نتایج جستجو برای: network protocol

تعداد نتایج: 879051  

2003
Bin Zhen Jonghun Park Yongsuk Kim

Scatternet formation must be addressed before any ad hoc network protocol can be run over Bluetooth. This is due to the frequency hop nature and piconet unit of Bluetooth. In this paper, a protocol stack of Bluetooth group ad hoc network and a “blue-star island” network formation algorithm are proposed. The network formation locates within Bluetooth Network Encapsulation Protocol (BNEP) layer a...

Vehicular ad hoc networks are an emerging technology with an extensive capability in various applications including vehicles safety, traffic management and intelligent transportation systems. Considering the high mobility of vehicles and their inhomogeneous distributions, designing an efficient routing protocol seems necessary. Given the fact that a road is crowded at some sections and is not c...

2000
R. A. Achterberg

ion) • Call/Bearer Control: Network perspective represents all entities responsible for end to end network provision. (On the functional abstraction) • Protocol: The protocol perspective is concerned with representing the protocol stack. The entities are mapped to reasonable representations of the OSI software model. (On the physical abstraction) • Signaling: The signaling perspective has a rel...

2007
Ling Xiang Michael G. Kay John Telford

A public logistics network (PLN) is proposed as an alternate network to private logistics networks for the ground transport of parcels. In a PLN, a pricing protocol is used to coordinate the operation of the network. The goal of the proposed protocol is to match the load that values transport the highest with the truck that can provide that service at the least cost. This protocol has been impl...

Journal: :JSW 2007
Andrés Ortiz Julio Ortega Antonio F. Díaz Alberto Prieto

Due to the network technology advances, an order-of-magnitude jump has been produced in the network bandwidth. This fact has returned to wake up the interest on protocol offloading, since network communication is a key factor for system performance. Thus, much research work on offloading is been done, particularly on TCP offloading as it has been the main transport protocol for many years, and ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

1993
Bert Lindgren Mostafa H. Ammar Bobby Krupczak Karsten Schwan

As network speeds increase, a major concern regarding communication protocols is their limited throughput and latency due to processing overheads at network nodes. Furthermore, novel network applications and expanded network usage are leading to increased network requirements, particularly with respect to security and bandwidth. In this paper we consider the use of parallelism and conngurabil-i...

2001
Carl Bergenhem Magnus Jonsson Jörgen Olsson

This paper introduces a novel, fair medium access protocol for a pipelined optical ring network. The protocol provides global deadline scheduling of packets. Requests for sending packets are sent by the nodes in the network to a master node. The master uses the deadline information in the requests to determine which packet is most urgent. Arbitration is done in two steps, the collection and dis...

Journal: :Int. Journal of Network Management 2013
Dan Marconett Minsoo Lee Xiaohui Ye Rao Vemuri S. J. Ben Yoo

Today’s network control systems have very limited ability to adapt to changing network conditions. The addition of reinforcement learning-based network management agents can improve Quality of Service (QoS) by reconfiguring the network layer protocol parameters in response to observed network performance conditions. This paper presents a closed-loop approach to tuning the layer three protocol b...

2015
Apoorva Chandra Sanjeev Thakur

This paper gives utmost predictive comparative analysis of two hybrid routing protocol which includes Zone routing protocol (ZRP), Hybrid wireless mesh protocol (HWMP) and reactive protocol which is Adhoc On Demand Distance Vector (AODV) routing protocol against the real time vulnerable security attacks in the network layer. The primary objective is to provide analysis which describes the use o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید