Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A reverse direction transmission and block acknowledgement are the main features to improve the performance of MAC layer based on next generation wireless LANs. When the data send it in reverse direction from side A to B, side B does not need to send separate ACK, it may wait for a period of time is less than the sender's time of period to avoid the retransmission at sender and send a piggyback frame...
This paper introduced a method for producing massive and immediate result in multi-join query (DAP Join, for short). Mostly previous research are based on single join operator while DAP join is based on multiple join operators. DAP join distinguishes itself from all previous techniques by concluding benefits of Hash Merge join, Rate Based Progressive Join and State Spilling and its own new approach...
All Denial of Service Attacks (DoS) is malignant. Their occurrence in the network affects the entire network performance. Dropping attack either Packet Dropping or Datagram Dropping is DoS in nature. Both these attacks occur corresponding to Transport layer of Mobile Ad hoc Network (MANET) stack which affects the entire functionality of transport layer. In this paper we have discussed a novel kind...
MANETs have some special characteristics such as open network architecture, shared wireless medium and highly dynamic topology which make them much prone to different attacks. Denial of service (DoS) attack, the most common of all, if occurs becomes difficult to detect and defend. One of such attacks is JellyFish attack which is further categorized as JF Reorder Attack, JF Periodic Dropping Attack...
Wireless sensor networks plays a vital role in emerging technologies, but the major problem regarding the sensor nodes is the limited energy provided. In order to utilize the energy efficiently a MAC protocol with duty cycle mechanism is being adopted to reduce idle listening problem by periodically putting the sensors to sleep and waking up. It is important to understand which type of duty cycled...
Mobile ad hoc network is coordinated without fixed infrastructure. In the conservative AODV routing protocol, source node always forwards RREQ (Route Request) packet to neighbour for finding path to the destination node. The intermediary (neighbour) node having less lifetime or energy, as well forwards RREQ and lifetime expires after some certain time, i.e. node goes down; it cannot forward RREP (Route...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.