نتایج جستجو برای: cross layer
تعداد نتایج: 759868 فیلتر نتایج به سال:
Article history: Available online 12 October 2010
To evolve a network beyond a stupid bitpipe, the network needs information about the applications’ intentions and communication preferences. We give an brief overview about our earlier work, Socket Intents, that augments the standard BSD socket interface to enable the application to express what it knows about its communication patterns and preferences. This information can then be used by our ...
In this paper, we study the application oriented cross-layer protocol design and optimization. The goal of the study is to provide a feasible and flexible approach to solve the conflicts between the requirements of large scale, long life-time, and multi-purpose wireless sensor networks and the constraints of small bandwidth, low battery capacity, and limited node resources. We justify that the ...
ii Acknowledgments iv List of Figures ix List of Tables xiii
To cope with the growing demand for wireless data and to extend service coverage, future 5G networks will increasingly rely on the use of low powered nodes to support massive connectivity in diverse set of applications and services [1]. To this end, virtualized and mass-scale cloud architectures are proposed as promising technologies for 5G in which all the nodes are connected via a backhaul ne...
In this work we study the interception of the requests performed by the mobile nodes in a wireless network. This interception can be achieved because a local cache is implemented in each wireless device. In that way, the nodes can serve the documents instead of forwarding the requests to the data servers. In our proposal, the interception is enhanced so it is also implemented when the mobile no...
Terminal mobility may be handled at different layers. Though the MIPv6 protocol is the strongest candidate for handling mobility in the next generation networks, mobility management facilities are also provided by SIP, the most widely deployed and researched protocol for session control. When jointly used, this duplication of functions leads to inefficiencies in session setup signaling, particu...
Martin Becke∗, Konrad Campowsky†, Christian Henke†, Dirk Hoffstadt ∗, Julius Müller †, Carsten Schmoll ‡, Abbas Ali Siddiqui §, Irfan Simsek ∗, Thomas Magedanz †, Paul Müller §, Erwin Rathgeb ∗ and Tanja Zseby ‡ ∗Universität Duisburg Essen Ellernstr. 29, D-45326 Essen Email: [email protected], [email protected], [email protected], [email protected] †Techni...
Usage control (UC) is concerned with what happens to data after access has been granted, and is usually defined on the grounds of events that, somehow, are related to data. Data may assume different representations within the system, possibly at several levels of abstraction. This research aims at extending a generic event-driven UC model and its language [1] by the explicit distinction between...
Accurate cross-layer associations play an essential role in today’s network management tasks such as backbone planning, maintenance, and failure diagnosis. Current techniques for manually maintaining these associations are complex, tedious, and error-prone. One possible approach is to widen the interfaces between layers to support auto discovery. We argue instead that it is less useful to expor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید