Application aware delay tolerant network protocol

Application aware delay tolerant network protocol

Application aware delay tolerant network protocol

... Attacks on Application- Aware Routing 105 5.4.1 Application- Aware MaxProp 106 iv 5.4.2 Application- Aware Attack 107 5.5 Evaluating Application- Aware ... study how attackers can attack our application- aware routing protocols Our application- aware routing protocols flood dependency graphs as routing metadata into the network so that relay nodes can ... 105 5.13 Appli...

Ngày tải lên: 08/09/2015, 21:39

142 240 0
Báo cáo hóa học: "Research Article Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application" potx

Báo cáo hóa học: "Research Article Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application" potx

... 40 Arrival rate of messages 50 60 Simulation result Analytical result Deadline (b) Multiple pickup points Average delay of the head message Average delay of the head message Figure 3: Comparison ... deadline of the message at the head of each trip can be met, the deadlines of all other messages can also be met Denote the delay of the message at the head of (k + 1)th trip...

Ngày tải lên: 21/06/2014, 23:20

7 255 0
Báo cáo hóa học: " Research Article Performance Optimization for Delay-Tolerant and Contention-Based Application in IEEE 802.16 Networks" pptx

Báo cáo hóa học: " Research Article Performance Optimization for Delay-Tolerant and Contention-Based Application in IEEE 802.16 Networks" pptx

... performance In our paper, we concentrate on the performance optimization only for the delay-tolerant and contentionbased applications runs in IEEE 802.16 networks, in the assumption of fixed and ... (QoS) performance in IEEE 802.16 networks A polling-request-grant mechanism is defined in IEEE 802.16 MAC for efficient bandwidth allocation in uplink channel...

Ngày tải lên: 21/06/2014, 23:20

14 370 0
Resource-Aware Multi-Format Network Security Data Storage doc

Resource-Aware Multi-Format Network Security Data Storage doc

... of network security data storage: resource-aware multi-format security data storage The idea is to leverage the decreasing cost of storage to record different abstractions of the same input data ... WORK We have presented resource-aware multi-format security data storage, a framework for archiving fine-grained security data in the short-term, and coarse-grained...

Ngày tải lên: 14/03/2014, 22:20

8 384 0
Báo cáo hóa học: " Research Article Performance Evaluation of Uplink Delay-Tolerant Packet Service in IEEE 802.16-Based Networks" potx

Báo cáo hóa học: " Research Article Performance Evaluation of Uplink Delay-Tolerant Packet Service in IEEE 802.16-Based Networks" potx

... enable mutually independent uplink scheduling for the nrtPS service flows of the individual SSs Thus, for the service of the aggregated BW-Req for the nrtPS packets, the BS maintains an individual ... schemes in IEEE 802.16 In Section 3, we provide the analytical model including the details of the capacity allocation and the uplink scheduling The analysis of the queueing...

Ngày tải lên: 21/06/2014, 05:20

12 400 0
Báo cáo hóa học: " Editorial Opportunistic and Delay-Tolerant Networks Sergio Palazzo,1 Andrew T. Campbell,2 and Marcelo Dias de Amorim3" pot

Báo cáo hóa học: " Editorial Opportunistic and Delay-Tolerant Networks Sergio Palazzo,1 Andrew T. Campbell,2 and Marcelo Dias de Amorim3" pot

... advances on theoretical aspects of opportunistic and delay-tolerant networks Castro et al consider the interesting scenario of peer-to-peer file sharing in delay-tolerant rural scenarios The authors ... super nodes to provide seamless communications for roaming users over interconnected heterogeneous wireless networks The improvement consists in including a better understanding of...

Ngày tải lên: 21/06/2014, 05:20

2 339 0
Báo cáo hóa học: " Research Article A Sociability-Based Routing Scheme for Delay-Tolerant Networks" doc

Báo cáo hóa học: " Research Article A Sociability-Based Routing Scheme for Delay-Tolerant Networks" doc

... [14], cars act as data mules and employ a carry-and-forward paradigm to transfer data packets to a portal Finally, in [15], opportunistic data delivery is studied when both traditional routing and ... delay-tolerant applications A variety of measurements have been made recently available on the Internet [3, 26] in the form of traffic traces or contact patterns When a historical data...

Ngày tải lên: 21/06/2014, 11:20

13 368 0
Báo cáo hóa học: " Research Article Improving the Dominating-Set Routing over Delay-Tolerant Mobile Ad-Hoc Networks via Estimating Node Intermeeting Times" pdf

Báo cáo hóa học: " Research Article Improving the Dominating-Set Routing over Delay-Tolerant Mobile Ad-Hoc Networks via Estimating Node Intermeeting Times" pdf

... the instant that the node departs from the partition to the instant that the node arrives at the partition the next time In the following, we first study the distribution of the node interarrival ... study The node mean intermeeting time is used in the dominating-set routing scheme Computer simulation results demonstrate that the dominating-set routin...

Ngày tải lên: 21/06/2014, 11:20

12 330 0
Báo cáo hóa học: " Research Article Opportunistic P2P Communications in Delay-Tolerant Rural Scenarios" doc

Báo cáo hóa học: " Research Article Opportunistic P2P Communications in Delay-Tolerant Rural Scenarios" doc

... disseminating these replicas to many nodes in the leafset Delay-Tolerant Networking (DTN) Paradigm in P2P Schemes To support P2P networking in opportunistic or DTN scenarios, the following situations ... communication in intermittent network connectivity scenarios Concerning the network layer, two routing approaches are common in opportunistic scenarios: forwarding and floo...

Ngày tải lên: 21/06/2014, 11:20

14 256 0
Báo cáo hóa học: " Research Article Random Field Estimation with Delay-Constrained and Delay-Tolerant Wireless Sensor Networks" pptx

Báo cáo hóa học: " Research Article Random Field Estimation with Delay-Constrained and Delay-Tolerant Wireless Sensor Networks" pptx

... (nonnecessarily bandlimited) random field estimation with wireless sensor networks To that aim, we adopt the Q&E and C&E encoding schemes of [3] and analyze their performance in two scenarios of interest: delay-constrained ... extensively analyzed the problem of random field estimation with wireless sensor networks In order to characterize the dynamics and spatial co...

Ngày tải lên: 21/06/2014, 17:20

13 263 0
báo cáo hóa học:" Performance assessment of IP over vehicular delay-tolerant networks through the VDTN@Lab testbed EURASIP Journal on Wireless Communications and Networking 2012, 2012:13 " pptx

báo cáo hóa học:" Performance assessment of IP over vehicular delay-tolerant networks through the VDTN@Lab testbed EURASIP Journal on Wireless Communications and Networking 2012, 2012:13 " pptx

... vehicular networks The design of the proposed testbed for VDTN networks is presented in Section Section focuses on the performance evaluation and validation of the proposed testbed Section concludes ... testbed demonstration This section focuses on the testbed demonstration and performance evaluation of IP over VDTNs and considers two sections...

Ngày tải lên: 21/06/2014, 17:20

50 395 0
application-aware cost function and its performance evaluation over scalable video conference services on heterogenous networks

application-aware cost function and its performance evaluation over scalable video conference services on heterogenous networks

... cost function Conventional cost functions are either empirical or heuristic Among all available cost functions for ALM routing that we have found, neither of them has a mathematical derivation ... three-variable cost function may build a worse multicast tree than the two-variable cost function of only bandwidth and delay Therefore, a N-variable cost function with N ≥ sho...

Ngày tải lên: 08/07/2014, 17:08

5 260 0
AN0736   an I2CTM network protocol for environmental monitoring

AN0736 an I2CTM network protocol for environmental monitoring

... receive logic and waits for the next START condition For many I2C peripherals, such as non-volatile EEPROM memory, an I2C write operation and a read operation are done in succession For example, ... will be performed The MSb of the DATA_LEN byte performs a similar function for the network protocol as the R/W bit in the I2C address byte, but the two should not be confused The for...

Ngày tải lên: 11/01/2016, 11:35

97 214 0
On Inferring Application Protocol Behaviors in Encrypted Network Traffic doc

On Inferring Application Protocol Behaviors in Encrypted Network Traffic doc

... are interested in determining which protocol generated what connections in the network, at other times one may simply be interested in determining whether or not connections belong to a target protocol ... on stepping stone detection By correlating the timing of on/ off periods in inbound and outbound interactive connections, Zhang and Paxson (2000b) demonstrate how to detect...

Ngày tải lên: 28/03/2014, 22:20

25 235 0
w