AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 6 ·· 7 ·· 8 ·· 9 ·· 10 ·· 11 ·· 12 · ::::: · 17 ·

Issues of Routing in VANET

····· lezzter Preis 44.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In this study we try to figure out the problems and challanges that became hurdle for the reliable routing in Vehicular Adhoc Network.We selected topology and position based ad hoc routing protocols and compare their performance in VANET.We carried out different simulations of several topology and postion based routing protocols against each other.From the simualtion results we realize that postion based routing protocols have more promising results than topology based protocols.Furthermore in this study we conclude that position based routing should be adopt in order to provide more reliable routing in highly dynamic nature of VANET. ····· 10361102477

Modifying the TCP Acknowledgement Mechanism

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Nowadays the Transmission Control Protocol (TCP) is omnipresent in the Internet. TCP conveys 90% of the Internet traffic from applications, such as web, email, file transfers and even multimedia traffic. In this book we develop methods and algorithms to improve the fundamental working of TCP: the clocking on data packets through the timely reception of acknowledgements (ACKs). We study two complementary aspects on data transmission: the control of the congestion of ACKs and the acceleration of the ACKs frequency. First, we describe in detail a mechanism, called ACK congestion control (ACK-CC), allowing TCP to deal with the impairments produced by the congestion of ACKs in bandwidth asymmetrical networks. Then, we evaluate the functioning of ACK-CC in both phases of the transmission, namely slow start and congestion avoidance. On the other hand, for the acceleration of the ACKs frequency (and thus the acceleration of the transmission) we assess the ACK division technique, through both simple mathematical modeling and simulation. In this book we also discuss the performance of TCP over WiMAX networks. We focus on the impact of the WiMAX MAC-layer asymmetry on TCP. ····· 10361102419

Modeling and Performance Analysis of Mobile Ad Hoc Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Ad hoc networks are gaining increasing popularity in recent years because of their ease of deployment. In ad hoc networks, Medium Access Control (MAC) protocols are a fundamental element that determines the efficiency in sharing the limited communication bandwidth. IEEE 802.11 distributed coordination function (DCF) is the most widely used MAC protocol in ad hoc networks due to its compatibility with the IEEE 802 protocol suite. Since the release of the IEEE 802.11 specification, many research efforts have been devoted to modeling the performance of this protocol. However, most of studies are confined to the stationary performance with ideal channel. This book aims to release these assumptions and find the impact of mobility and time varying channel on the DCF performance. ····· 10361102416

Service provisioning in Mobile Ad hoc Networks

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Over the last decade the telecommunications domain has gone through historical changes. The evolution of networks, technologies and telecommunications vision has experienced rapid changes. Mobility becomes a must and there is an increasing demand by mobile end-users for services. Delivering value added services anywhere can be possible by taking advantage of the flexibility of mobile ad hoc networks (MANETs). Traditional service architectures fail to address the characteristics of such new networks. This book proposes a novel architecture to provide services in the challenging MANETs. Two types of MANETs are addressed: the stand alone and the Multihop Cellular networks (MCNs). Architectures and benefits from the network operators` point of view are presented and discussed. Since SIP is widely used in today`s 3G networks, SIP servlets are considered as the basis framework. The work represents a first step in the area. Therefore, the book may help professional, student or researchers interested in service architectures and Mobile Ad hoc networks as an introduction to the domain but also to go further for commercial solutions or address open issues. ····· 10361102269

Secure Protocols for Location, Adjacency, and Identity Verification

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In the virtual world of networked electronic services, finding the physical location of a device, or determining the properties of the link between two devices, might be as important as knowing their identities. Consider, for example, a sensor whose role is counting traffic at some location, or the link between a proximity card and its reader. Moreover, since there is no compulsion to believe a device (called prover), its location should be independently computable, possibly by its neighbors (called verifiers). The goal of this work is to develop a set of techniques for merging the concepts of identity authentication with either location authentication or adjacency authentication into a single peer-to-peer protocol. ····· 10361102174

