AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 5 ·· 6 ·· 7 ·· 8 ·· 9 ·· 10 ·· 11 · ::::: · 17 ·

Routing Protocols for Ultra-Wideband Mobile Ad Hoc Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
MANET field is one of the most vibrant and active research fields in wireless communications networking. MANET can be built around any wireless technology. Wireless communication networks have witnessed recently the introductory of a promising transmission technology called UWB. In MANET, routing protocols are needed to establish and maintain connections between nodes. The main goal of this thesis is to design efficient routing protocols for MANET based on UWB technology in a production line in a factory which is an industrial indoor application. The production line network scenario was defined and simulated in ns-2 simulator as basis for the investigations. In these investigations, AODV, DSR, and OLSR were considered. In addition, closed-form formulas were found for the channel capacity of MANET as a tool for benchmarking and validation. Based on the investigations, two approaches were proposed to design efficient routing protocols for the production line scenario. Based on the first approach, a new routing protocol was designed and it was called Ad-Hoc On-Demand Multipath Source Routing protocol. ····· 10361114411

Theory of WiMAX

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
WiMAX technology is presently one of the most promising global telecommunication systems. Great hopes and important investments have been made for WiMAX, which is a Broadband Wireless Access. Most articles only talk about promises of WiMAX, some of its application and jargon of networking words with disparate descriptions without linking one process with others. This book, however, includes in detail description yet in comprehensive and step by step approach to illustrate the network principle of WiMAX. All the steps and processes are described with necessary image demonstration and with examples when necessary. Additionally, VoIP traffic scheduling in WiMAX is also discussed by comparing with different scheduling algorithms and their simulation results. This book not only describes the process of WiMAX network but also discusses with reasons behind those processes and message passing between BS and SS. As a result, this book will be useful for anyone who wants to know about wireless network protocol with insight knowledge of every process and wants to work with VoIP application in WiMAX network. ····· 10361114358

MODELLING OF RELIABLE SERVICE BASED OPERATIONS SUPPORT SYSTEM

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The ever increasing number of subscribers, size, competition, heterogeneity and advancement of technology in the telecommunications industry has put a lot of pressure on the network service providers to not only provide high quality services but also to ensure that services are available whenever they are required. The 3G and 4G network services require robust network system with a predictable operation level and reliability. Network faults may degrade or paralyze the network performance and its operations. Network failures are unavoidable but early detection, identification and prediction of such faults is very crucial to the robustness of the network. Different artificial intelligent techniques are used in design and implementation of the system for the reason that network faults are uncertain and dynamic in their behaviour. Network faults models are derived using Bayesian networks, which forms the engine of mobile intelligent agents (MIA). MIA operates like honeybee within a network environment and is used because of being platform independent, dynamic adaptation, network traffic reduction, mobile and robust. ····· 10361114244

Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA)

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In wireless and distributed nature of Ad hoc networks, security has become a more sophisticated problem than security in other networks, due to open nature and lack of infrastructure of such networks. This book is based on Black Hole attack. This attack node first invades into the multicast forwarding group. It then absorbs all the data packets in the network and drops fully or partially in such a way that the destination node does not get the data packets fully. This will affect the packet delivery ratio (PDR). Our aim is to draw the graph based on the black hole attack position in the network. With respect to the attack positions, black hole node at near receiver area is the least harmful attack. The PDR resulting from this position is always higher than the other two areas. Black hole node at near sender area is the most damaging attack position and incurs the lowest PDR. Finally, the anywhere area offers higher PDR than the near sender but lower than the near receiver. ····· 10361114240

3G IP Multimedia Subsystem

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The IP Multimedia Subsystem (IMS) is the technology that merges the Internet with the cellular world. The existing session establishment scenario of IMS suffers from triangular routing for a certain period of time when an end user is mobile. The other problem areas in optimizing presence service, dimensioning a push-to-talk over cellular service and analyzing service rates of instant messaging relay extensions in IMS are identified. In order to mitigate the drawbacks of these crucial aspects, this book contributes with a robust scheduler to improve performance of the presence service, several derived models to dimension push-to-talk over cellular service, a new mechanism to reduce cost for the session set ups in mobile environment and the evaluation of message blocking and stability in instant messaging service by applying queuing theories. The analysis of performance enhancements and the derived models of this book should help shed some light on the emerging environment of IMS infrastructure. They should also be very useful to professionals who may be considering pursuing research in the field of wireless communications and mobility management using stochastic process. ····· 10361114239

Performance Evaluation of TURBO CODES

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Turbo codes, introduced in 1993 are error correcting codes, and are only recently being employed in some of the communication protocols. In this book, the results of the simulation studies of their performance dependence on medium have been reported. The studies have been made for the communication channels twisted pair, coaxial cable, microwaves & optical fibers and the results obtained from a study on performance evaluation of medium dependence of Turbo Codes have been presented. Communication through Twisted pair, Coaxial cable, Microwaves & Optical fibers have been simulated by modeling the channel and the performance of Turbo Codes have been studied with varying S/N ratio as applicable in practical situations. ····· 10361113902

Traffic Analysis of MPLS and Non MPLS Network

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Multi-Protocol Label Switching (MPLS) is rapidly emerging technology, which plays a key role in next generation networks by delivering QoS and traffic engineering (TE) features. MPLS is helpful in managing traffic when some links or paths are under and/or over utilized. Traffic engineering is the main strength of MPLS. Where an IP-based network is connectionless, MPLS based network defines definite paths for network traffic based on some Quality of Service level. In MPLS a look up in switching table is certainly less complex and less time consuming than a corresponding routing table look up in an IP router. This book presents an analysis of MPLS signaling protocols for traffic engineering and shows the capability of providing traffic engineering in MPLS compared to the conventional routing protocol, and also explains the MPLS LSR operations based on the basic LSR functionality of classification, queue, and scheduling. After comparative analysis of MPLS and non-MPLS network it shows that MPLS provides improved network performance for heavy traffic environments. This is useful to professionals and researcher who are working on MPLS networks. ····· 10361113742

Quality of Service Management of Distributed Realtime Embedded Systems

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
With increasing advantages of cost, performance, and scale over single computers, the proliferation of distributed systems in general and distributed event-based systems in particular have increased dramatically in recent years. To support the requirements of a broad spectrum of application domains, publish/subscribe middleware for event-based distributed systems typically provides many policies that affect end-to-end system quality of service (QoS) properties. While tunable policies provide fine-grained control of system QoS, configuring and managing QoS has become more complex as QoS support for pub/sub middleware platforms has increased. This work focuses on the following four synergistic areas: (1) a model-driven technique for developing QoS configurations and applicable implementation artifacts (2) composite QoS metrics to quantitatively evaluate multiple QoS concerns, (3) a technique for evaluating QoS mechanisms in specific operating environments and providing guidance for QoS configurations and (4) a technique to support autonomic configuration and adaptation of QoS-enabled pub/sub middleware in flexible and dynamic environments. ····· 10361113555

Performance Evalution of Wireless Local Area Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Wireless technology is growing rapidly due to its low cost nature and ease-of-use. We are familiar with radio and phones that use wireless technology. There are many more possible practical applications for wireless and many developments are continuously taking place in this field. Similarly, the use of wireless local area network too is playing significant role in the businesses to aid and distribute the data flow between computer systems and business systems. Unfortunately, there are a number of limitations within the WLAN technology that hinders its optimum performance. The research reported in this book analyses the performance of WLAN under various conditions and scenarios such as using networks having low and light and heavy loads and, with or without RTS/CTS mechanism. The networks were then implemented and their performance characteristics evaluated using simulation models. This research provides many remarkable findings. ····· 10361113490

Design and Analysis of a Metropolitan Area Network

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book concerned with design of a suitable packet switching MAN to interconnect twenty-six locations (nodes) with each other with high survivability and compare it with the circuit- switching network in term of throughput. These nodes have one or several Local Area Networks (LANs) connected to each node. Two network topologies have been proposed and designed. The first one has the minimum requirements design and used as a reference with which the second design will be compared to fined the performance difference. The second topology represents the final proposal. The two routing algorithms namely, (Link State Algorithm and Distance Vector Algorithm) have been studied and applied on the two proposal networks. The performances of these topologies have been analyzed through calculating many parameters under fault free and failure situations. Then these parameters have been compared. The parameters considered are: average link utilization factor, average node utilization factor, network reliability, delay time, network costs and network connectivity. These parameters have been calculated under shortest distance path routing strategy. ····· 10361113226

ANALYSIS OF QUALITY OF SERVICE PROTOCOLS (QOS)

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
One of the major challenges faced by the Internet today is the quality of service (QOS) for the real time (Time Critical) multimedia data. Many protocols have been developed to ensure the end to end seamless delivery of the time critical data. Some of these protocols use labeling methodology in which the data traveling between the nodes on internet is labeled so that it may be prioritized to avoid delay. The other protocols ensure the end to end resource allocation and guarantee the bandwidth for the time critical data. Out of these protocols the point of discussion in this study is IntServe (Integrated Services) and DiffServe (Differentiated Services) that are being tested and analyzed for their performance related to the traditional Best-Effort. ····· 10361113080

Datensynthesemethoden für die Generierung dynamisch-thermischer Simulationsmodelle im Wohngebäudebestand am Beispiel von EnergyPlus

für 49.80€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Als Bestandteil moderner Planungsverfahren stellen dynamisch-thermische Gebäudesimulationen den Stand der Technik für die energetische Optimierung neuer Bauprojekte dar. Für Bestandsgebäude ist es jedoch oftmals mit großem Aufwand verbunden, die für eine Simulation notwendigen geometrischen, bauphysikalischen, anlagentechnischen und nutzungsbezogenen Gebäudedaten zu erheben. Für die Planung von Energieeffizienzmaßnahmen im Gebäudebestand ist der Mehrwert dieser Simulationsverfahren daher für viele Bedarfsträger, wie z. B. Hauseigentümer, nicht ohne Weiteres nutzbar. In der vorliegenden Dissertation wird ein Ansatz entwickelt, um die Erstellung dynamisch-thermischer Simulationsmodelle zu automatisieren. Zunächst werden die Herausforderungen in Hinblick auf die energetische Modellierung von Bestandsgebäuden analysiert und verschiedene Lösungsansätze diskutiert. Insbesondere wird auf die Rolle digitaler Gebäudemodelle als Datengrundlage für die energetische Modellierung eingegangen und ein Verfahren für die digitale Rekonstruktion geometrischer Gebäudeeigenschaften mit Hilfe mobiler Endgeräte vorgestellt. Es wird ein Lösungsansatz präsentiert, für die Generierung dynamisch-thermischer Simulationsmodelle auf Basis reduzierter Benutzereingaben und einer Synthese ausgewählter Datenquellen. Dies umfasst sowohl die Fusionierung verschiedener geometrischer Datengrundlagen als auch die Integration statistischer Daten zur Substitution unbekannter Parameter. Weiterhin wird ein auf Smart Metering Daten basierender Ansatz für ein evolutionäres Optimierungsverfahren zur Kalibrierung unverifizierter Modellparameter präsentiert. Schließlich werden die entwickelten Konzepte anhand einer Demonstrator-Anwendung zur Generierung von EnergyPlus-Simulationsmodellen umgesetzt und getestet. ····· 10361108356

Visual Big Data Lifecycle Management

für 48.80€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The age of big data offers not only promising opportunities but also many challenges. Whereas the analysis of big data allows for gaining valuable knowledge in many application fields and sectors, and for implementing innovative, data-driven business models, among many other benefits, these opportunities are not without a cost. Data volumes are not only becoming larger and larger, which leads to substantial increases in data-storage associated costs, but also increasingly complex to manage due to the variety of involved data types, formats and data sources. Also with regard to information security and privacy aspects, big data often requires to be appropriately handled. At this, the discipline of big data lifecycle management offers promising concepts to cope with the challenges of big data. Managing big data in a lifecycle-oriented manner usually involves handling data subject to its underlying value (importance), requirements of Personally Identifiable Information (PII), legislative and regulatory aspects, among many others. Although big data lifecycle management supports the management of big data-e.g., to control and optimize the consumption of storage resources and thus to reduce the associated costs, big data lifecycle management itself suffers from the increased complexity. In many cases, big data lifecycle management is faced with complex trade-off decision-making scenarios whereas multiple, conflictory objectives have to be weighed against each other. Therefore, to reduce the inherent complexity of big data lifecycle management decision-making, this thesis aims at developing a conceptual framework that provides reasoning support, while harnessing the potential of interactive data visualization, and in the end assists information managers with mastering increasingly complex data landscapes. ····· 10361108294

Exploiting Wireless Link Dynamics

für 35.80€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Efficient and reliable communication is the key to enable multihop wireless networks such as sensornets, meshnets and MANETs. Unlike wired networks, communication links in wireless networks are highly dynamic and pose additional challenges. Network protocols, besides establishing routing paths between two nodes, must overcome link dynamics and the resulting shift in the network topology. Hence, we need to develop efficient link estimation mechanisms, reliable routing algorithms, and stable addressing schemes to overcome these challenges inherent in wireless networks. The prevalent approach today is to use routing techniques similar to those in wired networks, such as tree construction: Link estimators identify neighbors with consistently high quality links based on a certain cost metric. Routing protocols conserve routing to a single path between two communication nodes by choosing the best sequence of nodes at each hop, as identified by the link estimator. In contrast, recent studies on opportunistic routing schemes suggest that traditional routing may not be the best approach in wireless networks because it leaves out a potentially large set of neighbors with intermediate links offering significant routing progress. Finegrained analysis of link qualities reveals that such intermediate links are bursty, i.e., alternate between reliable and unreliable periods of transmission. We propose unconventional yet efficient approaches of link estimation, routing and addressing in multihop wireless networks to exploit wireless link dynamics instead of bypassing them for the sake of stability and reliability. The goal is to maximize routing performance parameters, such as transmission counts and throughput, by exploiting the burstiness of wireless links while, at the same time, preserving the stability and reliability of the existing mechanisms. The contributions of this dissertation are manifold: Firstly, we develop relevant link estimation metrics to estimate link burstiness and identify intermediate links that can enhance the routing progress of a packet at each hop. Secondly, we propose adaptive routing extensions that enables the inclusion of such long-range intermediate links into the routing process. Thirdly, we devise a resilient addressing scheme to assign stable locations to nodes in challenging network conditions. Finally, we develop an evaluation platform that allows us to evaluate our prototypes across different classes of wireless networks, such as sensornets and meshnets, using a single implementation. The dissertation primarily focuses on the network layer of the protocol stack. Although the proposed approaches have a broader relevance in the wireless domain, the design choices for our prototypes are tailored to sensornets - a notoriously difficult class of multihop wireless networks. Our evaluation highlights the key achievements of this work when compared to the state-of-the-art: The proposed metrics identify bursty links in the network with high accuracy, the routing extensions reduce the transmission count in the network by up to 40%, and the addressing scheme achieves 3-7 times more stable addressing even under challenging network conditions. ····· 10361107902

Social Virtuality

für 29.80€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Soziale Netzwerke durchdringen jeden Bereich des Zusammenlebens in modernen Gesellschaften. Permanent sind die Akteure Einflüssen aus ihrem Umfeld ausgesetzt. Empfehlungen auf Plattformen wie Facebook, Xing und Kundenrezensionen zu Produkten und Leistungen lenken unsere Entscheidungen. Im Verlauf ihres Bestehens kann der Aufbau und Wandel dieser Netzwerke analysiert und beobachtet werden. Soziale virtuelle Netzwerke bilden eine Untermenge von sozialen Netzwerken. In den ersten Kapiteln des Buches werden die Eigenschaften und Vorgänge innerhalb der sozialen virtuellen Netzwerke besprochen. Computervermittelte Individualkommunikation ist dabei das mediale Umfeld. Der Autor zeigt auf, dass diese Netzwerke räumlich unbeschränkt sind. Sie benötigen einen geringeren Aufwand zur Pflege und weisen geringere Hürden bei dem Aufbau neuer Beziehungen auf. Bei der akteurorientierten Perspektive lassen sich diverse nichtdeterministische Konzepte heranziehen. Deterministischen Ansätze stehen diesen bei der Betrachtung aus der Netzwerkperspektive gegenüber. Durch die Kombination beider Sichtweisen wird die Entwicklung in Netzwerken erklärt. Mit dem Wellman`schen Paradigma der Netzwerkanalyse und der Beschreibung von strukturellen Konstrukten schließt der theoretische Teil des Buches ab. Im zweiten Teil wird anhand empirischer Untersuchungen Netzwerke und Modelle zur Simulation dieser vorgestellt. In einer Metastudie werden zunächst strukturelle Eigenschaften von sozialen virtuellen Netzwerken untersucht und die Netzwerke anhand von vier unabhängigen Kenngrößen verglichen. Darauf aufbauend werden stochastische Simulationsmodelle vorgestellt und evaluiert. Dabei werden die Schwächen und Stärken einzelner Modelle aufgezeigt. Keines der betrachteten Modelle berücksichtigt den Abbau von Verbindungen. Es werden lediglich Kanten hinzugefügt. Dies geschieht auch nur, wenn neue Netzwerkteilnehmer hinzukommen. Die Dynamik innerhalb der Netzwerke im zeitlichen Verlauf wird nicht berücksichtigt. Soziale virtuelle Netzwerke sind offene Systeme, die mit ihrer Umwelt interagieren. Sie bestehen selbst aus Systemen, weshalb sich innerhalb der Netzwerke die Strukturen ändern. Diese Dynamik hängt nicht zwangsläufig von äußeren Einflüssen ab. Ein empirisch valides Modell muss diese fundamentale Eigenschaft berücksichtigen. ····· 10361107283

Wireless Sensor Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The most emerging technology of sensor networks is the use of them in the medical care to save patients lives, create valuable data for medical research, and cut the cost of medical services. Recently, body sensor networks are used for remote health monitoring and patient care. This book, therefore, attempts to provide of unified overview of broader field of Wireless Sensor Networks in healthcare applications. The organization of the book starts with the background of wireless sensor networks, and then completes description of the patient health metrics: heart rate and blood oxygen saturation (SpO2) by using body sensor networks for better treatment. In this book the idea of architecture of wireless sensor networks is presented for the monitoring of patients different health metrics: heart rate and blood oxygen saturation levels for treatment at home. The main focus of book is to examine, monitor and analyze patient heart beat activities and oxygen saturation level in order to meet better treatment and health care. In addition this book provides countermeasures of different security attacks related to data gathering from different sensors. ····· 10361103100

A Bandwidth Market in an Packet Switching Network

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This project considers a connection-oriented telecommunication network where calls arrive to routes in a Poisson process and the call lengths are exponentially distributed. Each accepted call generates packets which arrive to routes in a Poisson process and the packet lengths are exponentially distributed. Each accepted call generates an amount of revenue for the route manager. At specified time points a manager can buy additional bandwidth in order to carry more calls and earn more revenue. Alternatively, a manager can earn additional revenue by selling surplus bandwidth. We presented a buffer management scheme where at specified time points a manager can buy additional bandwidth or buffer space to carry more calls or queue more packets and earn more revenue alternatively a manager can earn revenue by selling surplus bandwidth or buffer space to other route managers. The combined call and packet management schemes use local rules to optimally adjust the bandwidth and buffer space allocated to the paths. Initial experiments show that the reallocation scheme achieves good performance.. ····· 10361103074

FUNCTIONAL BRAIN SPECTROSCOPY USING WIRELESS NETWORKS

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Currently, it is possible to achieve full mobility in everyday environment using a near- infrared light sensors to monitor brain function in humans. Multiple wireless networks employing several protocols can be used for data carriage and provide new freedom to conduct monitoring in real environments outside a lab. The measurements of the changes of the concentration of oxyhemoglobin (HbO2) and deoxyhemoglobin (Hb) in the real-life environment, might lead to better understanding of tissue pathologies. ····· 10361103051

Load and Interference Aware Routing Metric for WLAN Mesh Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Wireless Mesh Networks recently attract significant interests due to the minimal infrastructure demands and their potential for supporting mobile and pervasive computing. This work introduces a routing scheme to find best performance routes in WLAN mesh networks. A cross-layer approach is used to overcome self-interference issue of existing load-aware routing metrics. The proposed routing metric was evaluated on a multi-hop wireless emulator which allows us to emulate wireless networks on a wired testbed. Design and implementation of AEROMAN (Architecture to Evaluate Routing Protocols for Multi-hop Ad-hoc Networks) used in the emulator are presented. AEROMAN is the first, to the best of our knowledge, fully distributed approach taking into account properties of contention-based media access for wireless channel, and does not require any special hardware to emulate wireless channel. ····· 10361102914

Scalable Network Tomography System

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Network tomography enables operators to monitor and take action based on path measurements between nodes, often located at the network edge. State-of-the-art network tomography solutions use tools to measure performance parameters such as jitter, loss and round-trip time between multiple nodes. This book describes and analyses a self-organizing, distributed and scalable control protocol for methods conducting continuous active measurements. Performing path available capacity measurements pose some interesting scalability challenges solved by the control protocol. The control protocol also aims at providing full-mesh coverage of end-node measurement pairs in order to give the operator a performance map . By setting a few parameters at startup the system autonomously can control the network and node overhead. Further, it is shown that the control protocol is scalable with respect to the number of nodes that is involved in the measurements. ····· 10361102750

Secure Neighbor Discovery in Wireless Networks

····· lezzter Preis 49.00€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Wireless ad-hoc networks, especially sensor networks, are increasingly being used for data monitoring in commercial, industrial, and military applications. Security is of great concern from many different viewpoints: ensuring that sensitive data does not fall into wrong hands ensuring that the received data has not been doctored and ensuring that the network is resilient to denial of service attacks. This book studies the fundamental problem of secure neighbor discovery, which is critical to protecting the network against a number of different forms of attacks. In wireless ad-hoc and sensor networks, neighbor discovery is one of the first steps performed by a node upon deployment and disrupting it adversely affects a number of routing, MAC, topology discovery and intrusion detection protocols. It is especially harmful when an adversary can convince nodes that it is a legitimate neighbor, which it can do easily and without the use of cryptographic primitives. This book discusses a secure neighbor discovery protocol, SEDINE, for static multihop wireless networks, and extensively analyze its performance. ····· 10361102741

How much energy does a PC consume?

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In recent years the performance of the PC have increased significantly, thanks to new technological developments but, while these developments lead to an increased power, on the other side there is a very important issue: the cooling of the PC. This consequence is due to the fact that the increased power of the components is directly proportional to their temperature, resulting from the overheating of their electrical resistance. The reduction has many advantages in the level of activity of our pc. First of all, the energy conservation automatically results in savings and environmental resources resulting from the decrease of activity. In addition, a second advantage lies in the fact that it can reduce the activity and increases the life of computers, saving, for example, the processor useless cycles, and reducing the temperature of the components. ····· 10361102607

Issues of Routing in VANET

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In this study we try to figure out the problems and challanges that became hurdle for the reliable routing in Vehicular Adhoc Network.We selected topology and position based ad hoc routing protocols and compare their performance in VANET.We carried out different simulations of several topology and postion based routing protocols against each other.From the simualtion results we realize that postion based routing protocols have more promising results than topology based protocols.Furthermore in this study we conclude that position based routing should be adopt in order to provide more reliable routing in highly dynamic nature of VANET. ····· 10361102477

Modifying the TCP Acknowledgement Mechanism

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Nowadays the Transmission Control Protocol (TCP) is omnipresent in the Internet. TCP conveys 90% of the Internet traffic from applications, such as web, email, file transfers and even multimedia traffic. In this book we develop methods and algorithms to improve the fundamental working of TCP: the clocking on data packets through the timely reception of acknowledgements (ACKs). We study two complementary aspects on data transmission: the control of the congestion of ACKs and the acceleration of the ACKs frequency. First, we describe in detail a mechanism, called ACK congestion control (ACK-CC), allowing TCP to deal with the impairments produced by the congestion of ACKs in bandwidth asymmetrical networks. Then, we evaluate the functioning of ACK-CC in both phases of the transmission, namely slow start and congestion avoidance. On the other hand, for the acceleration of the ACKs frequency (and thus the acceleration of the transmission) we assess the ACK division technique, through both simple mathematical modeling and simulation. In this book we also discuss the performance of TCP over WiMAX networks. We focus on the impact of the WiMAX MAC-layer asymmetry on TCP. ····· 10361102419

· 1 · ::::: · 5 ·· 6 ·· 7 ·· 8 ·· 9 ·· 10 ·· 11 · ::::: · 17 ·