AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 4 ·· 5 ·· 6 ·· 7 ·· 8 ·· 9 ·· 10 · ::::: · 17 ·

Hybrid Multicast

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Nowadays Internet TV (IPTV) is becoming more and more popular number of IPTV subscribers increases exponentially. Internet Service Providers (ISPs) face challenge of video distribution to multiple users. Multicasting is one of the most efficient ways for media distribution over the network. There are two widely used techniques of multicasting. IP Multicasting is a way by which Internet Service Provides can distribute the TV content over the Internet effectively however it requires hardware update at every single LAN. The other way is Overlay Multicast (OM), which is more flexible, and easy to deploy, but performance is significantly worse due to lack of knowledge about physical condition of network. Our study shows that if we combine both of these techniques, we can achieve much better performance. We implement a new software application called Hybrid Multicast (HM) that can be installed at any type of network. HM tries to use IP Multicast wherever available since it has better performance. If there is no such capability, it uses OM. ····· 10361115965

A New Cluster Approach for Wormhole Attack Removal in MANET using NS2

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Mobile adhoc network (MANET) is a collection of wireless nodes that dynamically create a wireless network among them without using any infrastructure. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. The routing protocols in MANET should be more dynamic so that they quickly respond to topological changes. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. The simulator is Network Simulator (NS-2) which is a most widely used network simulator. It has the capabilities to simulate a range of networks including wired and wireless networks. The proposed work is subjected to Adhoc On-demand Distance Vector (AODV) routing protocol and evaluate its performance under various conditions such as performance of AODV protocol without attack, with wormhole attack and the secure protocol in that the wormhole detection algorithm implements. The performance of proposed work will be evaluated on the basis of various parameters such as Packet Delivery Ratio,etc. ····· 10361115804

Scalability Evaluation of the GIPSY Runtime System

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The General Intensional Programming System (GIPSY) project aims at providing a software platform for the long-term investigation of intensional programming, a declarative programming paradigm suitable for scientific programming. GIPSY consists of a flexible compiler and a scalable runtime system, where the compiler translates any flavor of intensional program into source-language independent runtime resources, and the runtime system executes the program in a demand-driven and distributed manner, i.e. computation requirements are wrapped in demands and are distributed among network computers, so that computations can be executed distributively and concurrently to shorten their overall computation time. The multi-tier architecture adopted for the GIPSY runtime system aims at research goals such as scalability. This work covers the development of a scalable GIPSY runtime system using the multi-tier architecture, and presents the assessment of the scalability of the developed GIPSY runtime system. The book could be useful to researchers concerning system scalability, especially the scalability of distributed computing systems/applications. ····· 10361115696

Secure and Anonymous Routing for Mobile Adhoc Networks

für 35.91€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Mobile adhoc networks require stronger privacy protection due to the open nature of their media. Schemes such as AODV, ANODR, ALARM uses either one time or long term public key cryptosystems or combination of both achieving only partial anonymity and unobservability. Also, these schemes depend on public key cryptography and hence incurring high computation overhead. Our proposed technique overcomes these disadvantages by employing group signature and ID based encryption together instead of Public Key Cryptosystem. This scheme is thought to offer complete unobservability of both types. Our proposed technique provides protection against denial of service and wormhole attacks. Additionally, we try to improve packet delivery ratio and latency. ····· 10361115552

Mobile and High Definition Video Streams

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The importance of video streaming management has been emphasized with the advent of High Definition (HD) video streaming, as it requires by its nature more network resources. In this book, we discuss several contributions towards advancing mobile video streaming research. We present a general, simple and accurate video source model: Simplified Seasonal ARIMA Model (SAM). SAM is capable of modeling video traces encoded with MPEG-4 Part2/Part10, and Scalable Video Codec (SVC) standards, using different encoding settings. We also detail our thorough analyses of our large collection of HD video traces. These analyses include: a full statistical analysis, in addition to modeling, factor and cluster analyses. Our results show that by using SAM, we can achieve significant improvements in video traffic prediction accuracy. In addition, we discuss several developed video tools, including a SAM-based HD video traffic generator. We also discuss a SAM-based delay-guaranteed dynamic resource allocation (DRA) scheme that can provide significant improvement in bandwidth utilization. These discussed analyses should be especially useful to mobile, wireless and video traffic researchers. ····· 10361115521

