                                                                 14
Current status of Machine Translation in India

          2 MT SYSTEMS IN FIELD TESTING                                transferred on a non-exclusive basis to Center for
                 OR AS WEB SERVICE                                     Deveopment of Advanced Computing (CDAC), Noida for
The following machine translation systems are either being             commercialization.
used in field-testing or are available as a web service.
Most of these systems are in the English-Hindi language                2.2 MANTRA MT System
domain with exceptions of a Hindi-English and an English-              MANTRA (MAchiNe assisted TRAnslation tool) translates
Kannada machine translation system.                                    English text into Hindi in a specified domain of personal
                                                                       administration, specifically gazette notifications, office
2.1 ANGLABHARTI and ANUBHARTI Technology                               orders, office memorandums and circulars. Mantra uses
The ANGLABHARTI project was launched by Professor R.                   Lexicalized Tree Adjoining Grammar (LTAG) to represent the
M. K. Sinha at the Indian Institute of Technology, Kanpur              English as well as the Hindi grammar. It uses Tree
in 1991 for machine aided translation from English to Indian           Adjoining Grammar (TAG) for parsing and generation. The
languages. Professor Sinha has pioneered MT research in                input to the Mantra system can be through text
India. The system’s approach and lexicon is general-                   documents, outputs of speech recognition programs or
purpose with provision for domain customization. The                   OCR packages. The Mantra has become part of “The 1999
system has been applied in several domains such as public              Innovation Collection” on Information Technology at
health compaign, routine office-correspondance, technical-             Smithsonian Institution’s National Museum of American
mannual etc. [1]                                                       History, Washington DC, USA. Further details about the
                                                                       Mantra system can be obtained from the C-DAC website
The first prototype was built for English to Tamil in 1991             (http://www.cdac.in/html/aai/mantra.asp).
and later a more comprehensive system was built for
English to Hindi translation. AnglaBharti is a pattern                 Initially, the Mantra system was started with the translation
directed rule based system with context free grammar like              of administrative document such as appointment letters,
structure for English (source language). It generates a                notification, circular issued in Central government from
‘pseudo-target’ (Pseudo-Interlingua) applicable to a group             English to Hindi. Currently, the system is being expanded
of Indian languages (target languages) such as Indo-Aryan              to cover domains of finance, agriculture, healthcare,
family (Hindi, Bengali, Assamese, Punjabi, Marathi, Oriya,             information technology, education and finally to the general
Gujarati etc.), Dravidian family (Tamil, Telugu, Kannada &             purpose activities in the Governmental Domain. This
Malayalam) and others. A set of rules obtained through                 project namely MANTRA-Rajbhasha based on the
corpus analysis is used to identify plausible constituents             MANTRA technology developed by C-DAC has been
with respect to which movement rules for the ‘pseudo-                  funded by the Department of Official Language, Ministry
target’ is constructed. Within each group the languages                of Home Affairs, Government of India.
exhibit a high degree of structural homogeneity. The
similarity has been exploited to a great extent in the                 2.3 ANUSAARAKA MAT System
system. A language specific text-generator converts the                A machine aided translation system (ANUSAARAKA)
'pseudo-target' code into target language text. Paninian               among Indian languages has been built with funding from
framework based on Sanskrit grammar using Karak (similar               the TDIL project. Anusaaraka is a Language accessor
to case) relationship provides an uniform way of designing             rather than a machine translation system in true sense.
the Indian language text generators. They also use an                  Anusaarakas have been built from Telugu, Kannada,
example-base to identify noun and verb phrasals and                    Bengali, Marathi, and Punjabi to Hindi. Alpha versions of
resolve their semantics. An attempt is made to resolve                 all of these have been released so that their field testing
most of the ambiguities using ontology, syntactic &                    can be carried out. The beta-versions are expected to be
semantic tags and some pragmatic rules. The unresolved                 released soon.
ambiguities are left for human post-editing. Some of the
major design considerations in design of AnglaBharti have              It is domain free but the system has mainly been applied
been aimed at providing an uniform mechanism by which                  for translating children’s stories. An e-mail server been
translation from English to majority of Indian languages               established for the Anusaarakas. It currently holds alpha-
with attachment of appropriate text generator modules                  versions of Anusaarakas for translating Telugu, Kannada,
becomes feasible. The translation system has also been                 Marathi, Bengali, and Punjabi into Hindi. To run the
interfaced with text-to-speech module and OCR input. [4]               Anusaaraka on a given text, e-mail has to be sent to
The English to Hindi version named AnglaHindi, based on                (nandi@anu.uohyd.ernet.in) with the name of the language
the AnglaBharti machine aided translation system has been              in the subject line. For example, if 'Telugu' is put in the
web-enabled and is available at (http://anglahindi.iitk.ac.in).        subject line, it automatically runs the Telugu to Hindi
The technical know-how of this technology has been                     Anusaaraka. The output produced is sent back to the

