The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multicast communication in the internet has been growing rapidly over the last few years. Internet applications transmit data from one sender to many receivers, In Multicast protocols while packet broadcasts to a group of receivers the total numbers of packets swamped in a network decrease. Multicast communication reduces both the time it takes to send data to a large no of receivers and the amount...
In this paper, we propose new demapping scheme for the 16-APSK modulation, which reduces the computational complexity of demapping process. Compared to existing soft demapping methods, which calculate a decision metric for each constellation point, and hard demapping, which need a detailed look-up table, the new technique needs a short look-up table and no decision metric is needed to be calculated,...
A flooding which is one of the packet transmission methods broadcasts a packet to all nodes within a transmission range and can guarantee a short delay. However, the fundamental flooding algorithm has a shortcoming that causes excessive traffic because all nodes transmit a packet at least once. In this paper, we propose a totally fresh approach to constrain duplicate transmission by searching neighboring...
This research presents a design of "architecture and protocols" for the LAN security preventing the process of MAC Address spoofing, ARP Spoof and MITM. Each Network Card is designed to have a Certificate, a Private Key and a Public Key, all of which are issued by the product vendor. A certificate is in a form of software-data which may be available in the Card Network package, or can be...
In optimal QoS provisioning all traffic flows are distributed among LSPs (label switching path) related to service classes. The congestion of concurrent flows (traversing the network simultaneously) can appear. For LSP creation the IGP (interior getaway protocol) uses simple on-line routing algorithms (e.g. OSPFS, IS-IS) based on shortest path methodology. In highly loaded networks it becomes insufficient...
The video transmission over 802.11e WLAN can play a major role in the home theater applications that are able to interact with wireless body area network (WBAN). The wireless transmission of high definition (HDTV) and Blu-ray can be serviced around the body area in the residential environment. The optimized QoS control method to transmit the video transmission over WLAN is necessary in order to guarantee...
In this research work, we proposed a new, efficient and compact software based IPv6 packet generator, V6GEN and a new packet classification framework for IPv6 traffics, V6PCF. V6GEN is compact as packet construction support for IPv6 packets in neighbor discovery, automatic tunneling and network mobility are proposed while V6PCF is to provide a platform in designing, implementing and evaluating software...
Packet sniffing is important in network monitoring to troubleshoot and to log network activities which will benefit both the network software engineers and network engineers. In this research work, we specifically designed and implemented a new and efficient software based IPv6 capable packet sniffer, V6SNIFF. Performance analysis has been done on two different approaches which are the libpcap implementation...
In order to meet customer needs (e.g. safety, convenience) in current automotive industry, lots of electronics and software are deployed into vehicles, and this has led to many researches about In-vehicle network. FlexRay is a kind of In-vehicle network protocols and it will likely become de facto standard. However, to be used in vehicles successfully, the response time analysis of a FlexRay message...
WiBro is defined as a subset of the IEEE 802.16 standard and is developed based on the mobile WiMAX. WiBro delivers wireless data with a high transfer rate to provide mobile broadband services. However, it is necessary to consider radio resources efficiency due to limited resources. In this paper, we propose frequency assignment (FA) load balancing algorithm in order to use resources efficiently,...
Congestions in many-to-many videoconferencing are usually caused by multiple senders, the congestion information feedback, bottleneck link judge and sending rate adjust are much different from one-to-many multicasting. In this paper, we propose one multicast congestion control scheme based on end-to-end tomography (ET-MCC) for many-to-many videoconferencing. The end-to-end packet loss rates are measured...
The approximation followed here represents a distributed real-time system (DRTS) as a layered model with a real-time scheduler, based on hierarchical scheduling composition, thus providing the DRTS with larger integrity and flexibility. The utilization of a metric is proposed in order to determine the overall system performance, therefore helping with the design and configuration decisions.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.