On-Demand Medium Access in Heterogeneous Multihop Wireless Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book gives readers an in-depth analysis of the fundamentals behind designing on-demand medium access control (MAC) protocols for multihop wireless networks, esp. with nodes having multiple antenna technologies. This is the first attempt towards designing and analyzing on-demand, also known as contention-based, MAC protocols for multiple beam smart antennas (MBSA). The book begins with a general introduction of the state-of-art problems and solutions that then forms the basis of this book. The book then introduces mathematical models to analyze MBSA and derive basic MAC fundamentals. The readers are then exposed to step-by-step MAC design for MBSA in wireless ad hoc networks. Once the basic design is completed, advanced concepts such as wireless mesh network architecture, Quality of Service (QoS), interoperability with existing IEEE802.11 standards and co-existence with other antenna technologies, viz., omnidirectional and directional, are introduced. Finally, the book ends with introducing link layer reliable and energy-efficient communication mechanisms for wireless sensor networks. ····· 10361115408

HIGH PERFORMANCE APPROACH FOR DIGITAL SIGNATURE

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Grid computing is one of the most powerful techniquesthat can achieve a high acceleration forcryptographic algorithms. This approach makes thedigital signature attractive for adoption bybusinesses to secure their documents. In this thesis, we propose and develop an applicationfor digital signature cryptography using enterprisegrid middleware called Alchemi. High PerformanceApproach for Digital Signature that is Called GridSignature is applied through the separation of themessage, into blocks and encrypting each block to getcipher blocks. Inside Alchemi, it computing the hashcode is used for cipher blocks in independent Alchemiexecutors and any result of computing hash 160 bit isadded to other in exclusive disjunction logic gate the result is called Grid Hash .The evaluation of performance in the grid signaturedepends on three relations: file size block size andnumber of executors. For each file the sign or verifywas carried on 1, 2, 3, 4 and 5 executor nodes. Sothe performance is reached when using file size 82MBand under running 4 executors to 137.96% of speed upover the single processor version. ····· 10361115405

Resource Allocation and Management in Computer Networks

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Resource Allocation and Management (RAM) in Computer Networks has been an active research topic for decades. The complexity of the problem has increased for many reasons, such as the available mix of many different networks and scarce network resources along with an exponential increase in user demands and types of applications. An additional problem in wireless networks is that the frequency spectrum is fixed while the user demands are growing exponentially. Therefore, the problem is how to use the limited resources over the diverse networks efficiently to meet application specific requirements, such as throughput, delay, and delay jitter. In this dissertation, our focus is on three main research areas over three different networks - Part I: Congestion control in Datacenter Networks (DCNs), Part II: Resource allocation and management in IEEE 802.16 WiMAX Networks, and Part III: Resource management in Next Generation Wireless Networks (NGWNs). These three parts reflect the growing complexity of the problem space and the sequence of latest developments in the networking industry. ····· 10361115398

Real-Time Embedded Application and Techniques

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Real-Time Embedded Systems Are Becoming Smarter and More Network-Friendly Every Day. Also Real-Time Embedded Systems Are Widely and Increasingly Used Throughout Society (E.G. Flight Control, Railway Signaling, Automotive and Telecommunication). Real- Time Embedded Systems Are Present In Many Industries, Defense, Transportation, Automation, and Communication and Aerospace. Embedded Systems Reside In Machines That Are Expected To Run Continuously For Years Without Errors. Embedded Systems Are Computer Systems In The Widest Sense. An Embedded System Is A Computer-Controlled System. For Example, NASA`s Mars Path Finder, Lockheed Martin`s Missile Guidance System, And The Ford Automobile All Contain Numerous Real-Time Embedded Systems. This Book Will Be Useful For Computer Science & Information Technology And Electronic Communication Students And Research Scholars. ····· 10361115380

