Results 71 to 80 of about 293,248 (192)
A constant-time chunking algorithm for packet-level deduplication
Redundancy elimination or deduplication over network packets requires significant computing resources to find basic units of repeated contents, called chunks, by checking every byte in every packet.
MyungKeun Yoon
doaj +1 more source
Rateless-Coding-Assisted Multi-Packet Spreading over Mobile Networks
A novel Rateless-coding-assisted Multi-Packet Relaying (RMPR) protocol is proposed for large-size data spreading in mobile wireless networks. With this lightweight and robust protocol, the packet redundancy is reduced by a factor of $\sqrt n$, while the ...
Dai, Huaiyu +2 more
core +1 more source
The energy hole problem that different data generation rate in different regional in wireless sensor network was studied, using ring network model. Based on this, two kinds of mechanism were defined, which are the data transmitted in the same ring but ...
Mingsheng Liu, Sen Miao, Yan Li
doaj +2 more sources
Packet Multicast in Cognitive Radio Ad Hoc Networks: A Method Based on Random Network Coding
This paper studies packet multicast technology in cognitive radio ad hoc networks (CRAHNs) by using a random network coding (RNC)-based approach. We first specify the key problem of packet multicast applications in CRAHNs, called multichannel single-hop ...
Bingcai Chen +7 more
doaj +1 more source
Efficient and reliable packet transfer protocol for wireless multihop bidirectional communications
In wireless multihop bidirectional communication environment, there is a possibility that packet collision and retransmission owing to the hidden node problem decrease efficiency of throughput. The aim of this article is to achieve efficient and reliable
Yumi Takaki +6 more
doaj +1 more source
Anomalous network packet detection
Geçen on yıllık dönemde anomal ağ paketlerinin Saldırı Tespit Sistemlerini (STS) iyileştirmek amacıyla yoğun araştırmalar yapılmıştır. İki türden STS mevcuttur. Birincisi imzaya dayalı tespit sistemidir. Bu sistem, ağ paketlerini tarayarak ve bunları önceden gözlemlenen saldırılara karşı, insan kaynaklı imzalarla karşılaştırarak saldırıları tespit ...
openaire +2 more sources
Network packet capture oriented INIC design and implementation
As the rapid growth of network bandwidth,the capability of packet capture has became the bottleneck of whole network security system.To increase the capability of packet capture and decrease the system overhead,a packet capture oriented INIC was proposed.
ZHANG Pan-yong1 +3 more
doaj +2 more sources
XMILE:An XML-based approach for programmable networks [PDF]
In this paper we describe an XML-based platform for dynamic active node policy updates. XML supports the definitionof specific policy languages, their extension to satisfy new needs and the management of deployed policies on differentactive nodes.
de Meer, H, Emmerich, W, Mascolo, C
core +2 more sources
Research advance in packet loss processing techniques for VoIP
The main reasons of packet loss were described and the related techniques of packet loss were introduced.Packet loss processing techniques,which include packet loss concealment and packet loss recovery,were used to recover and conceal the packet loss.And
LI Ru-wei, BAO Chang-chun
doaj +2 more sources
Delay-Energy lower bound on Two-Way Relay Wireless Network Coding [PDF]
Network coding is a novel solution that significantly improve the throughput and energy consumed of wireless networks by mixing traffic flows through algebraic operations. In conventional network coding scheme, a packet has to wait for packets from other
Chen, Wei, Zeng, Hongyi
core

