نتایج جستجو برای: Packet modification

تعداد نتایج: 169396  

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

Journal: :IEICE Transactions 2007
Wang-Hsai Yang Cheng-Shong Wu Hui-Kai Su

In this paper, we proposed a photonic packet switching control method by used optical correlator for optical packet label packetswitched networks for next Generation networks. The main advance is rely on using the Optical Code Division Multiplexing (OCDM) code to labeling optical packets based on source routing. Based on OCDM labeling either header modification or any label swapping techniques ...

Journal: :رادار 0
سید امیر حمدی حبیب اله دانیالی محمد صادق هل فروش مرضیه زارع

in this paper, a block-based method in wavelet domain for sar image coding is presented based on the ezbc algorithm. to better preserve edges and textural structure in sar images, instead of using traditional dyadic wavelet transform, a packet wavelet is employed. to improve the efficiency of the ezbc algorithm for sar image coding, a modified version of this algorithm, is proposed. this modifi...

2005
Ehsan Hamadani Veselin Rakocevic

Default TCP treats all losses as congestion since it was designed and optimized to work in networks with low noncongestion losses. In this paper first it is shown that the dominant cause of packet drops in multihop ad hoc network is medium access contention and congestion losses, are very rare. Then the most prevalent packet contention drops are analyzed and based on that a modification to both...

2017
Henrik Wessing Henrik Christiansen Tina Fjelde Lars Dittmann

We present a novel scheme for packet forwarding in optical packet-switched networks and we further demonstrate its good scalability through simulations. The scheme requires neither header modification nor any label distribution protocol, thus reducing component cost while simplifying network management.

2005
Fredrik Davik Amund Kvalbein Stein Gjessing

In June 2004, the IEEE approved a new standard for Resilient Packet Rings (RPR). The standard is maintained in the 802 LAN/MAN Standards Committee, and is designated the standard number 802.17. In this paper, we analyze and discuss performance aspects of the Resilient Packet Ring fairness mechanism. We explain that, if the ring is not configured correctly, the fairness mechanism fails to stabil...

2003
Andrey Belenky Nirwan Ansari

1 We propose a modification to the basic Deterministic Packet Marking (DPM), a promising IP traceback scheme, to handle fragmented traffic. The modification introduces no additional bandwidth overhead, but limited additional memory requirements and processing overhead on the DPM-enabled interface. Index Terms — Security, IP Traceback

Journal: :J-Cosine (Journal of Computer Science and Informatics Engineering) 2022

Mobile ad hoc network or in short MANET is a group of node that exchange the information from source to destination on wireless network. The main problem structure change continously cause by mobility made route disconnected. If disconnect there will be another discovery processes take much time. AOMDV (Ad On-demand Multipath Distance Vector) routing protocol works doing broadcast Route Request...

2010
Andrea Visconti Hooman Tahayori

Implementation of routing protocols in mobile adhoc networks relies on efficient node cooperation. However, node misbehavior is a common phenomenon, thus, ad-hoc networks are subject to packet dropping, packet modification, packet misrouting, selfish node behavior, and so on. In this paper, a biologically-inspired type-2 fuzzy set recognition algorithm for detecting misbehaving nodes in an ad-h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید