A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Performance analysis of a mobile communication network: the tandem case
2004
Computer Communications
This paper investigates mobile communication networks consisting of N-cells in tandem. ...
Our approximation is based on decomposing the N-cells in tandem network into N 2 1 pairs of cells with overlaps. ...
Introduction The rapid development of personal communication services (PCS) has stimulated increasing interests in studying the performance measures of cellular mobile communication networks with various ...
doi:10.1016/s0140-3664(03)00216-0
fatcat:ctixm7cufzcabp4jorzddvxtae
Improving Distributed Forensics and Incident Response in Loosely Controlled Networked Environments
2016
International Journal of Security and Its Applications
enabling efficient capture, analysis and reporting of artifacts of use in digital investigations. ...
Mobile devices and virtualized appliances in the Internet of Things can be end nodes on varying networks owned by different parties over time, while still seamlessly participating in licit or illicit activities ...
Mobile devices may also be connected to other non-standard forms of networks such as with Near Field Communication enabled devices. ...
doi:10.14257/ijsia.2016.10.1.35
fatcat:ow64etrgkzfyxmksanigve3pau
From link dynamics to path lifetime and packet-length optimization in MANETs
2007
Wireless networks
Finally,we summarize all the analytical results into a comprehensive performance analysis on throughput, delay and storage. ...
We present an analytical framework and statistical models to accurately characterize the lifetime of a wireless link and multi-hop paths in mobile ad hoc networks (MANET). ...
An important property of a M/M/1-FCFS feedforward tandem network is the Jackson's theorem (see [24] , page 150), i.e., if the tandem network with exponential service time is driven by a Poisson arrival ...
doi:10.1007/s11276-007-0086-x
fatcat:7wjmsx5z7fayxeuouif2cn6gem
Link Lifetime as a Function of Node Mobility in MANETs with Restricted Mobility: Modeling and Applications
2007
2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops
We present statistical models to accurately evaluate the distribution of the lifetime of a wireless link in a mobile ad hoc network (MANET) in which nodes move randomly within constrained areas. ...
Summarizing all these results, we further provide comprehensive analysis on throughput, delay, and storage requirements for MANETs with restricted node mobility. ...
Philippe Nain of INRIA university for their kind help on providing the simulation environment. ...
doi:10.1109/wiopt.2007.4480023
dblp:conf/wiopt/WuSG07
fatcat:tlaycxgxanh3zcyuimiuolkhym
TCP performance over mobile ad hoc networks: a quantitative study
2004
Wireless Communications and Mobile Computing
In this paper, we study the performance of transmission control protocol (TCP) over mobile ad-hoc networks. ...
We conclude from our results that existing approaches to improve TCP performance over mobile ad-hoc networks have identified and hence focused only on a subset of the affecting factors. ...
Introduction Ad-hoc networks are multihop wireless networks that can operate without the services of an established backbone infrastructure. ...
doi:10.1002/wcm.172
fatcat:muxkypz3jnhelgszadke3qmxru
VoIP: A comprehensive survey on a promising technology
2009
Computer Networks
The survey begins with the merits and demerits of VoIP, followed by the Quality of Service (QoS) requirements that voice imposes and a description of test methods for the assessment of speech quality. ...
In this article, we survey all these aspects that have the greatest impact on the quality of voice communications over IP networks. ...
Acknowledgement This work was supported by the IST FP6 VIVALDI project ''Advancing interactive Broadband satellite access by optimal convergence of session based services over DVB-RCS" (FP6-2004-IST-4) ...
doi:10.1016/j.comnet.2009.03.010
fatcat:yqjfs3vtard3loixoz3fvndhgy
Neural Network Approach to Modelling Transport System Resilience for Major Cities: Case Studies of Lagos and Kano (Nigeria)
2021
Sustainability
Furthermore, the LM algorithm provided a better fit for the model training and for the overall validation of the Kano network analysis with MSE (4.424) and R (1.0). ...
This research employed a neural network as an adaptive artificially-intelligent application to study the complex domains of traffic vulnerability and the resilience of the transport system in Nigerian ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/su13031371
fatcat:vicofwcdajglxf5neuokit7ude
Cross-Layer Design Approaches in Underwater Wireless Sensor Networks: A Survey
2021
SN Computer Science
an optimal solution with better utilization of scarce resources to improve the network performance. ...
The different proposals in the literature are categorized and compared based on the performance metrics. ...
rest of the nodes in tandem with the B-MAC protocol. ...
doi:10.1007/s42979-021-00754-x
fatcat:3rrlea6acbbgvgebn36qjen5mm
QoS Architectures
[chapter]
2007
QoS Over Heterogeneous Networks
The reference network is always the one reported in Figure 2 .3, where by chance, the origin of the information is a mobile terminal (possibly a mobile sensor). ...
The service (data acquisition by a sensor network for the analysis of the land) implies the transport of information from the earth to a plane monitoring a portion of the territory through an ad hoc group ...
In more detail, the ideal performance vector in this case is The VALUE strategy distributes the bandwidth by minimizing the sum of the single performance functions. ...
doi:10.1002/9780470058763.ch6
fatcat:kbpmgukkwbhz7an6ogbnutfdri
Interference mitigation in wireless mesh networks through radio co-location aware conflict graphs
2015
Wireless networks
Wireless Mesh Networks (WMNs) have evolved into a wireless communication technology of immense interest. ...
But technological advancements in WMNs have inadvertently spawned a plethora of network performance bottlenecks, caused primarily by the rise in prevalent interference. ...
This increase
in Throughput N et of MaIS-CA 2 , continues to rise from Flow
Type-1 to Flow Type-5, i.e., with the increase in the number of
concurrent flows injected in the network. ...
doi:10.1007/s11276-015-1002-4
fatcat:5bxuwasaqfgh3fwaiy5t6xfsyu
Secure Multipurpose Wireless Sensor Networks
[chapter]
2014
Security for Multihop Wireless Networks
The Scopes Framework introduces dynamic partitioning of a WSN with support for multiple in-network tasks. SecScopes enables secure access control, key exchange and communication. ...
We present a detailed evaluation of the performance of the framework and compare and discuss the results for the different stages of the framework. ...
It has the ability to communicate with other robots but this is used as a point to point communication and not for communication with groups or perform grouping in a network. ...
doi:10.1201/b16754-13
fatcat:65kfuzw6hrbwfjrqivaz7auo4i
Design and evaluation of a new MAC protocol for long-distance 802.11 mesh networks
2005
Proceedings of the 11th annual international conference on Mobile computing and networking - MobiCom '05
We then present the dependence of 2P on the network topology, and show that it is indeed possible to design in practice, network topologies compatible with 2P. ...
We describe in detail a new MAC protocol, called 2P, that is suited for such networks in terms of efficiency. ...
Acknowledgment We thank Media Lab Asia for financial support of this project. ...
doi:10.1145/1080829.1080847
dblp:conf/mobicom/RamanC05
fatcat:qrpy272et5gmljyioanxqnliz4
A comprehensive survey on machine learning for networking: evolution, applications and research opportunities
2018
Journal of Internet Services and Applications
Therefore, this is a timely contribution of the implications of ML for networking, that is pushing the barriers of autonomic network operation and management. ...
This survey is original, since it jointly presents the application of diverse ML techniques in various key areas of networking across different network technologies. ...
Acknowledgments We thank the anonymous reviewers for their insightful comments and suggestions that helped us improve the quality of the paper. ...
doi:10.1186/s13174-018-0087-2
fatcat:jvwpewceevev3n4keoswqlcacu
Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services
2017
Journal of Network and Computer Applications
Denial-of-service attack modelling and detection for HTTP/2 services. Retrieved from ...
The Transport Layer manages a connection with a remote end, controls the flow of the packets, and informs the Application Layer service type (e.g. HTTP). ...
The introduction of a new application-layer communication standard prompts a critical analysis of its security implications. ...
doi:10.1016/j.jnca.2017.04.015
fatcat:qfufzlor2bbk7htg3ticypr6re
Application-Aware Acceleration for Wireless Data Networks: Design Elements and Prototype Implementation
2009
IEEE Transactions on Mobile Computing
We also build a proof-of-concept prototype of A3 which can work with real applications. ò Voice Over IP The expected VoIP call capacity in a one-hop IEEE 802.11b network with G.711 voice codec is about ...
One of the graduate students has graduated and taken up a research engineer position at a wireless service provider. ...
While mobile users with any type of wireless access can participate in P2P networks, the access technology typically used is wireless LANs (WLANs). ...
doi:10.1109/tmc.2009.52
fatcat:wmvwzlqpsjbxvnccepn6euaa64
« Previous
Showing results 1 — 15 out of 894 results