Ankur Dumka

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
This paper provide a variety of services through multiple service classes where each service class will provide a different performance in terms of response time. These service classes will be designed to provide appropriate levels of service to user applications. Different classes of services and the packets between different classes are classified as per(More)
This paper presents an implementation of new QoS algorithm (SPPA, Sync- Pre-empted Probability Algorithm) for IntServ-aware MPLS network under windows platform. The algorithm, which comprises of optimal LSPs (Label Switching Paths) selection and the network resource allocation, is injected into the ingress router to verify the feasibility. This algorithm(More)
Vehicular Ad-Hoc Network (VANET) is an exponential growing technology in today's modern computing era. Vehicle are peers of peer to peer network. All vehicles are having mobility. In this paper we have presented an evaluation of routing protocols AODV, DSDV and DSR on basis of test performance metrics like generated packets, received packets, dropped(More)
Message are send through encrypter, no one can read the text without having the encrypted software and key that has been used. If any user intends to send a open massage to many people(family, friends, colleagues, etc.) and if it being read by many people at other end too(public mail server, ICQ, etc.), discussed method will come in to play. Experiences of(More)
Traditional software development approaches is obsoleting day by day and the place is being taken by some new evolved approaches like. Cleanroom development approach, Agile development approach etc. due to the evolution in development methodology there is a strong need of evolution in estimation models also. In this work we have proposed an extended version(More)
There are mainly two types of routing protocols, static and dynamic. Static routing manually sets up the optimal paths between the source and the destination computers. On the other hand, the dynamic routing uses dynamic protocols to update the routing table and to find the optimal path between the source and the destination computers. Dynamic routing(More)
This paper presents a robust watermarking technique to copyright an image. Proposed technique is totally based on DCT and is different from most of the available techniques. Watermark is embedded block-wise into the image to protect the ownership against the ltering, cropping and noise attack. Before embedding the watermark we are converting it into Walsh(More)
This paper focuses on increasing the efficiency of the E&P Companies in their extraction process with a new approach and methodology based on Big Data Analytics. This involves an approach in which the E & P companies could extract out the best of the results from the data which is being retrieved from their various data collecting sources like the(More)
Service implementation is done for providing different services to the customer. Layer3 virtual private network implementation using IPv4 and IPv6 routing protocol is done and with this policy is implemented using MP-BGP as exterior gateway protocol. Layer 3 virtual private network in internet protocol version 6 is known as 6VPE technology, which is(More)
Service implementation isto transmit customer data across service provider network & to transmit these services through MPLS or GRE tunnel so that each customer and services get separate path to travel. The way services gets implemented in L3 VPN is different in different routers. Here we had study the different way the services gets implemented in(More)