AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 10 ·· 11 ·· 12 ·· 13 ·· 14 ·· 15 ·· 16 · ::::: · 17 ·

Performance Analysis of the CAP-SV Routing Protocol

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
With the advancement in electronics and communications, wireless networks in all sizes and structures have become prolific. Wireless ad hoc networks, in which there is no central coordination, are one of the emerging types as opposed to the classical wireless networks with base station/access point management. Sensor networks, vehicular networks, or temporary wireless networks that are setup among participants of a short-lived convention such as a business meeting are examples to wireless ad hoc networks. In some of these cases, the stations might have power constraints, such as sensors living on batteries never to be replaced. Therefore, designing protocols for these networks should take into account these requirements. In this study, we present an analytical study of the performance of a power-aware routing protocol in terms of power consumption. The CAP-SV routing protocol was proposed in a 2004 paper along with simulation results. We provide analytical verification to the orginal simulations. ····· 1036120941

Bluetooth Networking and its Security Architecture

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Bluetooth wireless technology has become an essential part of our modern society. Mobile phones, game controllers, Personal Digital Assistant (PDAs), computers and various electronic gadgets have adapted Bluetooth and made it a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, it has shifted from short range and can now even have long range communication greater than WLANs with the help of extended antennas and so the vulnerabilities in its security protocols have also increased which can be potentially dangerous to the privacy of a user s personal information. The security issues of Bluetooth has been an active area of research for the past few years. This book presents some vulnerabilities of this technology and proposes some countermeasures. It also provides some tips that end-users can implement immediately to become more cautious about their private information. A fairly new concept is also introduced in this book which uses a secure Bluetooth networking technology in a public environment to enable social networking between multiple users who do not have access to the internet. ····· 1036120867

Intrusion Detection System Architecture in Wireless Sensor Network

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Wireless sensor network becomes popular both in civil and military jobs. Security is one of the significant challenges for wireless sensor networks because of their deployment in open and unprotected environment. As cryptographic mechanisms are not enough to protect wireless sensor networks from external attacks, intrusion detection system (IDS) needs to be introduced. In this book a policy based IDS is proposed that fits the current demands and restrictions of wireless ad hoc sensor network. ····· 1036120856

Fault tolerance of mobile agents

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Mobile agent technology becomes one of the dominant technologies in the information systems and network applications nowadays. For this reason, reliability mechanisms for mobile agents have to be established. In the context of mobile agents, fault-tolerance prevents a partial or complete loss of the agent. Several approaches are designed and developed for fault tolerant mobile agent execution. They have different strengths and weaknesses, have different constraints and assumptions and address different environments. Because of this variety, it is often difficult to choose the approach that best suited to our application. The research proposes three main approaches to handle the fault tolerant of the mobile agent execution. The model is named as: Fault Tolerant Mobile Agent execution System FTMAS . The proposed approaches are: the Centralized approach, the Windowing approach and the Centralized Windowing approach. A classification of the various failure variations that agent may suffer from during and after its execution is suggested in the research too. ····· 1036120746

Context-aware Communication in Large Scale Vehicular Ad-hoc Networks

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Rapid advancements in embedded technology enable vehicles to become equipped with embedded on-board computation and wireless communication capabilities. Intelligent transportation systems (ITS) is an emerging research field that demands efficient delivery of information between vehicles for the creation of useful and usable telematic applications operating in nomadic large-scale environments. Some interesting inter-vehicular applications made possible by this technology include accident avoidance, incident notification, congestion monitoring and parking space allocation. For these types of applications it is crucial that the peers receive the extit{right information at the right time and the right place} to make informed decisions. However, due to the ephemeral, highly dynamic and mobile nature of the vehicular networks we face four major challenges: (1) how to identify what information is relevant to take actions or make decisions, (2) how to disseminate the relevant information to the interested peers efficiently, (3) how to coordinate with other peers and (4) last but not the least, how to compare the effectiveness of different algorithms and protocols. ····· 1036120737

Bandwidth-sharing Mechanisms in Dynamic Circuit Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The increasing interest in dynamic circuit networks to support the high-speed and predictable-service requirements of applications leads to the creation of various experimental test beds. One area of networking research in these testbed projects is bandwidth sharing mechanisms. One reference point for dynamic bandwidth-sharing mechanisms in connection-oriented networks is the telephone network. The bandwidth-sharing mechanism used in the telephone network is referred to as the immediate-request mode because there is no provision for making advance reservations for circuits. While this mechanism can be used in new high-speed optical connection-oriented networks, some applications require high per-call bandwidth, and this bandwidth level is a large fraction of even the highest-rate links in use today, the combination of which makes the immediate-request mode unsuitable. Therefore, alternative bandwidth-sharing modes are needed for these networks and applications. This book discusses two new bandwidth-sharing mechanisms based on book-ahead reservation schemes, and presents both the analytical and simulation models for the two mechanisms. ····· 1036120707

Implementation and Evaluation of a Zigbee Network

für 32.31€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
There is a growing need for compact devices that can interoperate with each other wirelessly and offer a wide range of applications. Wireless data transfer is normally being preferred to transmission of data via cables. In addition, consumers like using devices that save power because it leads to low cost. With the intention of meeting the consumer s needs, ZigBee Alliance developed a ZigBee wireless protocol which offers low power, low cost, reduced resource requirement and a standard set of specification. ZigBee permits inter-working capability between its devices from different products, since it is standard compliant. ZigBee network performance was analyzed in this project, by carrying out experiments in an indoor environment. A comparison was done between ZigBee and a proprietary standard called MiWi wireless protocol, to reinforce ZigBee implementation. RSSI and Average Delay performance indicators were used for the analysis done. Results showed that data loss was reduced in ZigBee than MiWi. In addition, the results obtained showed that ZigBee was designed for longer distance communication as compared to MiWi. ····· 1036120577

Efficient dissemination of Data in content based Multicast N/W

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a way for an Internet computer to report its multicast group membership to adjacent routers. Multicasting allows one computer on the Internet to send content to multiple other computers that have identified themselves as interested in receiving the originating computer`s content. Multicasting can be used for such applications as updating the address books of mobile computer users in the field, sending out company newsletters to a distribution list, and `broadcasting` high-bandwidth programs of streaming media to an audience that has `tuned in` by setting up a multicast group membership. The architecture allows secure, efficient and reliable delivery of content to a large group of receivers. ····· 1036120528

Nonlinear Stimulated Raman Scattering in Optical CDMA Systems

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The concept of code-division multiple access (CDMA) was introduced into optical systems in the middle of 1980 s as optical CDMA (OCDMA) so that encoding and decoding operations are all performed in optical domain using optical devices and large number of users with asynchronous access capability. In addition to the good performance at high number of users and asynchronous access to the network, OCDMA provides the users with high security by coding the data before transmission. However, there are various nonlinear effects that limit the performance of OCDMA systems. In particular, nonlinear stimulated Raman scattering (SRS) can severely limit the performance of OCDMA systems through the transfer of energy between the signals at different wavelengths. This work is attempting to understand the SRS effects on the performance of OCDMA systems, and thus, to determine the fundamental transmission limits in OCDMA systems in the presence of SRS nonlinear effects. It is demonstrated through numerical simulations that the performance of OCDMA systems, at high input powers, large number of users and/or long transmission distances, is significantly degraded due to SRS effects. ····· 1036120266

Authentication Scheme for Dynamic Group Using Threshold Cryptography

für 35.91€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Secret sharing is a technique for protecting sensitive data like cryptographic keys. This mechanism is used to distribute a secret value to a number of parties or users called shares. The shares are given to the parities or users involved in the group. These values have to be combined together to access the original values. Secret sharing is used in modern cryptography algorithms to reduce the risk in information leakage. Sharing a secret reduce the risk of compromising the value across several parties. Threshold or group oriented cryptography allows a group of users perform cryptographic operations such as encryption, decryption, signature etc. A trivial implementation of group-oriented cryptography can be achieved by concatenating secret sharing schemes and a single user cryptosystem. This book illustrate the basic RSA based Threshold Cryptography with numerical examples. This book is very useful for new research schollers working towards Threshold Cryptography. In this book, basic RSA based Threshold Cryptography is illustrated and stpes are explained with small numbers. ····· 1036120263

Fuzzy Based Algorithms for Connectivity Maintenance in Manet

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Mobile Ad-Hoc Network (MANET) presents a new generation of real-time embedded systems that are being used in a wide variety of applications where traditional networking infrastructure is practically infeasible. In a MANET all the nodes are mobile, so the main problem is to keep all nodes connected during movement of the nodes. In this work we have tried to solve the problem of connectivity using fuzzy based approaches. Information collected through Global Positioning System (GPS) is not always accurate in practice. So, the fuzzy based approach is the most appropriate for decision making. This book presents one centralized fuzzy based scheme considering fault and four fuzzy based distributed algorithms considering Freeway Mobility Model, Pursue Mobility Model, Nomadic Community Mobility Model, and Random Mobility Model. In view of the ever-increasing interest of development and design of real world implementation of mobile ad-hoc network, it is expected that the results of research works presented in this book may be helpful to the researchers and professionals who would like to work in field of ad-hoc networks. ····· 1036120088

Neighbor Discovery Proxy-Gateway

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
6LoWPAN is an adaptation layer that permits the transport of IPv6 packets over low-power IEEE 802.15.4 networks. However, an important protocol tightly coupled to IPv6, Neighbor Discovery, has proven to be unsuitable for IEEE 802.15.4 network links. For this reason, the IETF has defined a number of optimizations to adapt the traditional Neighbor Discovery protocol to non-transitive wireless links. While these optimizations result in a more efficient use of the resources of hosts within 6LoWPAN networks, they introduce a number of impediments for communication between traditional IPv6 nodes and 6LoWPAN nodes. This work describes how to overcome these obstacles by providing the necessary proxy and forwarding mechanisms to integrate 6LoWPAN nodes into existing IPv6 networks. Since the integration method proposed here requires no changes in the network infrastructure nor human intervention, the entire process occurs in a transparent, seamless, and cost-effective manner. In particular, this thesis details the requirements, specification, implementation, and evaluation of an embedded device responsible for such integration: a 6LoWPAN Neighbor Discovery Proxy-Gateway (6LP-GW). ····· 1036120056

Resource Allocation and Reduced Complexity in MIMO Wireless System

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book presents reduced complexity and proportional data rate fairness resource allocation schemes for next generation broadband mobile wireless communication systems. At first we present proportional data rate fairness resource allocation scheme for Multi-Input Multi-Output Orthogonal Frequency Division Multiple Access (MIMO- OFDMA) broadband mobile wireless communication system. In this scheme, users are separated in frequency domain and they cannot transmit their data in same frequency with other users at the same time. Therefore, second resource allocation considers to use the radio frequency spectrum more efficiently by using same frequency to transmit for different user s data at the same time in the system. Therefore, we can use scarce spectral resources more efficiently in the MIMO-OFDM wireless communication system environments under the consideration of proportional data rate fairness constraint and QoS requirements among users in the system. Reduced complexity antenna selection method for practical MIMO communication system is also presented based on Singular value decomposition (SVD) and polarization effect in the wireless communication system. ····· 1036119886

A Novel Mechanism for Enhancing Security in Quantum Cryptography

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Now a days security is the main concern. Quantum Cryptography is the technique that uses polarization for data transmission. The work here describes a mechanism that enhances the data security during transmission. In this mechanism BB84 protocol is used as the base. This protocol is used at two levels from sender to receiver and from receiver to sender. The key obtained after applying the mechanism is fairly secure. ····· 1036119877

Adaptive Traffic Light Control In WSN-Based ITS

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The conventional surveillance methods used in ITS to detect real-time traffic data, e.g. video image processing and inductive loops detection, have several shortcomings, such as limited coverage and high costs of implementation and maintenance. Wireless Sensor Networks (WSNs) offer the potential of providng real-time traffic data without these drawbacks. Hence, in the past decade, WSNs have been applied to ITS to improve the performance of ITS. Controlling traffic lights plays a key role in ITS. We investigate how to design methods and algorithms for adaptive traffic light control in a WSN-based ITS. We propose models and schemes for adaptive traffic light control for both isolated intersections and multiple intersections. The proposed approaches take advantage of real-time traffic information collected by WSNs to achieve high system throughput, low waiting time and few stops for the vehicles. We have implemented the proposed schemes on our testbed for Intelligent Services with WSNs, iSensNet to evaluate and demonstrate the performance. Our experimental results show that our approaches can deal with different traffic conditions in an effective manner. ····· 1036119816

Accessing Internet from the MANET

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Integration of mobile ad hoc network and the Internet allows ubiquitous Internet services for mobile users in a MANET. We proposed a new gateway discovery and selection scheme to rescue the network from the problems of current schemes. Our scheme uses a triggered broadcast of gateway advertisement messages at the gateways when hit by gateway discovery messages. We also bounded the dissemination of the gateway advertisement messages up to the requesting mobile node from the gateway. We combined hop count, traffic load (interface queue length), and the total number of neighbors along a route to the gateway in order to formulate a new metric for gateway selection. Our metric chooses the gateway which is not only closest but also has the route from the mobile node with less load and less dense. Simulation results show that our scheme outperforms other schemes. ····· 1036119792

Capacity Evaluation and Mobility Managment for Wireless Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The mobile communication systems evolved considerably in the last few years. This fact encouraged the deployment of several systems or cellular networks in multi technological environment. The Quality of Service (QoS) offered to the mobile users improves from one system to another one. The systems of third generation (3G), like UMTS, offer a better quality of service compared to that offered by those of second generation (2G), like the GSM. For example, the systems of 3.5G (HSDPA) improve the throughput of the network of 3G in the downlink direction according to the requirements of the new services. Moreover, the networks of fourth generation (4G), like WiMax (IEEE802.16e), as for them, make it possible to widen the cover of the base station while offering a very important throughput in which supports the next generation applications or services already offered by the Internet in the downlink and uplink directions. This new evolution still improves accessibility with the services of the Internet. The migration of the services of the Internet towards the mobile networks, constitutes a major stake of research in telecommunications. ····· 1036119779

Embeddings and Interconnection Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Embeddings of graphs have important applications in Computer Science and are of particular interest in the area of interconnection networks. Dr. Sr. Jasintha s work is a ground-breaking study in embedding techniques. The secret lies in creating the ability to estimate the congestion-sum of embedding different architectures. Sr. Jasintha works with a paradigm of graphs that includes cycles, wheels, generalized wheels, a class of caterpillars, hypercubes, and Petersen graphs as guest graphs and trees as host graphs and she demonstrates a novel technique of computing the dilation-sum of graph embeddings. Highly commended as a doctoral thesis, the prominent feature of Dr. Sr. Jasintha s study is that all the embeddings considered are elegant and they produce optimal congestion-sum in linear time. This opens up a world of possibilities for computer applications in network architecture. This study has inspired several other theses in the field of networking both internationally and at home. ····· 1036119773

Optimisation of Wireless Communication System

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The overall aim of the research presented in the book is to develop new systems that use a novel combination of smart antenna MIMO techniques and an advanced communication system based on advanced system configuration that could be exploited by IEEE 802.20 user specification approach for broadband wireless networking. The new system combines the Multi-input Multi-output communication system with frequency diversity in the form of an OFDM modulator. The benefits of each approach are examined under similar channel conditions and results presented. ····· 1036119762

Performance Evaluation of AODV and DSR for Wireless Sensor Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The power of wireless sensor networks (WSN) lies in the ability to deploy large numbers of tiny nodes that assemble and configure themselves. Usage scenarios for these devices range from real-time tracking, to monitoring of environmental conditions, to Military applications, to monitoring of the health of structures or equipment. There is extensive research in the development of new algorithms for data aggregation ,ad hoc routing, and distributed signal processing in the context of wireless sensor networks. As the algorithms and protocols for wireless sensor network are developed, they must be supported by a low-power, efficient and flexible hardware platform. This book describes systematic performance study of two state-of-the-art dynamic routing protocols for WSN, the Dynamic Source Routing protocol (DSR) and the Ad Hoc On-Demand DistanceVector protocol (AODV). ····· 1036119749

Bringing Mobile Ad Hoc Networks to the Masses

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book has enabled to translate some theoretical concepts of ubiquitous computing to real scenarios, while identifying specific needs in different types of applications. In order to achieve such objective, a set of research prototypes are proposed. The main contribution of the book is EasyMANET, an extensible and configurable platform whose goal is to automate as much as possible all the tasks that affect the configuration and startup of MANETs to make their use simpler and more widely available. EasyMANET makes use, as mandatory components, of an address autoconfiguration system, and a name resolution service known as Visual DNS. Visual DNS offers a graphical view of the MANET participants and gives users the possibility to access the services made available by other users. Through a large-scale validation using the OMNeT++ simulator, we show that EasyMANET is a highly scalable solution. ····· 1036119731

Security of IPv6 and DNSSEC

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The wide adoption of IPv6 and DNSSEC by the general public is only a question of time, because of the depletion of IPv4 addresses and vulnerabilities found in DNS. Currently both IPv6 and DNSSEC are deployed mostly for testing purposes and few organizations and end users use them in actual production environments. These relatively new technologies started a lot of discussions. Most of the discussions are focused on their deployment, rather than the security issues, which the new protocols can introduce. Since the moment when IPv6 and DNSSEC are deployed widely is getting closer, I decided to research their security. Additionaly I also researched tools and techniques for their penetration testing. Enumeration of IPv6 hosts compared to IPv4 hosts can be a more challenging task for a penetration tester, due to the larger search space in IPv6. Still there are feasible methods for IPv6 host enumeration, which are described in this book. ····· 1036119620

Pricing Schemes for Emerging Telecommunication Market

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Due to the technological advances in the mobile telecommunication networks and the Internet, existing business models must to be changed for the new telecommunication market. The old business and pricing models, based on the QoS or QoE, do not work well with the new generation networks. In fact, today different technologies can provide same services with the same level of QoS or QoE. Service pricing models based on American Option and the Cross-Entropy estimation algorithms, can help to define innovative pricing scheme for the new generation network. ····· 1036119513

An Architecture and Mechanism for Congestion Control Data Network

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Today is the era of multimedia applications such as audio or video transmission. Multimedia traffic can be classified according to bandwidth, latency and Quality of Service. For multimedia applications, there is strong need of higher transmission capacity and higher bandwidth, which leads the need of high speed network based architecture at the forefront of several current technology based networks. Due to the unpredictable fluctuations and burstiness of traffic flows within high speed network congestion can occur frequently and TCP will perform poorly in future high speed network. In this paper, we purposed the solution for the problem of frequent congestion occurrence in high speed network and it s model that has learning capability on the basis of round trip time, node s outlink capacity and average queue size and passes a signal to the sender to change its sending rate accordingly. Therefore, congestion occurrence in high speed network can be resolved. ····· 1036119492

· 1 · ::::: · 10 ·· 11 ·· 12 ·· 13 ·· 14 ·· 15 ·· 16 · ::::: · 17 ·