ENHANCING QUALITY OF SERVICE IN INTERNET USING DYNAMIC SCHEDULING

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book elaborates the research work done to achieve better Quality of Service (QoS) in Internet using priority based schedulers. It introduces a Variable-Weighted Fair Queuing scheduling algorithm (V-WFQ) that provides Quality of Service by dynamically adapting packet priorities to varying network traffic congestion at each router, taking into account the priority of the service being provided.In Variable-Weighted Fair Queuing the changes in congestion at a router will be reflected in a change in the relative priority among flows. V- WFQ provides a prioritization scheme in which higher level Types of Service (ToS) flows dominate the network resources when network resources are constrained, leaving the lower level ToS flows with the remaining resources. This is accomplished through the altering of the flows relative priorities which is implemented with multiple forwarding queues that reflect the type of flow and the congestion level of the network. ····· 10361101693

Graph Theroy and Its Application to Wireless Mobile Ad-Hoc Networking

····· lezzter Preis 71.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Over the last few years, due to the rapid development of mobile computing techniques and proliferation of mobile communication devices, the wireless communication technology has been experiencing exponential improvements. Despite the sever resource limitations and lack of infrastructure in ad hoc networks, we have observed an explosive growth of ad hoc networking and ubiquitous computing during the last decade. The movement from personal computing age to ubiquitous computing age needs a huge revolution in communication technology that motivated us to write this book on interesting features of the next generation networks. This book focuses on the graph-based optimization problems and their applications in wireless ad hoc networking. The aim of this book is to make a strong connection between the graph theory and wireless ad hoc networking that has not been yet received the attention it deserves in literature. This book is intended for researchers and graduate students in the field of graph theory,computer engineering,communication systems and networks. This book was in part supported by a grant from Department of Computer Engineering, Islamic Azad University,Arak Branch,Arak,Iran. ····· 10361101632

Peer-to-Peer Networks

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
There are many Peer-to-Peer (P2P) networks in literature which are designed to provide collaboration and sharing as well as active router to enhance the routing process. However, there is no any single-node architecture that integrates P2P network and active router architecture. This book is aimed at proposing a single-node architecture that integrates both active routing and P2P networking. In this book, four different case studies are implemented using P2P networks. These studies are communication, security, routing based content and scheduling applications. Each case study was evaluated and tested. Communication applications include unicast (ping and deliver) and multicast (cast and broadcasting) applications. The security applications include active firewall and active protection. For the routing based content application, the delay time for packet flow increase with the increase of the number of hops or size of varValsend() function. Scheduling applications are based on two search mechanisms, depth first search (DFS) and breadth first search (BFS). ····· 10361101517

Key Pre-distribution in Wireless Sensor Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Sensor nodes are tiny devices, with less computational power and memory capacity. For secure communication, the secret keys must be built into the nodes before deployment. Distribution of keys among the sensor nodes is a challenging task. Number of sensor nodes are usually much higher than the number of keys available. In this paper we use Steiner Triple system (STS) which is a combinatorial design to distribute the keys among the sensor nodes. As the keys are built into the nodes, no path key establishment phase is required for secure communication. Hence nodes can communicate using the built in secret keys. Thus, a faster communication is achieved. However, STS is not an appropriate candidate for large networks, where sensors are not within the communication range of each other. To overcome this we propose a cluster based key predistribution using Steiner Triple System. We evaluated the resiliency of our proposed system and found to have a better resiliency.Using dummy node concept the scalability of network can be increase. ····· 10361101474

Quality of Service in next generation mobile and wireless networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In accordance with the latest research, this book presents several segments that describe the direction and techniques together with actual implementation of new methods for controlling and improving of the quality of services in future generation mobile networks. It gives review of the architectures of the future generations of networks, it performs analysis of network architectures in heterogeneous networks and the ways radio resource management is achieved in each of them. The main focus was given on the heterogeneous wireless networks, through which a new proposal is presented for their architecture of internetwork operation using the Internet model for interoperability between radio access technologies that participate in the construction of heterogeneous networks. The proposed new architecture in this book defines the unique ecosystem of inter-network operation between different RAT s that form next generation mobile networks. Furthermore, the book defines a new algorithm for selecting of access network in heterogeneous wireless environment by using algorithms from artificial intelligence. This proposal can be base for implementation of new 5G architecture. ····· 10361101458

Position-based Highway-Optimized Geocast

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In this thesis, we present Position-based Highway-Optimized Geocast ( OG), an efficient, ad-hoc protocol for vehicle-to-vehicle geocasting of urgent warning messages along a highway. OG is an optimized position-based forwarding (PBF) protocol, i.e. messages are relayed via neighbors toward the destination. Position-based routing and geocasting protocols are well known, but previous works did not explore the ability to optimize their performance for the critical task of geocasting of alerts between vehicles along a highway. We present simulation results showing that the optimizations in OG significantly improve performance, compared to PBF protocols not optimized for geocasting over highways. Furthermore, we show that OG also significantly outperforms ODAM, one of the recent contention-based geocasting protocols. This is the first simulation-based comparison of (optimized) position-based and contentionbased geocasting protocols. ····· 10361101368

Issues in WiMAX Handover

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
WiMax is one of the most efficient technologies in data communication. Its implementation in many different parts of the world has proved it to be resource efficient and up to the mark with other data communication technologies. We can safely say that it is going to change not only the internet and DSL services, but it also have a potential to change overall telecommunication world as a whole. The very special thing about it is its mobility and speed blend, which can prove it to be a very efficient alternative, specially in under developed areas,where there is less infrastructure. However some issues in handover process of WiMax makes the switching process very slow, which definitely needs to be catered for. We have tried to elaborate problems as well as solutions for those problems in this book. ····· 10361101256

Geographic Routing in Wireless Sensor and Ad Hoc Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
A wireless sensor and ad hoc network consists of a large number of low-power nodes equipped with wireless radio. The design of efficient routing protocols for dynamic network topologies is crucial for scalable sensor and ad hoc networks. Geographic routing is a recently developed technique that uses locally available position information of nodes to make packet forwarding decisions. This book develops a framework for energy efficient geographic routing. This framework includes a path pruning strategy by exploiting the channel listening capability, an anchor-based routing protocol using anchors to act as relay nodes between source and destination, a geographic multicast algorithm clustering destinations that can share the same next hop, and a lifetime-aware routing algorithm to prolong the lifetime of wireless sensor networks by considering four important factors: PRR (Packet Reception Rate), forwarding history, progress and remaining energy. This book discusses the system design, theoretic analysis, simulation and testbed implementation involved in the aforementioned framework. ····· 10361101255

Direction-Based Location management techniques for Wireless Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The goal of the location management process is to minimize its cost, which is augmented to two different processes, searching for its location and reporting the user`s location. A Direction Based Location Update Scheme with Line Paging strategy is presented earlier which updates the mobile user`s location only when it changes its direction and searches for the user in that direction too. In this book, an enhanced Direction Based Location Update scheme is presented and combined with a predictive line paging strategy. The use of prediction leads to performing less searching to locate the user to minimize the location management total cost. Further, an Adaptive Direction Based Location Update is proposed. In which a periodic location update messages were added to increase the accuracy of predicting the location of users. The Adaptive Direction Based Location Update scheme is applied with predictive line paging to reduce the total cost of the location management process. It is applied with different sets of cost coefficients for location updates and pagings. ····· 10361101101

How Far Can we go with OBS Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Optical Burst Switching (OBS) was proposed a decade ago as an alternative switching paradigm in order to overcome some of the drawbacks of Optical Circuit Switching (OCS). While OBS is no more necessarily perceived as a competitor to OCS, but more of a more adapted switching for networks with bursty and highly dynamic traffic, there is still a debate around OBS, i.e., how far an OBS network can go in terms of throughput with no or limited burst losses. This book attempts to answer this question by investigating how to devise an upper bound on the throughput of an OBS network, assuming no recourse to electrical buffering is made at any intermediate node. ····· 10361100908

