AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 10 ·· 11 ·· 12 ·· 13 ·· 14 ·· 15 ·· 16 · ::::: · 17 ·

Enhancement of Throughput in AODV Using Relative Mobility of Nodes

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book is based on a research idea which exploits the relative mobility of nodes in mobile ad-hoc networks (MANET) for the enhancement of overall throughput of the network. The hypothesis is proved using simulations in the OPNET modeler, a tool built for the purpose. An implementation of Ad-hoc On-demand Distance Vector (AODV) protocol, already made available by National Institute of Standards and Technology (NIST) to facilitate researchers, is used as a benchmark to compare our findings. Packet formats of AODV protocol are altered to facilitate the required algorithms. This book may also be useful for young researchers who want to work with the OPNET modeler for conducting simulations. Source code of work done during our research is available for furthering our ideas and may be requested through an email to Idrees@pucit.edu.pk. ····· 1036187397

From Network Planning to Traffic Engineering in Multi-layer Networks

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
High-performance transport networks are expected to support applications with various types of traffic flows (permanent, scheduled, bursty, and noisy). Since high-performance networks usually employ optical network infrastructures and since most applications require sub-wavelength bandwidth, several streams are groomed on the same wavelength. It is therefore important that such networks are designed in an optimal way in terms of cost while efficiently supporting these types of traffic. This book deals with the design and analysis of optical networks allowing for traffic engineering including grooming and rerouting functionalities. Both deterministic and random traffic scenarios are considered. Under deterministic traffic conditions, optimal as well as accurate heuristic approaches are developed for network design and operation. Under random traffic conditions, the dynamic routing and grooming problem is considered subject to the availability of free network resources. Several algorithms are developed to facilitate this provisioning problem. At last, rerouting techniques and their implementation are addressed in order to enhance network efficiency under specific traffic scenarios. ····· 1036187126

A Study Of Computer Networking At IOCL(AOD), Digboi(India)

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
For the today s world or for modern society networking is essential for developing and maintaining contacts and personal connections with various people who might be helpful for us and for our career. Especially it is important for career management in industries, firms etc. Networking is the best way to find job or internship. Throughout our life we shall make networking contacts that develop into relationships including friends, colleagues and professional prospects.This book introduces the basic ideas of network and networking. The book contains the various types of networks, devices used in networking, different types of networking protocols etc. The diagrammatic representations will help the readers for their better understandings. Hope this book will be beneficial for the beginners to networking and specially for the Computer Science/ IT students for their industrial training on computer networking in any organization. ····· 1036187060

Efficient Routing Protocols for Multi-radio Wireless Mesh Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The unique characteristics of multi-radio wireless mesh networks, such as shared nature of wireless channels, use of multiple radio interfaces, stationary mesh routers, and user-to-gateway traffic pattern, make them different from wired-networks and other wireless networks. In particular, the effects of an unbalanced load can cause rapid gateway overloading, center overloading, or channel overloading. Since most traffic in a WMN is destined towards gateways, traffic concentration at gateway nodes creates a load imbalance at certain gateways, which in turn results in gateway overloading. The issue of center overloading refers to the nodes located near the geographical center of the network becoming overloaded in comparison to other nodes in the network. Finally, channel overloading in a multi-radio wireless mesh network refers to certain channels becoming overloaded compared to other channels. Thus, load balancing is necessary to avoid hot spots and to increase network utilization, as bad routes can exist for a long time in a static network and result in congestion and inefficient use of network resources. ····· 1036187055

Attribute based Authorization Systems for Protected Health Information

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book presents the design methodology and implementation of attribute-based authorization systems. It specically focuses on authorization systems which guard protected health information. In this book, research-based solutions to enable very flexible, attribute rich, and dynamic authorization systems are presented. To enable a rich attribute set, a framework for attribute aggregation and trust evaluation is presented. Then a framework for dynamic authorization system is proposed. A prototype of this system is implemented using the XACML language. Several research prototypes of the proposed concepts were implemented in XACML, which are presented in this book. A number of practical implementation issues related to XACML authorization engine, availability and trustworthiness of attributes, their suitability for authorization and design of dynamic algorithms is discussed. The proposed dynamic authorization engine was implemented as an add-on module in the NHIN CONNECT open source framework to provide dynamic authorization. Intended audience of this book are researchers, system architects, developers and graduate students working in the area of health information security. ····· 1036186960

Seamless, Reliable, Video Multicast in Wireless Ad Hoc Networks

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Video multicasting over Wireless Ad hoc Networks (WAHNs) is bandwidth-efficient compared to multiple unicast sessions. However, video multicasting poses great challenges over WAHNs. One main challenge of video multicasting in WAHNs for heterogeneous destinations is the assignment of Video Descriptions (VDs) and the construction of multicast tree. However, the assignment of VDs and the construction of multicast tree can greatly affect user satisfaction (i.e., affect the quality of the received video). In this book, we introduce novel approaches to improve the user satisfaction for a set of heterogeneous multicast destinations. The main idea of our approaches is to employ the independent-description property of Multiple Description Coding (MDC) along with multiple multicast trees. However, many questions are raised: How multiple multicast trees should be constructed How VDs should be assigned Is it better to construct multiple multicast trees first and then assign the VDs Or is it better to assign the VDs first and we then construct multiple multicast trees Should we perform that in a distributed manner or in a centralized manner ····· 1036186837

Quality of Service Management and Mobility Control in Ad Hoc Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book focuses on performance analysis of two routing protocols belonging to the basic categories (reactive, proactive) in mobile ad hoc networks. The book analyses the network performance over real-time variable bit rate traffic based on OLSR and AODV protocols belonging to basic categories reactive and proactive. Moreover, the book is about the impact of various mobility models on routing protocols described previously. Thereafter, it contributes in making choices of models and parameters to support real-time communications. Finally, we suggest a novel approach through Fuzzy logic to analyse and caculate the optimal delay and optimal throughput. ····· 1036186742

Optimizing weights of Open Shortest Path First (OSPF)

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The problem of computing weights on the links and routing data in shortest paths known as OSPF weights setting problem (OSPFWSP) is NP complete. OSPFWSP is defined as given a set of traffic demands between origin-destination pairs, the OSPF weight setting problem consists in determining weights to be assigned to the links so as to make efficient use of network resources. In this book, a problem of OSPF traffic routing in hybrid network is stated. Three different methods are proposed for solution and implemented in real environment. Also three proposed algorithms are introduced for solving OSPFWS problem. The proposed algorithms used different techniques for optimizing weights. Two methods are proposed for updating weights. The first method is updating weights according to unallocated bandwidth, where increasing weights values of links with large empty bandwidth and decreasing weights of links with small empty bandwidth. This method is denoted by Empty Bandwidth (EM). The second depends on mixing EM method with another technique. Such technique depends on either increasing weights of the more utilized links, or decreasing link weights of the less utilized links. ····· 1036186638

Real time conference gateway for heterogeneous clients

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Various standards organizations have considered signaling for voice and video over Internet Protocol(IP) from different approaches. The Inter-Asterisk eXchange (IAX) protocol is used as the promising VoIP protocol by the service provider because of its simplicity and NAT friendliness. Meanwhile, the Real time SWitching (RSW) has the ability to combine voice and video services. Incidentally, these two heterogeneous clients pose considerable problems for users who have to choose between two solutions offering different advantages and disadvantages. While RSW is being used in many areas, IAX is being deployed in many VoIP services. Hence, RSW interoperability and coexistence with IAX is considered very important to support new deployments that could RSW as an alternative packet telephony signaling protocol. ····· 1036186632

Mobile Video Communications

····· lezzter Preis 61.90€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The problem how to convey maximum distinguishable video information while consuming minimum resources has long been investigated since Shannon`s source channel separation theorem. The theorem is derived under the condition that all transmission errors can be corrected by the channel coding to an arbitrarily low probability. However, such a condition usually does not hold in a practical mobile video communication system given the limited resources, such as time, bandwidth, power and space. Therefore, the problem in a practical system can be formulated by `Given the source, channel, resources and system structure, how to optimally control the system parameters to minimize the end-to-end distortion.` This book first derives analytical models and designs estimation algorithms to accurately predict the distortion given random source and random channel. Solutions with low complexity are then provided to minimize the end-to-end distortion in different applications from codec level to cross-layer level given the resource constraints in the practical system. The target audience of this book includes PhD and graduate students, researchers in the field, codec and system design engineers. ····· 1036125952

Performance Analysis of BICM-ID Based Cooperative Network

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The performance of BICM-ID based cooperative networks over AWGN channel, Rayleigh and Nakagami-m fading channels are analyzed to ensure the advantages of both code and cooperation diversity. TDMA-based cooperative protocol is used for transmission and relay is operating in amplify-and-forward (AF) mode with fixed gain. The theoretical formulation is made for the system in terms of bit error rate (BER) bounds over different fading channels. The system is analyzed for different decoding schemes for single relay cooperative network with the help of both numerical and simulation results. For the numerical results of union bound on BER, moment generating function (MGF) based approach is used. Maximal ratio combining (MRC) is used at the destination to ensure the advantages of spatial diversity. ····· 1036125933

Java-Based Mobile Agent Systems

····· lezzter Preis 53.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The mobile agent paradigm is the most promising communication infrastructure for computations on large ubiquitous computer networks when compared to the traditional client-server, remote evaluation or code-on-demand paradigms. The ability for two processes on separate hosts to communicate has been facilitated by the various developments recorded in programming languages, operating systems and computer hardware. This development has changed the concept of distributed systems from how it was known to a vehicle for a myriad of applications. This book proposes an alternative data migration pattern for the data collected by mobile agents during migration. The migration of data and code in Java-based mobile agent systems assume that the data collected by the mobile agent will follow it around as it migrates. To this effect Stra er and Schewhn (1997) developed a model, that predicted the network load and transmission time when the migration occurred on the same host or on different hosts and when the destination host requested or did not request for additional code during execution. ····· 1036125924

Design and Implementation of Dynamic Source Routing Protocol

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
A mobile ad hoc network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using any pre-existing network infrastructure. Ad hoc networking can be applied anywhere where, there is little or no communication infrastructure or the existing infrastructure is expensive or inconvenient to use. One of the motivation behind this activity is the need felt by people to communicate with computers or device in natural mode of communication in respect of diverse application. The book is an attempt to present the advances in the networking technology both theory and practice. This book provides a comprehensive reference material for students, instructors, researchers, engineers, and other professionals in building their understanding of ad hoc and ubiquitous computing. Each chapter on a particular topic is written in a tutorial manner and the chapters are organized so that the topics covered are easy to understand. ····· 1036125870

End-System Multicast Protocols (ESM)

····· lezzter Preis 61.20€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In this dissertation, we introduce a proposal for building an alternative group communication service that shifts the multicast support from core routers to end-systems. Our proposal, called Host Based Multicast (HBM), operates at application-level and provides an efficient multi-point data distribution service for one-to-many or many-to-many communications. With this approach end-hosts, dedicated servers and/or border routers automatically self-organize into an overlay distribution topology where data is disseminated. This overlay topology can be composed of both unicast connections and native multicast islands (e.g. within each site). Therefore it offers a group communication service to all hosts, even those located in a site that does not have access for any reason, to native multicast routing. HBM is a centralized solution, where everything, including group membership management and overlay topology creation, is under the control of a single Rendez-vous Point (RP). This book focuses on four key aspects: scalability, robustness, efficiency, and security. ····· 1036125517

Hierarchical LIMOS Model For Heterogeneous Wireless Sensor Network

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Wireless Sensors are one of the cutting edge technologies used for real time applications.In this field, accuracy and response time play significant role.Wireless sensor network is vulnerable to a wide range of attacks due to its deployment in the hostile environment.So need of the day is to use effective mechanism to protect sensor networks against different types of threats. A particularly devastating attack for limited battery sensor nodes is sleep deprivation attack where nodes are forced to wake-up and waste their battery power.Consequently unavoidable circumstances may appear in the application field of sensor network.For this reason, a system model is proposed here to extend the lifetime of wireless sensor network, even in the face of sleep deprivation torture. Hierarchical Lightweight Insomnia Monitoring System Model uses load distribution mechanism to secure sensor network in energy efficient manner. ····· 1036125473

Compressed Video Transmission Over Wireless Channel

····· lezzter Preis 71.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
A variety of applications range from simple web-browsing to real time video transmission in unicast or multicast modes are widely used over different wireless communication services. Error prone and bandwidth limited wireless environment presents a specific set of challenges to terrestrial radio mobile communication system such as UMTS to provide enhanced end-user service experience. In this presented research, some of the problems related to transmission error for a video application over a UMTS wireless environment are investigated. Compression algorithm required to utilize bandwidth effectively converts independent raw video frames into a highly hierarchical structure with introduction of coding dependences between frames. A transmission error can result into significant error propagation over successive frames degrading the quality of the received video sequence. The problem of error propagation in compressed video sequence transmitted over UMTS mobile radio network is identified, quantified and addressed in this book ····· 1036125458

Signaling Design in Ultra-Wideband Wireless Communication Systems

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book summarizes the study on signaling design in ultra-wideband (UWB) system wireless communication systems. UWB signaling design can be effectively manipulated for the purposes of performance improvement and interference mitigation. Timing jitter, as a critical issue in UWB signaling design, is also investigated to assess its impact to system performance. Chapter 1 describes the research background, and the motivation that becomes the catalyst to the completion of this study. Chapter 2 provides an overall introduction to UWB systems, with specific emphasis on direct sequence (DS) and DS multiband (MB) approaches. Chapter 3 deals with signaling design in varying low chip duty factor (DF), a unique parameter in UWB system. Chapter 4 proposes two interference mitigation techniques developed by manipulating signaling design in DS and DS-MB UWB system. Chapter 5 highlights and mitigates the impact of timing jitter in UWB signaling design. ····· 1036125457

An Energy-Efficient Routing Protocol for Homogeneous WSN

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Wireless sensor network is composed of large number of sensor nodes (SNs) and one or more sink nodes also called as base stations (BS) to which data is to be transmitted. These sensor nodes are associated with limited battery power and wireless communication which are deployed to collect useful information from the field. Gathering this sensed information in cost effective manner at base station is task of research.Earliest proposed techniques were directly transmitting data to base station which was further improved by collecting and aggregating the data in sensor network which increased network lifetime by a factor of 8, that is further improved by different proposed protocols.In this book a routing technique to collect and aggregate the data of sensor network and then to transmit it to base station is proposed which is based on MST generation among sensor nodes and partitioning the network into 3 areas (named tiers) based on the distance from base station and is implemented in c++, this proposed protocol is named as MSMTP (Minimum Spanning Multi Tier Protocol).The results obtained in this approach are about 1.4x improved as compared to PEGASIS protocol. ····· 1036125419

IVRS, Network chess league and smart dust

····· lezzter Preis 53.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Interactive Voice Response System, Network Chess League and Smart Dust are three topical engineering projects especially useful for Computer Science students.IVR - short for Interactive Voice Response - is a technology that automates interaction with telephone callers. In this program we demonstrate the banking application of the IVR system, which will helps us to get the details on our account balance after entering the account number as a touchtone keypad entry by us. We also incorporated a complaint recording segment which enables us to record our complaint through our telephone. We have implemented this program using java and one of its powerful extended packages named JTAPI (Java Telephonic Application Programming Interface).Functions embedded in the JTAPI package will provides us with the necessary interfaces to interact with the telephone system. MS (Microsoft) SQL server is used as the back end database where all the details of the account are stored. Network Chess League [NCL] is a Chess Game which can be played by two players over a LAN network with Two Player Mode and a Team/Tournament Mode. Players will be able to move their pieces using drag n drop facility . ····· 1036125404

Cross-Layer Approach For Seamless Vertical Handover In Networks

····· lezzter Preis 39.90€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Future Wireless systems will be characterized by their heterogeneity. Multiple access technologies provide access to internet content.Vertical handoff is an important mechanism for achieving continuous seamless transmissions in these networks. When connections need to migrate between heterogeneous networks seamless vertical handoff is necessary. Hence seamless vertical handoff is the first step. With regard to VHO performance, there is a critical need to develop algorithms for connection management and optimal resource allocation for seamless mobility. The integration of WLAN and Wimax has attracted the most attention. In some situation where many mobile devices try to handoff to the same AP, there will be more power consumption at the mobile devices due to increased congestion delay at the AP. Here we take account of e QoS parameters, bandwidth, jitter packet error rate and end-to-end delay, which are selected from multi-layer contributions. First vertical handoff was based on received signal strength (RSS) of the mobile node. Next vertical handoff is improvised by considering bandwidth as well as RSS.Results were simulated using NS-2 and comparison results are evaluated. ····· 1036125270

Optimize Bandwidth for Signaling Protocols by Compression Technique

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Bandwidth availability in wireless communication systems remains a limiting factor. Protocol Specific Text Compression, concerned towards Optimization of Bandwidth usage, is a novel approach towards obtaining maximum compression. PSTC is an efficient, robust and scalable compression scheme. Protocols such as SIP, XML, HTTP etc. are ASCII text based signalling protocol. The text based nature results in long messages and will result in significant transmission delays because of the large message size and relatively low data rates across the radio interface. This makes signalling inefficient over bandwidth limited wireless channels. Protocol Specific Text Compression (PSTC) is a compression technique for the optimization of long ASCII text based messages and has therefore the potential to improve the throughput. ····· 1036125151

Intrusion Resilient and Real-Time Forensics

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book talks about the difficulties and challenges of the protecting enterprise network against intruders. It covers a novel space-time evolving authentication scheme and how it could defend enterprise sensitive data against intruders. The key evolves from time to time, from location to location. It is almost impossible for attackers to forge the authentication keys over the time. As long as it fails the authentication, the intruders will be tracked in real-time, and recovery process will follow. ····· 1036125088

TCP Variants over Mobile Adhoc Network

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Mobile ad hoc networks (MANETs)are collections of mobile nodes, dynamically forming a temporary network without centralized administration. These nodes can be arbitrarily located and are free to move randomly at any given time, thus allowing network topology and interconnections between nodes to change rapidly and unpredictably. Transmission control protocol provides reliability, end-to-end congestion control mechanism, byte stream transport mechanism, flow control, and congestion control. There has been significant research activity over the past year into performance of such networks with the view to develop more efficient and robust TCP variants. so over aim is to find best TCP variants in Mobile Adhoc Networks. ····· 1036124993

NAT Traversal and Detection

····· lezzter Preis 71.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Since IPv4 Private Networks are behind NAT (Network Address Translation) devices. So, to Bypass the Binding Update and Binding Acknowledgment by NAT, we need to encapsulate it in UDP (User datagram Protocol) Packets. Hence, the Dual Stack Mobile IPv6 should support NAT Traversal and Detection . This Book provides an overview of network address translation (NAT) and its detection and traversal on dual stack implementation on Mobile IPv6 (DSMIPv6). In DSMIPv6 the MIP6D daemon should bypass NAT, when Mobile Node is behind NAT device in IPv4 Foreign Link. So for proper securing and fully functionality of NAT traversal, it should be IP Security Protected. Book presents design and implementation of NAT traversal capability and keeps alive functionality with IP Security in IKEv2 (Internet Key Exchange version 2) implementation for proper Data Communication. It also implements how IP Security integrate with NAT. With the support of this mechanism the mobile node is able to move freely from IPv4 to IPv6 and vice-versa. The main objective of not breaking connectivity at the time of switching from one network to other is accomplished be this book. ····· 1036124944

· 1 · ::::: · 10 ·· 11 ·· 12 ·· 13 ·· 14 ·· 15 ·· 16 · ::::: · 17 ·