                                                                  15
Journal of Computer Application, Volume 5, No. 2, July-December 2014
Ajay Kumar Garg Engineering College, Ghaziabad

sender. The computer keeps a copy of the output for a                www.cfilt.iitb.ac.in/machine-translation/ eng-hindi-mt). Two
later study of results. The text should be in 7-bit ISCII            other demo systems can also be run from the site: one for
coding. Similarly help by mail is available if mail is sent          Hindi-UNL and another for UNL-Hindi conversion. They
with subject ‘Help’. The systems with complete source                are also working on MT systems from English to Marathi
code and language data are available as "free" software              and Bengali using the UNL formalism. [5]
and can be downloaded from the website of the Language
Technologies Research Center, Indian Institute of                                         3 CONCLUSION
Information Technology, Hyderabad (http://ltrc.iiit.net/).           MT is relatively new in India – about two decades of R &
Further details about the Anusaaraka system can be                   D efforts are now showing the results. In comparison with
obtained from their website(http://www.iiit.net/trc/                 MT efforts in Europe and Japan, which are at least 3
Anusaaraka/anu_home.html).                                           decades old, it would seem that Indian MT has a long
                                                                     way to go. However, this can also be an advantage,
The focus in Anusaaraka is not mainly on machine                     because Indian researchers can learn from the experience
translation, but on Language Access between Indian                   of their global counterparts.
languages. Using principles of Paninian Grammar (PG), and
exploiting the close similarity of Indian languages, an              The time has come when translation activities in Indian
Anusaaraka essentially maps local word groups between                languages should look beyond English as the source or
the source and target languages. Where there are                     the target language. The countries in the Asia-pacific
differences between the languages, the system introduces             region are renewing their relations in the area of tourism
extra notation to preserve the information of the source             and trade. Development of controlled language machine
language. Thus, the user needs some training to                      translation systems in these domains from Indian
understand the output of the system. The project                     languages to the languages of the Asia-pacific region like
originated at IIT Kanpur, and later shifted mainly to the            Japanese, Chinese, Korean, Thai and others and vice-versa
Centre for Applied Linguistics and Translation Studies               will foster the development of people-to-people contact in
(CALTS), Department of Humanities and Social Sciences,               this region.
University of Hyderabad. It was funded by TDIL. It is now
being carried out at the Language Technologies Research                                     REFERENCES
Center, Indian Institute of Information Technology,                  [1]   R.M.K. Sinha. 2005. Integrating CAT and MT in
Hyderabad with financial support from Satyam Computers                     AnglaBharti-II Architecture. In “Proceedings of EAMT
Private Limited. They are currently attempting an English-                 2005”, Budapest, Hungary.
Hindi Anusaaraka MT system. [3]                                      [2]   Sivaji Bandyopadhyay. 2004. Use of Machine
                                                                           Translation in India. AAMT Journal, 36: 25-31.
2.4 SHIVA and SHAKTI MT System                                       [3]   R.M.K. Sinha and A. Jain. 2003. AnglaHindi: An
Two machine translation systems from English to Hindi,                     English to Hindi Machine-Aided Translation System.
Shiva and Shakti are being developed jointly by Carnegie                   In “Proceedings of MT SUMMIT IX”, New Orleans,
Mellon University USA, Indian Institute of Science,                        Louisiana, USA.
Bangalore, India, and International Institute of Information         [4]   Durgesh Rao. 2001. Machine Translation in India: A
Technology, Hyderabad. The two experimental systems                        Brief Survey. In “Proceedings of SCALLA 2001
have been released for experiments, trials, and user                       Conference”, Banglaore, India.
feedback. The Example-based Machine Translation system               [5]   D. Gupta and N. Chatterjee. 2003. Identification of
(Shiva) can be run from the site (http://                                  Divergence for English to Hindi EBMT. In
ebmt.serc.iisc.ernet.in/mt/login.html) and the machine                     “Proceedings of MT SUMMIT IX”, New Orleans,
translation system (Shakti) can be run from its own site                   Louisiana, USA.
(http://shakti.iiit.net). [2]
                                                                                         Mrs. Pooja Arora is working as assistant
2.5 UNL-based English-Hindi MT System                                                    professor in MCA department in Ajay
The Indian Institute of Technology, Bombay has                                           Kumar Engineering college. She has
developed a machine translation system for translating                                   completed B.Sc. (computer science) from
                                                                                         Delhi University in 1998 and MCA from
from English to Hindi using the Universal Networking
                                                                                         Banasthali Vidyapith in 2001. Currently
Language (UNL) as the interlingua. The UNL is an                                         she is pursuing ph.d. in computer science
international project of the United Nations University, with                             from Banasthali Vidyapith.
an aim to create an Interlingua for all major human
languages. IIT Bombay is the Indian participant in UNL.
The MT system can be used at the site (http://

                                                                16
EVOLUTION OF EDGE TECHNOLOGY IN MOBILE
   COMMUNICATIONS FOR GSM - A REVIEW ARTICLE
                                                       Sanjeev K. Prasad
                                        Assistant Professor, MCA Department, AKGEC, GZB
                                                     sanjeevkps2002@gmail.com

Abstract— Today’s fast growing world needs fast communication,           technique and error-tolerant transmission methods,
either it may be voice or data .This calls for a new technology          combined with improved link adaptation mechanisms, make
which is faster than all existing technologies in mobile                 these EGPRS rates possible. This is the key to increased
communication and hence can replace technologies like GPRS               spectrum efficiency and enhanced applications, such as
.Enhanced Data for Global Evolution (EDGE) is such a
                                                                         wireless Internet access, e-mail and file transfers. GPRS/
technology .EDGE is a member of global system for mobile
communications (GSM).In short EDGE is a technology which                 EGPRS will be one of the pacesetters in the overall wireless
enhances data rates for mobile communications.                           technology evolution in conjunction with WCDMA. Higher
EDGE not only enhances data rates but also intended for efficient        transmission rates for specific radio resources enhance
spectrum utilization which it has passed successfully. This paper        capacity by enabling more traffic for both circuit- and
is intended for explaining how theoretical data rates of 384             packet-switched services.
kbps is possible with EDGE technique. And how enhanced data
for global evolution (EDGE) can play an important role in the            The goal of EDGE is to boost system capacity, both for
evolution toward wideband code division multiple access                  real-time and best effort services, and to compete
(WCDMA) and this paper also includes brief details on EDGE
                                                                         effectively with other third-generation radio access
and modulation scheme used for EDGE. It can be introduced in
two ways: (1) as a packet-switched enhancement for general               networks such as WCDMA and cdma 2000.
packet radio service (GPRS), known as enhanced GPRS or
EGPRS, and (2) as a circuit-switched data enhancement called                     2. TECHNICAL DIFFERENCES BETWEEN
enhanced circuit-switched data (ECSD). It will only discuss the                              GPRS AND EGPRS
packet-switched enhancement, EGPRS. The purpose of this                  Regarded as a subsystem within the GSM standard, GPRS
paper is to describe EDGE technology and how it leverages                has introduced packet-switched data into GSM networks.
existing GSM systems and complements WCDMA for further                   Many new protocols and new nodes have been introduced
growth.
                                                                         to make this possible .EDGE is a method to increase the
Keyword: GSM, EDGE Technology, GPRS, Packet Data, EGPRS.
                                                                         data rates on the radio link for GSM. Basically, EDGE only
                                                                         introduces a new modulation technique and new channel
                                                                         coding that can be used to transmit both packet-switched
                    1. INTRODUCTION                                      and circuit-switched voice and data services. EDGE is
EDGE is the next step in the evolution of GSM and IS-136.                therefore an add-on to GPRS and cannot work alone
The objective of the new technology is to increase data                  .GPRS has a greater impact on the GSM system than EDGE
transmission rates and spectrum efficiency and to facilitate             has. By adding the new modulation and coding to GPRS
new applications and increased capacity for mobile use                   and by making adjustments to the radio link protocols,
.With the introduction of EDGE in GSM phase 2+,existing                  EGPRS offers significantly higher throughput and capacity.
services such as GPRS and high-speed circuit switched                    GPRS and EGPRS have different protocols and different
data (HSCSD) are enhanced by offering a new physical                     behavior on the base station system side .However, on the
layer. The services themselves are not modified. EDGE is                 core network side, GPRS and EGPRS share the same
introduced within existing specifications and descriptions               packet-handling protocols and, therefore, behave in the
rather than by creating new ones.                                        same way. Reuse of the existing GPRS core infrastructure
                                                                         emphasizes the fact that EGPRS is only an “add-on” to the
This paper focuses on the packet-switched enhancement                    base station system.
for GPRS, called EGPRS.GPRS allows data rates of 115
kbps and, theoretically, of up to 160 kbps on the physical               In addition to enhancing the throughput for each data
layer. EGPRS is capable of offering data rates of 384 kbps               user, EDGE also increases capacity. With EDGE, the same
and, theoretically, of up to 473.6 kbps. A new modulation                time slot can support more users. This decreases the

                                                                    17
You can also read