Results 71 to 80 of about 293,248 (192)

A constant-time chunking algorithm for packet-level deduplication

open access: yesICT Express, 2019
Redundancy elimination or deduplication over network packets requires significant computing resources to find basic units of repeated contents, called chunks, by checking every byte in every packet.
MyungKeun Yoon
doaj   +1 more source

Rateless-Coding-Assisted Multi-Packet Spreading over Mobile Networks

open access: yes, 2014
A novel Rateless-coding-assisted Multi-Packet Relaying (RMPR) protocol is proposed for large-size data spreading in mobile wireless networks. With this lightweight and robust protocol, the packet redundancy is reduced by a factor of $\sqrt n$, while the ...
Dai, Huaiyu   +2 more
core   +1 more source

Research to Avoid the Energy Hole Problem in the Wireless Sensor Network that Different Data Generation Rate in Different Regional

open access: yesDianxin kexue, 2013
The energy hole problem that different data generation rate in different regional in wireless sensor network was studied, using ring network model. Based on this, two kinds of mechanism were defined, which are the data transmitted in the same ring but ...
Mingsheng Liu, Sen Miao, Yan Li
doaj   +2 more sources

Packet Multicast in Cognitive Radio Ad Hoc Networks: A Method Based on Random Network Coding

open access: yesIEEE Access, 2018
This paper studies packet multicast technology in cognitive radio ad hoc networks (CRAHNs) by using a random network coding (RNC)-based approach. We first specify the key problem of packet multicast applications in CRAHNs, called multichannel single-hop ...
Bingcai Chen   +7 more
doaj   +1 more source

Efficient and reliable packet transfer protocol for wireless multihop bidirectional communications

open access: yesInternational Journal of Distributed Sensor Networks, 2018
In wireless multihop bidirectional communication environment, there is a possibility that packet collision and retransmission owing to the hidden node problem decrease efficiency of throughput. The aim of this article is to achieve efficient and reliable
Yumi Takaki   +6 more
doaj   +1 more source

Anomalous network packet detection

open access: yes, 2020
Geçen on yıllık dönemde anomal ağ paketlerinin Saldırı Tespit Sistemlerini (STS) iyileştirmek amacıyla yoğun araştırmalar yapılmıştır. İki türden STS mevcuttur. Birincisi imzaya dayalı tespit sistemidir. Bu sistem, ağ paketlerini tarayarak ve bunları önceden gözlemlenen saldırılara karşı, insan kaynaklı imzalarla karşılaştırarak saldırıları tespit ...
openaire   +2 more sources

Network packet capture oriented INIC design and implementation

open access: yesTongxin xuebao, 2006
As the rapid growth of network bandwidth,the capability of packet capture has became the bottleneck of whole network security system.To increase the capability of packet capture and decrease the system overhead,a packet capture oriented INIC was proposed.
ZHANG Pan-yong1   +3 more
doaj   +2 more sources

XMILE:An XML-based approach for programmable networks [PDF]

open access: yes, 2001
In this paper we describe an XML-based platform for dynamic active node policy updates. XML supports the definitionof specific policy languages, their extension to satisfy new needs and the management of deployed policies on differentactive nodes.
de Meer, H, Emmerich, W, Mascolo, C
core   +2 more sources

Research advance in packet loss processing techniques for VoIP

open access: yesTongxin xuebao, 2007
The main reasons of packet loss were described and the related techniques of packet loss were introduced.Packet loss processing techniques,which include packet loss concealment and packet loss recovery,were used to recover and conceal the packet loss.And
LI Ru-wei, BAO Chang-chun
doaj   +2 more sources

Delay-Energy lower bound on Two-Way Relay Wireless Network Coding [PDF]

open access: yes, 2014
Network coding is a novel solution that significantly improve the throughput and energy consumed of wireless networks by mixing traffic flows through algebraic operations. In conventional network coding scheme, a packet has to wait for packets from other
Chen, Wei, Zeng, Hongyi
core  

Home - About - Disclaimer - Privacy