AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 3 ·· 4 ·· 5 ·· 6 ·· 7 ·· 8 ·· 9 · ::::: · 17 ·

Interference Reduction in Mobile Ad Hoc and Sensor Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
There are still a lot of open questions in the field of MANETs and sensor networks. If a topology incurs a large interference, either many communication signals sent by nodes will collide, or the network may experience a serious delay at delivering the data for some nodes, and even consume more energy. So, we reach to the conclusion that interference imposes a potential negative impact on the performance of wireless networks. Researchers actively explored topology control (TC) approaches for such networks. The motivation of TC is to maintain the connectivity of the network, reduce the node degree and thereby reduce the interference, and reduce power consumption in the sensor nodes. To improve the network performance, designing TC algorithms with consideration of interference is imminent and necessary. Since, it leads to fewer collisions and packet retransmissions, which indirectly reduces the power consumption and extends the lifetime of the network. In this thesis, we propose a new interference-aware connected dominating set-based topology construction algorithm, namely, IACDS, a simple, distributed, interference-aware and energy-efficient TC mechanism. ····· 10361119031

High-performance Processing in Grid and Networked Environements

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In this book, We propose an innovative high- performance platform to utilize reconfigurable processors in grid environments. Furthermore, we focus on the communication infrastructures and network processing (processing required for packets) platforms to utilize them through the grid environments. The collaboration of reconfigurable processors in a grid environment is presented and several compute-intensive multimedia kernels are simulated. Subsequently, we introduce three approaches to accelerate network processing tasks using Bloom filters in the networked and grid environments. The first and second techniques present a cache architecture for a counting Bloom filter (CCBF) and a memory optimization approach for Bloom filters using an additional hashing function (BFAH). The third technique proposes a power efficient pipelined Bloom filter. We present the results of our proposed approaches in collaboration of reconfigurable processors in grid computing (CRGC) and Bloom filters in network processing applications, e.g., packet classification. ····· 10361118986

Routing Optimization in OSPF

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The Open Shortest Path First (OSPF) protocol is ahierarchical interior gateway protocol (IGP) forrouting in Internet Protocol. Traffic flows routedalong shortest path and splits the load equally atnodes where a number of outgoing links on theshortest paths to the same destination IP address.Network operator defines shortest paths based on alink weights value assigned to each link in thenetwork. The OSPF link weight-setting problem seeks aset of link weights to optimize a cost function andnetwork performance, typically associated with anetwork congestion measure. These researcheshighlight the importance of managing network resourceand avoiding congested point in the current widelydeployed shortest path routing. ····· 10361118892

Security in Wireless Sensor Networks

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
It is envisioned that soon there will be more things connected to the Internet than there are people who are connected. The emergence of this Internet of Things creates many new exciting possibilities, but it can only deliver on its promises if it is reliable and trustworthy. This book addresses the security of the weakest link in this global system the security of a Wireless Sensor Network (WSN). As the WSN applications mature the need for reliable security mechanisms grows significantly and justifies the use of strong cryptographic protocols. This book shows that solutions based on elliptic curve cryptography and pairing-based cryptography can provide practical security mechanisms for wireless sensor networks. The book presents the material in a very accessible manner covering topics ranging from the deep mathematical theory underlying cryptographic applications to the engineering aspects of embedded system software implementation in constrained computing environments. Any engineer or computer scientist commencing research in these areas would benefit from reading this book due to the comprehensive analysis of the topics. ····· 10361118888

Efficient AODV Routing Protocol for Wireless Sensor Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book aims to develop a methodology for WSN routing protocols to consider the energy level of sensor nodes through the establishment and routing processes in order to increase the network lifetime and reduce the energy consumption rate of wireless sensor nodes. Firstly, it develops a novel approach to distribute the responsibility of data routing among most of the wireless sensor nodes in Flat and Hierarchical WSNs. Secondly, another new approach to reduce the transmission and the reception powers is developed to balance the power consumption of nodes. Thirdly, a dynamic mechanism is proposed to distribute the role of the cluster-head among some of the nodes in the same cluster in order to distribute the power consumption and increase the WSN lifetime. Fourthly, a new technique is proposed to consider the energy level of the WSN in dividing the network into clusters and choosing the highest energy nodes to be the cluster-heads. Finally, we develop a method for discovering the optimum route based on the energy level of the intermediate sensor nodes. All the aforementioned approaches contribute in increasing the lifetime of the WSN. ····· 10361118885

Future Network Management

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Smart communication has received a great attention due to inflexibility of network infrastructure and hard expression to manage scenarios such as energy saving and Virtual Network Operator (VNO). Previous works on programmable networks introduced mechanisms to offer and deal open standard for signalization and network interfaces. However, these are not full solution for our problems concerning those scenarios, because they require information closer to user and a distributed mechanism to extract and produce knowledge for network administrator. For this reason, we invite the reader to study how we could build semantic flow (network information closer to user) in order to manage the networks. A collaborative algorithm based on automata theory and a management platform were proposed and evaluated for energy saving and VNO scenarios, that require those features for network infrastructures. This book, therefore, should help the reader to envisage a new management which has smart communication for future networks, and it should be especially useful for professionals that are seeking for new ideas to build flexible environments with semantic and collaborative concepts. ····· 10361118816

LOCATION-CLUSTERING TECHNIQUES FOR WLAN LOCATION ESTIMATION SYSTEMS

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Location clustering is a technique to significantly reduce the computational requirements of WLAN location determination systems. It provides two algorithms, namely, Joint Clustering and Incremental Triangulation, and describe their tradeoffs between computational cost and location estimation accuracy. Both techniques reduce computational cost by more than an order of magnitude, allowing non-centralized implementation on mobile clients and enabling new context-aware applications. The firm claims to be the only WLAN firm to use clustering techniques commonly found in the world of server farms and supercomputers. Clustering, simply involves dividing administrative tasks among a number of computers that can act as a single system. These clusters can deal with everything from load-balancing to parallel processing tasks.The idea of using multiple network nodes to guard against system fail over is not exactly alien to the WiFi market. Part of the appeal of the wireless LAN switch model is that centrally controlled access points can be made to cover access holes by increasing radio signal strength if one unit fails. ····· 10361118755

Lifetime and Coverage Studies on Wireless Sensor Networks

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The nodes in a wireless sensor network (WSN) are generally energy constrained as the battery of a node may not be recharged or replaced. The lifetime of such a network is limited by the energy dissipated by individual nodes during signal processing and communication with other nodes. The issues of modeling a sensor network and assessment of its lifetime have received considerable attention in recent years. Another important performance metric of WSN is network coverage. It depends on several factors including sensing model that has been used to design the network model. The issues of lifetime and coverage have been addressed in the book. It has been observed that non-uniform energy drainage pattern affects network lifetime. Thus, equal energy consumption condition has been imposed. It has been observed that our proposed scheme provides 2.4 and 1.6 times lifetime improvement with respect to other reported node placement schemes under comparable conditions. Equal energy consumption condition has been extended to a wireless image sensor network. ····· 10361118723

Selected Novel Scenarios in Performance Evaluation of Wireless Systems

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Performance evaluation studies constitute a considerable portion of the wireless communications literature. The importance of these studies stems from the fact that theyprovide system designers with feedback on the quality of their designs and hence, anopportunity for enhancements before actual deployment.This book represents a comprehensive study on the performance of mobile radio networks. It is divided into two main parts where in each part adifferent perspective is adopted: a system-level perspective is considered in the firstand a link-level one in the second. In the first part, the TDD mode of operation of WCDMA technology is thoroughly investigated under different scenarios and a complete framework forperformance evaluation is proposed. In the second part, a number of problems related to the performance of communicationsystems over the Weibull fading channel are addressed. In particular, the performance of different diversity schemes is extensively studied under different scenarios involving theexistence/non-existence of cochannel interference. Throughout this work, Monte Carlo simulations are provided to complement theanalytical results presented. ····· 10361118511

Multiplexing Techniques for Ad hoc Network

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This project focuses on the investigation of the multiplexing techniques for Ad hoc Networks. It concentrates on the OFDM. OFDM is explained in some details, during this research, to highlight its general view, challenges, characteristics and routing. In addition, it analyses the advantages and disadvantages and then it is compared to FDM. A MATLAB simulation was developed using wireless network data to prove that OFDM increases the bandwidth of Ad hoc Networks. ····· 10361118413

Data Communication

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
These days one can not think life without computer. Every moment is concerned of this gadget for its beautifulness and dependency from a childhood to end of life. This may be for entertainment to education and at later stage life support gadgets. We can be aspect any thing with computer it is users perception. Though computer hardware is the collection of various physical components of the computer like the computer itself, input/output devices, printers and other peripheral devices yet user feel its interaction. Two computer can be put to talk each other and this is what is Net Working. A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. In net working Communication of data propagation and processing of signals are made transmitting and receiving the signals is labeled Data Communication. ····· 10361118276

Mechanisms for Self-organizing Ad Hoc Grids

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Resources contributed in ad hoc grids are volatile, unreliable and non-dedicated. Furthermore, resource owners contribute resources according to their own use and access policies. This phenomenon necessitates the study of the mechanisms that enable the ad hoc grid to modify its infrastructure in an autonomous way according to varying resource availability. This book, presents the mechanisms that enable the construction and deployment of ad hoc grids that can self-adapt to provide better resource utilization under dynamic conditions. These mechanisms are implemented on a structured overlay network by using the algorithms proposed in this thesis. Study of these mechanisms helps in achieving a scalable, dynamic and self-organizing ad hoc grid infrastructure. The study also identifies the scenarios for determining the trade-offs for different ad hoc grid infrastructures.` ····· 10361118212

A Distributed Approach to Multicast Session Discovery

····· lezzter Preis 59.00€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Media distribution to large groups of subscribers can be done more efficiently using IP multicast rather than via IP unicast. The resultant efficiency and bandwidth saving, can further improve the quality of service perception at the subscriber`s terminal. Less bandwidth requirement will help reduce service providers with operating cost and further reduce congestion in the core network. There is however a dearth in user demand for this technology and low deployment by the ISPs. This book explores the reasons for this lack of user demand and the lack of deployment of the technology, and provides a solution to a problem that has long undermined the usefulness of IP multicast. It proposes an efficient service architecture for multicast sessions discovery by end users. The described system allows bookmarking of useful multicast sessions. The global service framework described in this book maintains the validity of these bookmarks at end user terminals even if the multicast session parameter changes later on. ····· 10361118141

Redes Móviles Seguras en un Ambito Urbano

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
El mundo de las telecomunicaciones crece día a día poniendo en nuestras manos distintas alternativas de comunicación. El avance de la tecnología ha puesto a disposición del usuario final tecnologías tan potentes como una máquina de escritorio en dispositivos de bolsillo. Estos tienen la necesidad de estar `conectados` para desarrollar su potencial. La comunicación entre los móviles se hacen de manera inalámbrica, brindando mayor comodidad al usuario y pudiendo conectarse en cualquier lugar. Los dispositivos móviles serán pronto el método preferido de acceso a la información. A medida que la demanda de conexiones crezca, las Redes Móviles van a ser más necesarias, incluso en lugares donde no exista una infraestructura para hacerlo. En este punto es donde entran en juego las redes ad-hoc. Como cualquier red inalámbrica, las redes ad-hoc están expuestas a ataques de cualquier persona ya que el medio físico de propagación es el aire. A diferencia de las redes inalámbricas tradicionales, las redes móviles presentan nuevos desafío desde el punto de vista de la seguridad. El objetivo del libro es tratar la seguridad de redes móviles en un ámbito urbano ····· 10361117555

Visualización de Redes Complejas

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
El permamente desarrollo de la tecnología en las últimas décadas, ha permitido poner en práctica el conocimiento científico de una forma nunca antes vista. Entidades que antes sólo podían conocerse en un nivel macroscópico, pueden ahora explorarse en profundidad gracias a los avances en la informática y la electrónica. La Internet cuenta hoy en día con una cantidad estimada de 1000 millones de computadoras, y la WWW (World Wide Web) con 100 millones de sitios. Entender el funcionamiento de estos sistemas, su estructura e interconexión requiere de herramientas que permitan simplificar la información a un nivel comprensible por el ser humano, discriminando lo esencial de lo que es accesorio. La Visualización de la Información abarca el estudio de técnicas y algoritmos para plasmar en una imágen una cantidad normalmente abundante de datos, de forma que se pueda obtener rápidamente la información esencial que subyace en ellos a partir de la simple observación del elemento visual. Constituye así una herramienta valiosa para los expertos de distintas áreas, que pueden a través de ella validar modelos o teorías, sintetizar la información, comprender, expresar resultados y comunicarse. ····· 10361117420

CONMUTACIÓN DE ETIQUETAS ÓPTICAS EN REDES ÓPTICAS HÍBRIDAS INTEGRADAS

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
La conmutación óptica busca alcanzar un mejor desempeño en la redes ópticas manejando las operaciones de conmutación en el campo óptico mientras que la conmutación de etiquetas óptica se enfoca en evitar conversiones de medio óptica-electrónica-óptica innecesarias para el análisis de ciertos datos, como por ejemplo: datos de carga útil (payload), con lo que se reduce los retardos producidos debido a la creación de los denominados cuellos de botella . Por su parte la técnica de etiquetamiento FSK/IM (Frequency Shift Keying/Intensity Modulation) es una técnica de fácil implementación que proporciona dos campos independientes para la transmisión de datos, la frecuencia y la intensidad. ····· 10361117086

Migración de una red industrial hacia Ethernet

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
El presente trabajo contiene los pasos necesarios para poder hacer la migración de una red con protocolo industrial hacia una red con plataforma ETHERNET, usando como entorno una empresa de Manufactura con diferentes procesos productivos. Las etapas que comprenden este proceso de cambio son las siguientes: 1. Planteamiento del problema, donde se justifica el proceso de migración de redes industriales hacia ETHERNET. 2. Estudio de la situación actual, en la que se identifican si ya esta establecida una red industrial, los elementos que componen esa red (en caso de existir), los protocolos usados, los medios de transmisión, la topología de la red, y los demás datos relevantes para el proceso de migración. 3. Análisis de información obtenida durante el estudio de la red actual y planteamiento de diversas alternativas de acuerdo a los elementos disponibles. Se hace un estudio comparativo de las diferentes opciones y se escoge la alternativa mas adecuada de acuerdo a su costo, su impacto sobre el proceso y el tiempo necesario para su instalación. 4. Implementación de la solución propuesta: descripción de todos los pasos necesarios para la implantación de la solución propuesta. ····· 10361117062

Museos y tecnología

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Un recorrido virtual no sustituye la visita presencial del público al museo, ni provoca el distanciamiento del visitante a los espacios reales como muchas veces se piensa. Por ello, este libro, con su propuesta de recorrido virtual, pretende poner en evidencia que este recurso tecnológico amplía la difusión del museo amplía sus canales de comunicación y responde a las demandas de la cibersociedad. Con esto se logra derribar muros acercando a diferentes públicos a los espacios y a las colecciones de los museos. ····· 10361116895

Algoritmo de hand-off para redes inalámbricas de sensores

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Las Redes Inalámbricas de Sensores (RIS) o WSN (Wireless Sensor Networks) en combinación con las TICs tienen el potencial de impactar de manera importante en muchos de los aspectos de la vida diaria. Por ejemplo, en telemedicina o e-health posibilitarían el equipar a los pacientes con un sistema inalámbrico que permita medir sus signos vitales en tiempo real. Aquí, las RIS operarían en su área unicelular de cobertura y serían la tecnología de comunicaciones que estaría en contacto directo con la persona, que adquiriría las variables fisiológicas, las procesaría y las enviaría a un repositorio central de datos fuera de su área de operación vía Internet. Debido a que las RIS pertenecen a la categoría de redes de área personal y que su área de operación en ambientes dentro de edificios (indoor) es del orden de decenas de metros, se hace necesario el desarrollar algoritmos que permitan extender su área de operación y habilitar movilidad multi-celda a los nodos. En este trabajo se ha optado por el desarrollo de un algoritmo de transferencia de celda (Hand-Off) del tipo soft-handover con la visión de operar en ambientes indoor, para coadyuvar al ejemplo de aplicación médica descrito. ····· 10361116878

Tracking Mobile Targets through Wireless Sensor Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In recent years, advances in signal processing have led to small, low power, inexpensive Wireless Sensor Network (WSN). Target localisation and tracking problems in WSNs have received considerable attention recently, driven by the necessity to achieve higher localisation accuracy, lower cost, and the smallest form factor. This book includes five studies. The first study leads to the design and implementation of a triangulation-based localisation approach using RSS technique for indoor tracking applications. The second study concentrates on investigating a fingerprinting localisation method for indoor tracking applications. The third study focuses on designing and implementing a decentralised tracking approach for tracking multiple mobile targets with low resource requirements. The fourth study focuses on developing and designing a practical ZigBee-based tracking approach. The fifth study outlines designing and implementing an energy-efficient approach for tracking applications. ····· 10361116204

A Novel Fair Channel Access Algorithm For Cellular Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In this literature, the author evaluates some traditional contentious and non-contentious channel access scheduling algorithms and exposes their inadequacy when minimizing lengthy delays in a multimedia cellular environment. Addressing these inadequacies, a novel approach based on a modified operating systems process scheduling algorithm is proposed. The resulting Delay Weighted Priority Scheduling (DWPS) algorithm is evaluated in comparison to the traditional round-robin and random access scheduling algorithms in a simulated multimedia cellular environment and demonstrates a marked improvement in performance. ····· 10361116043

Video Streaming

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Video streaming is one of the most important tools in many fields e.g. distance learning education, healthcare and telemedicine, electronic banking and shopping and network infrastructure, due to its many advantages. Information Technology can offer a great deal of flexibility in the utilization of distributed resources. The main objectives of this project are to: Review in depth video streaming techniques and Design and implement a low cost live video streaming system in LAN and WAN. In order to investigate the performance of video streaming in LAN & WAN, different bandwidth was used, and more than one client was considered. Three experiments were conducted, using the intranet of the University of Khartoum. This networks is based on frame really technology ····· 10361115992

Hybrid Multicast

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Nowadays Internet TV (IPTV) is becoming more and more popular number of IPTV subscribers increases exponentially. Internet Service Providers (ISPs) face challenge of video distribution to multiple users. Multicasting is one of the most efficient ways for media distribution over the network. There are two widely used techniques of multicasting. IP Multicasting is a way by which Internet Service Provides can distribute the TV content over the Internet effectively however it requires hardware update at every single LAN. The other way is Overlay Multicast (OM), which is more flexible, and easy to deploy, but performance is significantly worse due to lack of knowledge about physical condition of network. Our study shows that if we combine both of these techniques, we can achieve much better performance. We implement a new software application called Hybrid Multicast (HM) that can be installed at any type of network. HM tries to use IP Multicast wherever available since it has better performance. If there is no such capability, it uses OM. ····· 10361115965

A New Cluster Approach for Wormhole Attack Removal in MANET using NS2

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Mobile adhoc network (MANET) is a collection of wireless nodes that dynamically create a wireless network among them without using any infrastructure. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. The routing protocols in MANET should be more dynamic so that they quickly respond to topological changes. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. The simulator is Network Simulator (NS-2) which is a most widely used network simulator. It has the capabilities to simulate a range of networks including wired and wireless networks. The proposed work is subjected to Adhoc On-demand Distance Vector (AODV) routing protocol and evaluate its performance under various conditions such as performance of AODV protocol without attack, with wormhole attack and the secure protocol in that the wormhole detection algorithm implements. The performance of proposed work will be evaluated on the basis of various parameters such as Packet Delivery Ratio,etc. ····· 10361115804

· 1 · ::::: · 3 ·· 4 ·· 5 ·· 6 ·· 7 ·· 8 ·· 9 · ::::: · 17 ·