نتایج جستجو برای: broadcast protocol

تعداد نتایج: 276278  

Journal: :Computer Networks 2005
Theodore L. Willke Nicholas F. Maxemchuk

We consider the challenges of supporting collaborative decision making and applications requiring coordinated interaction in mobile ad hoc networks. This environment makes group coordination difficult due to relatively high packet loss and the presence of a continuously evolving network topology that leads to a changing set of participants. We describe and evaluate an application-level mobile r...

2016
Sumit Chakraborty

This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security intelligence, communication complexity and computational intelligence. The security intelligence of ASBM i...

Journal: :Signal Processing 2006
Hrvoje Jenkac Thomas Stockhammer Wen Xu

In this paper different error protection strategies in different protocol layers are discussed, in order to reliably broadcast multimedia data within existing wireless networks. In particular, we investigate the performance of additional Forward Error Correction (FEC) in the physical layer, the Radio Link Control (RLC) layer, and the Realtime Transport Protocol (RTP) layer for Multimedia Broadc...

2000
Imrich Chlamtac Andrew D. Myers Violet R. Syrotiuk Gergely V. Záruba

Ab.wacrThis paper presents ABROAD, an adaptive medium access control (MAC) protocol for reliable broadcast packet transmission in wireless networks. ABROAD incorporates a collision-avoidance handshake within each slot of a synchronous transmission schedule, allowing nodes to reclaim and/or rewe idle slots while maintaining bounded ac. cess delay. Thus, ABROAD provides worst-case performance gua...

Journal: :Wireless Networks 2003
Aslihan Celik Anindya Datta

This paper addresses the problem of providing secure access control in broadcast schemes in a wireless network. We consider an environment where clients subscribe to information objects sent via a broadcast onto a wireless network. In this context, a client should only be able to access its objects of interest for its subscription period, and the security system used must not be easily broken. ...

1999
J. J. Garcia-Luna-Aceves Marcelo Spohn

We present the source-tree adaptive routing (STAR) protocol and analyze its performance in wireless networks with broadcast radio links. Routers in STAR communicate to its neighbors their source routing trees either incrementally or in atomic updates. Source routing trees are specified by stating the link parameters of each link belonging to the paths used to reach every destination. Hence, a r...

2004
Núria Gassó Harald Ernst

An important advantage of satellite transmission is their inherent capability to broadcast data to large audiences. The standard application is thereby to send data streams (i.e. TV) to wide audiences using fixed satellite receivers. An extension to this approach is broadcast to mobile receivers, especially cars. This has been realised in the U.S. by XM-Radio and Sirius. All these system have i...

2015
Abderezak Touzene Ishaq Al-Yahyai

In many traditional On Demand routing algorithms in Ad hoc wireless networks, a simple flooding mechanism is used to broadcast route request (RREQ) packets when there is a need to establish a route from a source node to a destination node. The broadcast of RREQ may lead to high channel contention, high packet collisions, and thus high delay to establish the routes, especially with high density ...

2001
Ken Tang Mario Gerla

In this paper, we address the congestion control multicast routing problem in wireless ad hoc networks through the medium access control (MAC) layer. We first introduce the Broadcast Medium Window (BMW) MAC protocol, which provides reliable delivery to broadcast packets at the MAC layer. We then extend the wireless On-Demand Multicast Routing Protocol (ODMRP) to facilitate congestion control in...

Journal: :CoRR 2011
László Czap Vinod M. Prabhakaran Suhas N. Diggavi Christina Fragouli

We formulate and study a cryptographic problem relevant to wireless: a sender, Alice, wants to transmit private messages to two receivers, Bob and Calvin, using unreliable wireless broadcast transmissions and short public feedback from Bob and Calvin. We ask, at what rates can we broadcast the private messages if we also provide (information-theoretic) unconditional security guarantees that Bob...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید