نتایج جستجو برای: packet dropping
تعداد نتایج: 57255 فیلتر نتایج به سال:
Packet loss is a major issue in Wireless Sensor Network (WSN) data transmission which is caused by malicious packet dropping and link error. In conventional methods, the malicious dropping may result in a packet loss rate that is comparable to normal channel losses, the stochastic processes that characterizes the two phenomena exhibited in different correlation which would affect the network pe...
By constructing a model which takes into account the frame dependence of multimedia streams, we analyze the performance of different packet-dropping mechanisms and find that scalable video combined with the priority dropping mechanism can bring higher throughput, lower delay and lower delay jitter. We also find the optimum system parameters for multimedia transmission. This study is important f...
The stability and performance of a networked control system are strongly influenced by the network delay and packet drops. In this paper, we consider that late arrived sampling data are dropped, so that we only focus on the analysis of the impact of packet drop sequences on the control loop stability and performance. For any dropping sequence specified by (m,k)-firm model, and considering a sim...
The proportional differentiation service model has emerged as a refined version of the DiffServ qualify of service (QoS) architecture. It relies on a series of parameters to enforce proportionally differentiated QoS criteria, such as queueing delay and packet loss. From the perspective of proportional loss differentiation, a large amount of work has been done on carrying out loss differentiatio...
Packet Dropping Minimization in Energy Harvesting-Based Wireless Sensor Network With Linear Topology
Communication in a Mobile ad hoc network is accomplished in a multi-hop fashion wherein the nodes themselves act as routers as well as source. MANET is vulnerable to a variety of insider as well as outsider attacks because of it's inherent characteristics like dynamically changing topology, limited power and no centralized authority to monitor the behaviour of the nodes . Most of the secur...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید