Filters








894 Hits in 9.8 sec

Performance analysis of a mobile communication network: the tandem case

Attahiru Sule Alfa, Bin Liu
2004 Computer Communications  
This paper investigates mobile communication networks consisting of N-cells in tandem.  ...  Our approximation is based on decomposing the N-cells in tandem network into N 2 1 pairs of cells with overlaps.  ...  Introduction The rapid development of personal communication services (PCS) has stimulated increasing interests in studying the performance measures of cellular mobile communication networks with various  ... 
doi:10.1016/s0140-3664(03)00216-0 fatcat:ctixm7cufzcabp4jorzddvxtae

Improving Distributed Forensics and Incident Response in Loosely Controlled Networked Environments

Irvin Homem, Theo Kanter, Rahim Rahmani
2016 International Journal of Security and Its Applications  
enabling efficient capture, analysis and reporting of artifacts of use in digital investigations.  ...  Mobile devices and virtualized appliances in the Internet of Things can be end nodes on varying networks owned by different parties over time, while still seamlessly participating in licit or illicit activities  ...  Mobile devices may also be connected to other non-standard forms of networks such as with Near Field Communication enabled devices.  ... 
doi:10.14257/ijsia.2016.10.1.35 fatcat:ow64etrgkzfyxmksanigve3pau

From link dynamics to path lifetime and packet-length optimization in MANETs

Xianren Wu, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves
2007 Wireless networks  
Finally,we summarize all the analytical results into a comprehensive performance analysis on throughput, delay and storage.  ...  We present an analytical framework and statistical models to accurately characterize the lifetime of a wireless link and multi-hop paths in mobile ad hoc networks (MANET).  ...  An important property of a M/M/1-FCFS feedforward tandem network is the Jackson's theorem (see [24] , page 150), i.e., if the tandem network with exponential service time is driven by a Poisson arrival  ... 
doi:10.1007/s11276-007-0086-x fatcat:7wjmsx5z7fayxeuouif2cn6gem

Link Lifetime as a Function of Node Mobility in MANETs with Restricted Mobility: Modeling and Applications

Xianren Wu, Hamid R. Sadjadpour, J.J. Garcia-Luna-Aceves
2007 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops  
We present statistical models to accurately evaluate the distribution of the lifetime of a wireless link in a mobile ad hoc network (MANET) in which nodes move randomly within constrained areas.  ...  Summarizing all these results, we further provide comprehensive analysis on throughput, delay, and storage requirements for MANETs with restricted node mobility.  ...  Philippe Nain of INRIA university for their kind help on providing the simulation environment.  ... 
doi:10.1109/wiopt.2007.4480023 dblp:conf/wiopt/WuSG07 fatcat:tlaycxgxanh3zcyuimiuolkhym

TCP performance over mobile ad hoc networks: a quantitative study

Vaidyanathan Anantharaman, Seung-Jong Park, Karthikeyan Sundaresan, Raghupathy Sivakumar
2004 Wireless Communications and Mobile Computing  
In this paper, we study the performance of transmission control protocol (TCP) over mobile ad-hoc networks.  ...  We conclude from our results that existing approaches to improve TCP performance over mobile ad-hoc networks have identified and hence focused only on a subset of the affecting factors.  ...  Introduction Ad-hoc networks are multihop wireless networks that can operate without the services of an established backbone infrastructure.  ... 
doi:10.1002/wcm.172 fatcat:muxkypz3jnhelgszadke3qmxru

VoIP: A comprehensive survey on a promising technology

Stylianos Karapantazis, Fotini-Niovi Pavlidou
2009 Computer Networks  
The survey begins with the merits and demerits of VoIP, followed by the Quality of Service (QoS) requirements that voice imposes and a description of test methods for the assessment of speech quality.  ...  In this article, we survey all these aspects that have the greatest impact on the quality of voice communications over IP networks.  ...  Acknowledgement This work was supported by the IST FP6 VIVALDI project ''Advancing interactive Broadband satellite access by optimal convergence of session based services over DVB-RCS" (FP6-2004-IST-4)  ... 
doi:10.1016/j.comnet.2009.03.010 fatcat:yqjfs3vtard3loixoz3fvndhgy

Neural Network Approach to Modelling Transport System Resilience for Major Cities: Case Studies of Lagos and Kano (Nigeria)

Suleiman Hassan Otuoze, Dexter V. L. Hunt, Ian Jefferson
2021 Sustainability  
Furthermore, the LM algorithm provided a better fit for the model training and for the overall validation of the Kano network analysis with MSE (4.424) and R (1.0).  ...  This research employed a neural network as an adaptive artificially-intelligent application to study the complex domains of traffic vulnerability and the resilience of the transport system in Nigerian  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su13031371 fatcat:vicofwcdajglxf5neuokit7ude

Cross-Layer Design Approaches in Underwater Wireless Sensor Networks: A Survey

Roshani V. Bhaskarwar, Dnyandeo J. Pete
2021 SN Computer Science  
an optimal solution with better utilization of scarce resources to improve the network performance.  ...  The different proposals in the literature are categorized and compared based on the performance metrics.  ...  rest of the nodes in tandem with the B-MAC protocol.  ... 
doi:10.1007/s42979-021-00754-x fatcat:3rrlea6acbbgvgebn36qjen5mm

QoS Architectures [chapter]

2007 QoS Over Heterogeneous Networks  
The reference network is always the one reported in Figure 2 .3, where by chance, the origin of the information is a mobile terminal (possibly a mobile sensor).  ...  The service (data acquisition by a sensor network for the analysis of the land) implies the transport of information from the earth to a plane monitoring a portion of the territory through an ad hoc group  ...  In more detail, the ideal performance vector in this case is The VALUE strategy distributes the bandwidth by minimizing the sum of the single performance functions.  ... 
doi:10.1002/9780470058763.ch6 fatcat:kbpmgukkwbhz7an6ogbnutfdri

Interference mitigation in wireless mesh networks through radio co-location aware conflict graphs

Srikant Manas Kala, M. Pavan Kumar Reddy, Ranadheer Musham, Bheemarjuna Reddy Tamma
2015 Wireless networks  
Wireless Mesh Networks (WMNs) have evolved into a wireless communication technology of immense interest.  ...  But technological advancements in WMNs have inadvertently spawned a plethora of network performance bottlenecks, caused primarily by the rise in prevalent interference.  ...  This increase in Throughput N et of MaIS-CA 2 , continues to rise from Flow Type-1 to Flow Type-5, i.e., with the increase in the number of concurrent flows injected in the network.  ... 
doi:10.1007/s11276-015-1002-4 fatcat:5bxuwasaqfgh3fwaiy5t6xfsyu

Secure Multipurpose Wireless Sensor Networks [chapter]

Daniel Jacobi, Marc Fischlin, Alejandro Buchmann
2014 Security for Multihop Wireless Networks  
The Scopes Framework introduces dynamic partitioning of a WSN with support for multiple in-network tasks. SecScopes enables secure access control, key exchange and communication.  ...  We present a detailed evaluation of the performance of the framework and compare and discuss the results for the different stages of the framework.  ...  It has the ability to communicate with other robots but this is used as a point to point communication and not for communication with groups or perform grouping in a network.  ... 
doi:10.1201/b16754-13 fatcat:65kfuzw6hrbwfjrqivaz7auo4i

Design and evaluation of a new MAC protocol for long-distance 802.11 mesh networks

Bhaskaran Raman, Kameswari Chebrolu
2005 Proceedings of the 11th annual international conference on Mobile computing and networking - MobiCom '05  
We then present the dependence of 2P on the network topology, and show that it is indeed possible to design in practice, network topologies compatible with 2P.  ...  We describe in detail a new MAC protocol, called 2P, that is suited for such networks in terms of efficiency.  ...  Acknowledgment We thank Media Lab Asia for financial support of this project.  ... 
doi:10.1145/1080829.1080847 dblp:conf/mobicom/RamanC05 fatcat:qrpy272et5gmljyioanxqnliz4

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

Raouf Boutaba, Mohammad A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada-Solano, Oscar M. Caicedo
2018 Journal of Internet Services and Applications  
Therefore, this is a timely contribution of the implications of ML for networking, that is pushing the barriers of autonomic network operation and management.  ...  This survey is original, since it jointly presents the application of diverse ML techniques in various key areas of networking across different network technologies.  ...  Acknowledgments We thank the anonymous reviewers for their insightful comments and suggestions that helped us improve the quality of the paper.  ... 
doi:10.1186/s13174-018-0087-2 fatcat:jvwpewceevev3n4keoswqlcacu

Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services

Erwin Adi, Zubair Baig, Philip Hingston
2017 Journal of Network and Computer Applications  
Denial-of-service attack modelling and detection for HTTP/2 services. Retrieved from  ...  The Transport Layer manages a connection with a remote end, controls the flow of the packets, and informs the Application Layer service type (e.g. HTTP).  ...  The introduction of a new application-layer communication standard prompts a critical analysis of its security implications.  ... 
doi:10.1016/j.jnca.2017.04.015 fatcat:qfufzlor2bbk7htg3ticypr6re

Application-Aware Acceleration for Wireless Data Networks: Design Elements and Prototype Implementation

Zhenyun Zhuang, Tae-Young Chang, R. Sivakumar, A. Velayutham
2009 IEEE Transactions on Mobile Computing  
We also build a proof-of-concept prototype of A3 which can work with real applications. ò Voice Over IP The expected VoIP call capacity in a one-hop IEEE 802.11b network with G.711 voice codec is about  ...  One of the graduate students has graduated and taken up a research engineer position at a wireless service provider.  ...  While mobile users with any type of wireless access can participate in P2P networks, the access technology typically used is wireless LANs (WLANs).  ... 
doi:10.1109/tmc.2009.52 fatcat:wmvwzlqpsjbxvnccepn6euaa64
« Previous Showing results 1 — 15 out of 894 results