End-to-end path computation schemes

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This work deals with the end-to-end QoS aware path computation problem under three separate parts: a distributed inter-domain scheme, a joint inter- layer/inter-domain path computation scheme and traffic engineering, and an inter-layer path computation algorithm for GMPLS networks. It first presents a distributed pre-reservation based procedure for inter-domain path computation of LSPs within a PCE based architecture. This allows the computation of optimal inter-domain paths with efficient setup times. It then extends this solution by considering the joint inter-layer/inter-domain problem for a complete view and global optimization. Finally it presents a novel mathematical program specific to GMPLS multi-layer path computation that solves the problem of nesting and un-nesting LSPs from one switching region to another. ····· 10361100865

Innovation Dilemma in Next Generation Mobile Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Today knowledge has become pivotal resource for the modern economy. The need to protect innovative efforts thus is critically desired. Intellectual Property Rights (IPR) provided by the governmental agencies encourage innovators to disclose their valuable inventions to the public, in return for the temporarily granted legal rights to exclude other from imitation. As the surge of patenting activities appeared in recent 20 years,the current practice of patent system reveals to be controversial, especially with regard to the Information and Communication Technology (ICT) industry. The situation is even worse within the context of ICT standardization where IPR protection, standard setting and competition potentially conflict with each other. In this book, we conduct comprehensive review considering challenges brought by IPR system and convoluted interaction underlying the IPR, competition and standardization towards 4G. We then build up the evaluation framework which takes care of these complex relationships and mixed effects by means of IPR analysis. Finally we present the empirical evaluation result on Long Time Evolution , which will be the major path evolved from 3G towards 4G. ····· 10361100718

Creating an Internet Service Provider

····· lezzter Preis 71.10€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The network division of Mälardalen University requires a sharp internet connection via the creation of a local small scale Internet Service Provider (ISP) to realize the demands of a modern and advanced network education. The objective of this book is to design and implement a small scale ISP for the NetCenter sub department at Mälardalen University in Sweden. The ISP is intended to give NetCenter a network separate from the university`s network, providing them with a more flexible environment for lab purposes. The network is designed with a layered approach including an Internet access layer, a larger core segment and a distribution layer with a separated lab network. It also incorporates both a public and a private server network, housing servers running e.g. Windows Active Directory, external DNS services, monitoring tools and logging applications. The Internet access is achieved by peering with the Swedish university network SUNET providing a full BGP feed. This book is useful for network technicians or CIOs in thought of establishing a sharp connection to the internet for complete control or for other individuals with an interest in network technology or Linux servers. ····· 10361100645

Image Transference and Retrieval Over Short Messaging Service

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book describes the method of sending high Quality 2 Dimension,3 Dimension still and animated images over Short Message Service in GSM & Satellite Network. Presented method has two main blocks first block converts images or animations into characters. And second block applies Huffman coding compression method on those characters and set them as a payload text of SMS. Generally, SMS is text based service and cannot send multimedia contents. For delivering multimedia contents, two other services are utilized which are MMS (Multimedia Messaging Service) and EMS (Extended Messaging Service). EMS is an application level extension can transfer predefined sounds, animations and images etc. But a drawback is that EMS is not supported as widely as SMS. On the other hand, MMS have richer contents than SMS and EMS. But for large files it needs higher network capability like 3G etc. ····· 10361100345

Detection Schemes for Selective Forward Attack in WSN

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Wireless Sensor Networks have been increasing in Size and complexity .WSNs have numerous applications including monitoring of oceans to monitoring performance of machinery , monitoring saftey of some area to monotoring a whole earhquake affected area and monitoring criticial military area to battelfield. Without security, the use of WSNs in any application domain would result in undesirable consequences.This book contains the detail explanation of one of the routing attack (Selective Forward Attack )in Wireless Sensor Network.This attack will occurs in the network layer . Many researchers proposes defensive mechanisums to solve this problem. Cumulative acknowledegement based and energy based is proposed and discussed . This books gives an overall idea to evaulate the detection schemes and to motivate the readers to solve the other routing attacks in wireless sensor network. Sepcial thanks to the faculty Colleague and students who gave their suggestions and performed excellent work in simulating the schemes.Finally I wish to thank Tatiana Melnic,Acquisition Editor for his encouragement and bring this work in the form of monagraph. ····· 10361100277

Multi-Radar Track Fusion

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Multi-Radar Tracking refers to the output obtained by the processing done on data from multiple sensors. This process includes measurement-to-track association and data fusion to obtain the nearest and the most accurate output.the input data was obtained from a simulation of a number of aircrafts having different flight paths in random real-time scenarios. Then noise was added to make it as similar to the digitized output of the radars of Pakistan as possible. The objective was to develop identification and fusion algorithms .So first the aircrafts were identified from the redundant data. After that fusion of flight paths of those aircrafts was done so that different aircrafts and their flight paths could be separated as well as predicted. Finally this fully processed data, as results, was displayed on a dynamic map-based GUI .The results show that the algorithms are efficient in most of the cases except in some certain special cases. ····· 10361100095

A Diffserv Approach to Enhance QoS in Mobile IPv6 Based Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Supporting QoS in the Internet is considered one of the main challenges facing many researchers nowadays. The standard Mobile IPv6 was designed to allow nodes to be reachable and maintain ongoing connections while changing their location within the topology. However, it can only provide Best-Effort (BE) service to all its applications. As a result, IETF has proposed IntServ, DiffServ and MPLS. Above all, the most promising model due to its simplicity and scalability advantages is DiffServ. Those approaches were initially designed without mobility in-mind. Hence, they are not fully adapted to mobile environments yet. Integrating QoS with mobility support seems to be needed to fulfill the necessity of users. This work aims to propose a new scheme that takes the advantage of DiffServ to enhance QoS in the mobile IPv6 networks. The proposed scheme was evaluated using two methods namely, simulation and analytical analysis. The proposed scheme is benchmarked with the standard MIPv6 which was proposed by IETF. The obtained results show that the proposed scheme outperforms the standard MIPv6 protocol. The packets loss and handover latency are noticeably improved compared to MIPv6. ····· 1036199875

Introduction to GloMoSim

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Network Simulator may be the fastest growing technologies in our research culture today. To study of GloMoSim is both exciting and challenging. It is exciting because it presents a wide range of programming techniques that make it possible to solve larger and more complex problems. It is challenging because the richness of C language brings with it many concepts that change the way we approach the protocol design. Because the study of GloMoSim is such a rich subject, you will find that it is not possible to cover all of the material in one term. In fact, GloMoSim is such a rich network simulator that you will find it taught in UG and PG graduate programs and research programs. ····· 1036199870

Can delay based protocols survive in real world?

für 35.91€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
TCP is a widely used congestion protocol in Internet, it uses packet losses as congestion signals. Delay-based protocols use observed packet delays along with packet losses as congestion signals. Delay-based congestion protocols are shown to provide may benefits in homogeneous environments, but struggle to compete against loss-based protocols such as TCP. For delay-based protocols to be practical, they need to be incrementally deployable and hence need to compete with TCP in current Internet. This book explores the design of such a delay-based protocol, PERT (enhanced), that can compete with TCP and prove this through evaluations. We show that PERT experiences lower drop rate than TCP-SACK and leads to lower overall drop rates with different mixes of PERT and other loss based congestion control protocols. We also show that a single PERT flow can fully utilize a high-speed, high-delay link. We investigate if potential noise and variability in delay measurements in environments such as cable and ADSL access networks impact the protocol behaviour significantly. ····· 1036199786

· 1 · ::::: · 6 ·· 7 ·· 8 ·· 9 ·· 10 ·· 11 ·· 12 · ::::: · 17 ·