Resource allocation in market-oriented Clouds

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In mid-1990s, the vast deployment of high-speed public data networks has motivated the externalization of private computing resources. Cloud is the most recent evolution of distributed computing. In terms of resource virtualization, managing conjunctly distributed computing, storage, and network facilities remains a complex optimization problem. This problem is closely related to the design of innovative pricing strategies for Cloud Service Providers (CSPs) that act as mediators between resource owners and end-users. In practice, resource owners do not accept, for confidentiality reasons, to inform the CSP about a detailed description of their available equipment. Meanwhile, they accept to regularly provide the CSP with an abstracted view of their sharable resources. In this book, we propose market-based resource allocation algorithms. We consider two business models depending on the fact the CSP owns or not the required resources. An extension to our algorithm is to make use of multicast nodes in order to manage point-to- multipoint data transfer. Another feature is to distribute storage data over multiple storage nodes. ····· 10361115333

Design and Implementation of an Embedded Firewall

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Firewalls became an indispensable part of computer networks. Corporations buy commercial firewalls or use open source firewall software packages to meet their need. Most of these are Linux or FreeBSD based and few of them are OpenBSD based, which has few features or are command line tools. In this project, creating an OpenBSD based firewall software package, which has a graphical user interface, an extensible infrastructure and targets embedded systems, has been aimed.Firstly firewall has been described and then previous studies about firewall software packages have been discussed. Since this study aims OpenBSD operating system and embedded hardware, the basics of OpenBSD and the design decisions for an embedded system have been discussed. Finally the infrastructure of the implementation of this study has been explained. ····· 10361115315

Digital Signature with RSA

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book discuss one of the most interest issues in the security of information field which is the digital signature as we Know the various aspects of keeping our information secret became very important section in the field of information security specially at the end of the last century and the begging of this one as the wide spread of digital data transmission services and the huge using of network and the internet in our personal and economic lives, The focus area in this book is RSA digital signature algorithms (key generation , signature generation and verification process) as if it the main issue of the book but the classification of cryptography has been considered especially the public key cryptography since it provide digital signature and authentication services for which we bound for it a brief notations and discussions , A list of references has been mentioned to easily access for the reader who may pursue particular aspects in greater depth. ····· 10361115238

Data-Driven Fuzzy Modeling for Wireless Ad-hoc Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The present book considers Wireless Ad-hoc Networks (WANETs) in the context of 4G network technologies and Ambient Intelligence. The book proposes how to reduce the power dissipation on mobile devices due to signal transmittion and increased computational requirements due to more sophisticated services. The book lustrates how to manage uncertainties and introduce some flexibility in determine service protocol algorithms by unsupervised learning from dynamic network topology context. Being context aware, services in WANETs enhance their underlying protocols to evolve in the future exploiting data-driven evolving fuzzy modeling. ····· 10361115201

Performance of the ABR policer in an ATM network

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Asynchronous Transfer Mode (ATM) networks provideAvailable Bit Rate (ABR) and Unspecified Bit Rate(UBR) services for data traffic. The networkguarantees low cell-loss ratio (CLR) in the ABRservice for which it needs to impose a strict trafficpolicing measures to punish the non-compliant users. The accuracy of a policer is critical for thenetwork to meet the guaranteed QoS. The errors inthe policing algorithm lead to poor performance, witha potential QoS short fall. The ABR policer comprisestwo algorithms, one for conformance checking withreference to a police rate, the other for generatingthe police rate. The ATM Forum has specified aDynamic Generic Cell Rate Algorithm (DGCRA) for cellconformance checking with reference to a police ratewhich is generated by Algorithm A or 2_StoreAlgorithm B. Algorithm A is accurate but morecomplex to implement. The 2_Store algorithm is simplebut less accurate. The N_Store, an extension of the2_Store algorithm has been proposed to the ATM Forum[3] as more accurate. My thesis proposes a method tomeasure the performance of the above ABR policingAlgorithms to measure its accuracy which is vital inmeeting the guaranteed QoS. ····· 10361115104

Enhancing Ethernet`s Reliability and Scalability

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Ethernet is pervasive. This is due in part to its ease of use. Equipment can be added to an Ethernet network with little or no manual configuration. Furthermore, Ethernet is self-healing in the event of equipment failure or removal. Unfortunately, it suffers from significant reliability and scalability problems. In this book, we present different Ethernet reliability problems, characterizing their causes and effects. Then, we introduce two techniques to handle these problems. First technique is a fix to Ethernet`s packet forwarding protocol - the Rapid Spanning Tree Protocol (RSTP). The second technique is a new device, called EtherFuse, we introduce that it can be inserted transparently into an existing Ethernet. In the event of a failure, EtherFuse detects it and mitigates its effects. Finally, we experimentally demonstrate the effectiveness of both techniques. Ethernet also faces scalability challenges due to broadcast traffic. To scale the Ethernet, we introduce another device, called EtherProxy, that uses caching to suppress broadcast traffic. EtherProxy is also backward compatible to existing Ethernet. Similarly, we experimentally demonstrate its effectiveness. ····· 10361115061

Spatio Temporal Anomaly Detector

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Network anomalies occur in all sorts of networks, And as internet is growing more and more the intrusion detection mechanism are becoming more and more important. There are a lot of signature based detection engines to detect it. This book presents a generic mechanism which intelligently monitors the network traffic and classify it for anomalies, if any anomaly is detected it is used to learn more about anomalies and to detect them in future with much more ease. ····· 10361114964

Spectrum Sensing in Cognitive Radio Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Recent research shows that 70% of the available spectrum is not utilized efficiently. The bandwidth gets expensive owing to shortage of frequencies. For efficient utilization of spectrum, we need to sniff the spectrum to determine whether it is used by primary user or not. The term cognitive radio refers to the adoption of radio parameters using the sensed information of the spectrum. There are three major categories of spectrum sensing techniques transmitter detection, receiver detection and interference temperature detection. This book presents a survey of techniques suggested in the literature for spectrum sensing with a performance analysis of transmitter-based detection techniques. A Fuzzy logic based technique for primary user detection has also been proposed. In comparison with transmitter detection techniques purposed technique provides good results under low SNR values. ····· 10361114939

Deterministic Walk on Random Graph Data Fusion and Emergence of Patterns

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In modern times,distributed systems like large scale sensor networks,ad hoc networks and online social networks could capture the imagination of scientific community,industry leaders,government agencies and common people.They offer a great deal of information storage,sharing,communication and post-processing opportunities.As they are distributed in nature and works based on local information and local control algorithms they tend to be very robust at the macro level.Local failures and problems at the micro spatial or temporal scale do not affect the operations of the entire system as a whole and it can live with the partial failure of the system as well.Moreover,if the post-processing or information fusion after aggregation is intelligent enough it tends to offer a far greater coverage in terms of information coverage compared to sum of individual coverage.If we implement such systems in terms of large scale social networks it offers great degree of connectivity among people and allows creation of virtual communities, online market places, trust based interactions and personalized web search engines. ····· 10361114838

Intelligent Traffic Management Schemes in TCP/IP Networks

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This research presents an investigation into designing active queue management (AQM) controllers in the bottleneck gateway router using control theory. The main goals of this design are to increase the speed of response, improve stability and robustness of congestion control system. In this study a new design scheme is presented by augmenting a Smith Predictor (SP) to the standard RED controller. The new controller is named as SPRED. Smith predictor structure is incorporated to compensate the time delay of the system. Using Smith predictor the new controller is tuned to remove the effect of time delay and thus the primary controller is tuned to give good performance for a plant without delay. Moreover, a novel scheme of adaptive Smith Predictor controller using Neural Network for active queue management (NNAQM) is also presented. The main purpose of this investigation is to explore an intelligent online tuning controller, which has a structure fusion of the proposed SPRED and Neural Networks. In addition, an adaptive neuro-fuzzy inference system (ANFIS) based AQM control scheme is also proposed to deal with nonlinear time delay systems. ····· 10361114800

POWER AWARE RELIABLE MULTICASTING ALGORITHM FOR MOBILE AD HOC NETWORKS

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Multicasting in mobile ad hoc networks has found many real life applications such as teleconferencing, video conferencing, and multi-user gaming. Despite that multicasting can utilize the broadcast nature of the network, it has been facing many challenges such as limited node power. Multicast routing protocols and metrics used to build multicast routes have direct impacts on power consumption in mobile networks. In this work new unconventional metrics are considered to achieve more reliable and stable routing paths. Routing decisions in the new power aware protocol introduced in this book will be taken in a manner such that the longest living path would be chosen, and at the same time not being greedy in killing some nodes. ····· 10361114653

Development of Secure Domain Control Frame Work

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Many Information Technology Departments in both large and small organizations use more than one operating system. Most of them use Microsoft windows server for domain control as centralized identity management. License cost and client access one of the major problems of Microsoft server. In addition to this durability and batches require a reboot which made additional problem to the service. This research use open-source software and non-commercial technologies in order to implement reliable solution which offers benefits of high availability. This book employed network of integrated (Light weight Directory Access Protocol LDAP as back end to centralized identity management, Samba as file and printer sharing, and Kerberos as authentication service). By developing secure domain control, the licensing costs and management overhead has been reduced, in addition to that security performance and scalability has been improved ····· 10361114512

Monitor the Routing Using OSPF Protocol with Down State Neighbour

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
It focuses on the assessment of OSPF routing protocol in terms of its behaviour in the network while one of the neighbours in down state compared with performance of the same network and the same conditions with down state neighbour monitoring by SNMP using OPNET IT Guru Academic edition 9.1. we run two simulation experiments. While the first experiment will examine the performance of OSPF routing protocol with node in down state analysing the different performance criteria on medium scale network, the second experiment will indentify and analyse the performance with the exact topology and the same conditions down state neighbour. Furthermore, in the second experiment, SNMP as protocol is implemented to monitor the failure neighbour and to compare the results so as to arrive at whether or not this protocol is effective to use under such circumstances. ····· 10361114482

Routing Protocols for Ultra-Wideband Mobile Ad Hoc Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
MANET field is one of the most vibrant and active research fields in wireless communications networking. MANET can be built around any wireless technology. Wireless communication networks have witnessed recently the introductory of a promising transmission technology called UWB. In MANET, routing protocols are needed to establish and maintain connections between nodes. The main goal of this thesis is to design efficient routing protocols for MANET based on UWB technology in a production line in a factory which is an industrial indoor application. The production line network scenario was defined and simulated in ns-2 simulator as basis for the investigations. In these investigations, AODV, DSR, and OLSR were considered. In addition, closed-form formulas were found for the channel capacity of MANET as a tool for benchmarking and validation. Based on the investigations, two approaches were proposed to design efficient routing protocols for the production line scenario. Based on the first approach, a new routing protocol was designed and it was called Ad-Hoc On-Demand Multipath Source Routing protocol. ····· 10361114411

Theory of WiMAX

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
WiMAX technology is presently one of the most promising global telecommunication systems. Great hopes and important investments have been made for WiMAX, which is a Broadband Wireless Access. Most articles only talk about promises of WiMAX, some of its application and jargon of networking words with disparate descriptions without linking one process with others. This book, however, includes in detail description yet in comprehensive and step by step approach to illustrate the network principle of WiMAX. All the steps and processes are described with necessary image demonstration and with examples when necessary. Additionally, VoIP traffic scheduling in WiMAX is also discussed by comparing with different scheduling algorithms and their simulation results. This book not only describes the process of WiMAX network but also discusses with reasons behind those processes and message passing between BS and SS. As a result, this book will be useful for anyone who wants to know about wireless network protocol with insight knowledge of every process and wants to work with VoIP application in WiMAX network. ····· 10361114358

· 1 · ::::: · 4 ·· 5 ·· 6 ·· 7 ·· 8 ·· 9 ·· 10 · ::::: · 17 ·