نتایج جستجو برای: cross layer

تعداد نتایج: 759868  

Journal: :Mobile Networks and Applications 2014

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1389

در شبکه های بی سیم تشخیص و محاسبه ی محدودیت های ارتباطی قابل دستیابی اعم از throughput و مصرف انرژی، به عنوان یک مشکل اساسی مطرح می باشد. عملکرد کلی شبکه های بی سیم و تأثیرات متقابل لایه های شبکه بر روی یکدیگر هنوز به طور کامل مطالعه نشده است و تحقیقات روی این موضوعات ادامه دارد. کاربردهای شبکه های بی سیم و ویژگی های ارتباطات بی سیم مسائل جدیدی در طراحی cross-layer معرفی کرده است که ورای مفهوم ...

2004
Yun Li

Title of Dissertation: PHYSICAL LAYER ISSUES AND CROSSLAYER DESIGN IN WIRELESS NETWORKS Yun Li, Doctor of Philosophy, 2004 Dissertation Directed By: Professor Anthony Ephremides, Department of Electrical and Computer Engineering Comparing to wired networks, wireless networks have some special features in the physical layer, medium access control (MAC) layer, and the network layer. This work dis...

2008
Aaron Beach Mike Gartrell Saroch Panichsakul Li Chen Chao-Kai Ching Richard Han

Cross-layer design of network protocol stacks is important for wireless networking applications due to limited resources. Although much has been proposed in the literature, little experimental cross-layer work has been done. Even less has been done concerning actual designs for such cross-layer network stacks. This paper presents X-Layer, an implementation of a “cross-layer” network stack for w...

2015
Aaron Beach Mike Gartrell Saroch Panichsakul Li Chen Chao-Kai Ching Richard Han

Cross-layer design of network protocol stacks is important for wireless networking applications due to limited resources. Although much has been proposed in the literature, little experimental cross-layer work has been done. Even less has been done concerning actual designs for such cross-layer network stacks. This paper presents X-Layer, an implementation of a “cross-layer” network stack for w...

Journal: :CoRR 2012
Nicolas Kuhn Emmanuel Lochin Jérôme Lacan Roksana Boreli Caroline Bes Laurence Clarac

Considering real physical (MAC/PHY) traces inside network simulations is a complex task that might lead to complex yet approximated models. However, realistic cross-layer analysis with the upper layer and in particular the transport layer cannot be driven without considering the MAC/PHY level. In this paper, we propose to cope with this problem by introducing a software that translates real phy...

2010
Mehdi Bezahaf Luigi Iannone Marcelo Dias de Amorim Serge Fdida

Over the last few years, cross-layer design in wireless networks has drawn the attention of the research community, given the potential gains of such a paradigm, especially in the case of routing. Due to the specificities of wireless links (e.g., interferences, collisions, and fading), one of the arguments frequently exposed is that only hop-count as a metric is not enough. To overcome this iss...

2017
G. Vijay Srinivasan Anand Kumar

In layered networks, a single failure at a lower layer may cause multiple failures in the upper layers. As a result, traditional schemes that protect against single failures may not be effective in cross-layer networks. A cross layer network with logical and physical topologies, the survivable logical topology routing problem is to route each link in the logical layer with a path in the physica...

Journal: :Wireless Personal Communications 2009
Yuh-Shyan Chen Athanasios V. Vasilakos Chien-Chung Shen

With the rapid development of wireless technologies, the future generation wireless networks have more challenges for providing reliable and high quality end-to-end performance in wireless multimedia communications. A cross-layer design has become a popular topic in which more and more researchers are engaged. That leads to a lot of cross-layer design proposals for wireless networks. This speci...

2013
Li Xu Zhenxin Zhan Shouhuai Xu Keesook Han Frank Born

Malicious websites have become a major attack tool of the adversary. There are two main approaches to detect malicious websites: static and dynamic. The static approach is centered on the static analysis of website contents and can scale up to a large number of websites in cyberspace. However, this approach has limited success in dealing with sophisticated attacks that include obfuscation. The ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید