نتایج جستجو برای: packet network

تعداد نتایج: 690511  

2011
Adam Grzech Piotr Rygielski

In this paper the problem of packet scheduling in the node of packet-switched computer communication network is considered. Packet scheduling in the network edge nodes is one of the crucial mechanisms essential for delivery of required level of quality of end-toend network services (QoS). In order to satisfy QoS guaranties for each incoming request belonging to one of distinguished traffic clas...

2008
Bin Tang Guo-Ping Liu Wei-Hua Gui Ya-Lin Wang

This paper is concerned with generalized predictive control based on state-space model for networked control systems. Both the network-induced time delay and packet loss are taken into account. The networked predictive controller design is discussed with respect to three network cases, which are related to packet loss, network-induced delay, and both packet loss and network-induced delay, respe...

Journal: :IEEE Trans. Information Theory 2006
Abbas El Gamal James P. Mammen Balaji Prabhakar Devavrat Shah

In Part I of this paper, the optimal throughput–delay tradeoff for static wireless networks was shown to be , where and are the average packet delay and throughput in a network of nodes, respectively. While this tradeoff captures the essential network dynamics, packets need to scale down with the network size. In this “fluid model, ” no buffers are required. Due to this packet scaling, does not...

2013
Ruby Jain Akanksha Meshram

A hybrid model of packet marking and logging for the IP trace back for the node that wants to attack any node in the network. The main idea is to detect the DOS attacks in the network by employing the IP of the attacker node. Packet logging scheme used to record packet state information in a router log, for reconstruct the attack path and get the attack source. Pre shared key exchange applied b...

2002
Daniel Hartmeier

With more and more hosts being connected to the Internet, the importance of securing connected networks has increased, too. One mechanism to provide enhanced security for a network is to filter out potentially malicious network packets. Firewalls are designed to provide “policy-based” network filtering. A firewall may consist of several components. Its key component is usually a packet filter. ...

Network sensors consist of sensor nodes in which every node covers a limited area. The most common use ofthese networks is in unreachable fields.Sink is a node that collects data from other nodes.One of the main challenges in these networks is the limitation of nodes battery (power supply). Therefore, the use oftopology control is required to decrease power consumption and increase network acce...

2012
Kanniya Raja K. Arulanandam B. Raja Rajeswari A. V. Aho S. Lakshmanamurthy K.-Y. Liu Y. Pun L. Huston S. Antonatos M. Polychronakis P. Akritidis K. G. Anagnostakis

The network equipment has capable of inspecting packets in order to discover the worms and virus over the network. Many network users are hacked by attackers through malicious functions are mapped on network applications. Such unauthorized activities are required to delete by deep packet inspection in application layer. The high level network equipment provides in-depth packet inspection throug...

Journal: :Computer Communications 2003
Peter Homan Janez Bester Andrej Kos Tomaz Slivnik

This paper analyses and compares the performance of forward planning conflict-free (FPCF), virtual output queuing-partitioned (VOQ-P) and virtual output queuing-shared (VOQ-S) packet switches. The influence of packet burst size, offered switch load and packet switch size are all investigated. Packet loss probability, average packet delay and 99.9% packet delay values are also derived. In compar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید