نتایج جستجو برای: packet modification

تعداد نتایج: 169396  

1999
Seok-Kyu Kweon Kang G. Shin Qin Zheng

In order to realize real-time communication over Ethernet or fast Ethernet, one must be able to bound the medium access time within an acceptable limit. The multiple access nature of an Ethernet makes it impossible to guarantee a deterministic medium access time (hence packet delivery deadlines) to individual stations. However, one can bound the medium access time statistically by limiting the ...

2001
Wen-Shyang Hwang Yu-Ben Miao Chih-Heng Ke Ji-Feng Chiu Ce-Kuen Shieh

The paper presents an implementation of QoS Library Redirection (QLR) for DiffServ in Microsoft Windows systems. In QLR method, the legacy application obtains packet pre-marking ability without any modification of source codes. We have upgraded the FTP and vic applications by using QLR in our Microsoft Windows testing platform. Our experimental results show that this approach can use really eff...

2008
C. Secchi

Because of the use of scattering based communication channels, passivity based telemanipulation systems can be subject to a steady state position error between master and slave robots. In this paper, we consider the case in which the passive master and slave sides communicate through a packet switched communication channel (e.g. Internet) and we provide a modification of the slave impedance con...

2006
Marek Natkaniec Andrzej R. Pach

This paper describes a modification of the backoff mechanism for IEEE 802.11 networks. The efficiency of the modified backoff mechanism compared to that is currently used in the standard was analyzed. The realized throughput and the mean packet delay for DSSS and FHSS physical layers for different number of stations were determined. The overall rate of collisions that occurred during transmissi...

2011
Sergey D. Andreev Eugeny V. Pustovalov Andrey M. Turlikov

This paper thoroughly studies a modification of tree algorithm with successive interference cancellation. In particular, we focus on the algorithm throughput and account for a single signal memory location, as well as cancellation errors of three types. The resulting scheme is robust to imperfect interference cancellation and is tailored to the uplink bandwidth request collision resolution in a...

G. Ghodrati Amiri, P. Namiranian,

The main objective of this paper is to use ant optimized neural networks to generate artificial earthquake records. In this regard, training accelerograms selected according to the site geology of recorder station and Wavelet Packet Transform (WPT) used to decompose these records. Then Artificial Neural Networks (ANN) optimized with Ant Colony Optimization and resilient Backpropagation algorith...

Journal: :IEEE Internet of Things Journal 2023

This article puts forth a multistream networking paradigm, referred to as soft-source-information-combining (SSIC), support wireless Internet of Things (IoT) applications with ultrareliability requirements. For SSIC networking, an dispatcher at the source dispatches duplicates packets over multiple streams, which may be established different physical networks. If packet on stream cannot decoded...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی امیرکبیر(پلی تکنیک تهران) - دانشکده مهندسی برق 1385

سیستمی که تکنیک مدولاسیون وفقی و فناوری mimo را با هم ترکیب کند. قادر به ارسال داده با نرخ بالا و بازده طیف بهینه می باشد. بعلاوه، طراحی بین لایه ای مدولاسیون وفقی در سیستم های mimo یک مسئله مطرح در شبکه های بدون سیم مدرن می باشد در این پایان نامه، دو الگوریتم بین لایه ای برای مدولاسیون وفقی در سیستم های mimo پیشنهاد می شود. در الگوریتم اول مدولاسیون وفقی در لایه فیزیکی با پروتکل arq در لایه da...

2008
Arjulie John P. Berena Masami Kihara

Packet delay is one of the most important metrics in network management and monitoring in the Internet. Recently, it has also been considered as a tool in distance estimation used for location-based services. In the Internet, packet delay is basically due to the link bandwidth, the propagation path distance, the number links, and the system resources at the end hosts. Quantitatively, the aggreg...

2010
R. Murugan A. Shanmugam Bannari Amman

Problem statement: In Mobile Ad hoc Network (MANET), both the routing layer and the Medium Access Control (MAC) layer are vulnerable to several attacks. There are very few techniques to detect and isolate the attacks of both these layers simultaneously. In this study, we developed a combined solution for routing and MAC layer attacks. Approach: Our approach, makes use of three techniques simult...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید