The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This amendment to IEEE Std 802.3-2015 specifies additions to and appropriate modifications to add support for interspersing express traffic over a single physical link.
Ethernet Media Access Control (MAC) parameters, Physical Layer specifications, and management objects for the transfer of Ethernet format frames at 2.5 Gb/s and 5 Gb/s over balanced twisted-pair transmission media used in structured cabling are defined in this amendment to IEEE Std 802.3-2015.
MAC-independent Link Aggregation capability and general information relevant to specific MAC types are defined in this standard. Link Aggregation allows parallel full-duplex point-to-point links to be used as if they were a single link and also supports the use of multiple links as a resilient load sharing interconnect between multiple nodes in two separately administered networks.
The Management Information Base (MIB) module specifications for IEEE Std 802.3, also known as Ethernet, are contained in this standard. It includes the Structure of Management Information Version 2 (SMIv2) MIB module specifications formerly produced and published by the Internet Engineering Task Force (IETF), and the Guidelines for the Definition of Managed Objects (GDMO) MIB modules formerly specified...
The variety of telecommunications services in their competitive market has forced telecommunications service providers to increase their network management capabilities and integrate its operations in order to reduce costs and raise customer satisfaction. Standardization organizations have recommended some issues in this regard. In this paper the network management problems of a telecommunications...
MAC-independent Link Aggregation capability and general information relevant to specific MAC types are defined in this standard. Link Aggregation allows parallel full-duplex point-to-point links to be used as if they were a single link and also supports the use of multiple links as a resilient load sharing interconnect between multiple nodes in two separately administered networks.
Environmental testing requirements are defined for communications networkingdevices to be installed in transmission and distribution facilities. This standard establishes acommon reproducible basis for designing and evaluating devices utilizing radio frequency (RF) upto 6 GHz, power line communications, and broadband over power line (BPL) technologies. It alsorequires immunity to five IEC electromagnetic...
Wireless Access in Vehicular Environments (WAVE) is specified in the IEEE 1609 family of standards, within which a number of identifiers are used. This document describes the use of these identifiers, indicates identifier values that have been allocated for use by WAVE systems, and specifies the allocation of values of identifiers specified in the WAVE standards.
This revision specifies technical corrections and clarifications to IEEE Std 802.11 for wireless local area networks (WLANS) as well as enhancements to the existing medium access control (MAC) and physical layer (PHY) functions. It also incorporates Amendments 1 to 10 published in 2008 to 2011.
Conventional base station design does not longer fulfill network needs. New demand for energy efficiency, scalability, support for varying traffic load, flexibility in provided features and adoption to novel network architectures forces the “Plain Old Base Station” to change. Sophisticated modularization promises solution for the most of mentioned criteria. This paper presents a concept of a modular...
A mechanism for prioritization of management frames is provided and a protocol to communicate management frame prioritization policy is specified in this amendment.
The format and applications of NetFlow data are introduced here, and a NetFlow data acquisition programming module based on Linux is also designed. This programming module can collect NetFlow data through routers in network, and sent them to database for storage after processing them. These data can provide data support for all kinds of network application programming, such as network monitoring,...
Translating between network management policies is desirable if a system needs to map downwards from a high-level objective to low-level configurations or to feed information back upwards from a network event to a matching policy. Techniques for policy translation require elements of semantic mapping between levels of management policy within a continuum. The policy translation is difficult due to...
The following topics are dealt with: wireless communications and networking WCN/WLAN/WiMAX; optical communications and networking OCN; mobile communications/wireless/mobility; mobile ad-hoc and sensor mesh networks; network management and services; UWD/RFID/OFDM and Nano/Bio, and; quality of service, traffic management and dynamic spectrum access networks.
To realize the real network system is always the most costing or unpractical during the research of wireless network. Simulating network algorithms by using Network Simulation 2 (NS2) is one of valid and economical research methods. In this paper, a new buffer management algorithm in wireless network is proposed and implemented based on NS2. The test results show the feasibility and effectiveness...
The security aspect of wireless sensor networks has taken the attention of numerous researchers in the past several years. It has recently been proven that public keys are now feasible in wireless sensor networks but still consume a lot of processing time and memory. In this paper we propose the use of public keys based on ECC to exchange symmetric keys that will be used to encrypt communications...
In recent days, optical fibers have been developed as a transmission medium to carry traffic in order to provide various services in telecommunications platform. Failure of this fibre caused loss of data which can interrupt communication services. Thus, this paper will focus about protection scheme in order to guarantee the survivability of the networks. Besides, the scheme should provide better quality...
Sensornets are often deployed into inaccessible, dangerous, or changeable physical environments. Centralised control and management is generally infeasible. Autonomous, self-configuring, and self-managing mechanisms are required to provide a suitable infrastructure which reliably supports distributed applications, hiding any underlying instability. The Lightweight Integrated Protocol Suite (LIPS)...
Nowadays, mobile communication has become an essential for the human life. On the other hand, there is a booming in the developed technologies. So, the operators are facing a lot of problems for best utilizations of the operation of coexisting radio access technologies (RATs) that they may have. The RAT selection algorithm is one of the key research areas in Common Radio Resource Management (CRRM)...
In this paper, an efficient key management scheme based on public key elliptic curves signcryption (ECS) scheme for Wireless Sensor Networks (WSN) has been proposed. The proposed algorithm is compared with the scheme given in. For 250 cluster node, the saving in the total number of operations, key storage requirements, energy consumptions, and communication overhead are 75%, 96%, 23.79 m Joule, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.