Results 11 to 20 of about 844,158 (279)
In this paper we present our work on designing and implementing an ns-3 model for MultiPath TCP (MPTCP). Our MPTCP model closely follows MPTCP specifications, as described in RFC 6824, and supports TCP NewReno loss recovery on a per subflow basis. Subflow management is based on MPTCP's kernel implementation.
Kheirkhah, Morteza +2 more
openaire +6 more sources
Effective action of type II superstring theories at order α′3: NS-NS couplings
Recently, it has been shown that the minimum number of gauge invariant couplings for B-field, metric and dilaton at order α′ 3 is 872. These couplings, in a particular scheme, appear in 55 different structures.
Mohammad R. Garousi
doaj +1 more source
Evaluation of a Long-Distance IEEE 802.11ah Wireless Technology in Linux Using Docker Containers
Wireless technologies are essential for modern people to maintain uninterrupted connection to the Internet. The most popular standards for wireless technologies are standards of the IEEE 802.11 family. Currently, data transmission rate achievable by IEEE
Daniils Aleksandrovs-Moisejs +3 more
doaj +1 more source
Autonomous Underwater Vehicles (AUVs) are seen as a safe and cost-effective platforms for performing a myriad of underwater missions. These vehicles are equipped with multiple sensors which, combined with their long endurance, can produce large amounts ...
Filipe B. Teixeira +9 more
doaj +1 more source
On the Performance of Transport Protocols Over mmWave Links: Empirical Comparison of TCP and QUIC
The extensive availability of spectrum resources and the remarkably high data transmission rate of millimeter-wave (mmWave) technology have propelled its significance as a vital component in the advancement of mobile communications, including fifth ...
Sidna Jeddou +4 more
doaj +1 more source
The Internet is an unsecured public network accessed by approximately half of the world population. There are several techniques, such as cryptography, end-to-end encryption, and tunneling, used to preserve data security and integrity and to reduce ...
Rajitha Tennekoon +2 more
doaj +1 more source
Can We Exploit Machine Learning to Predict Congestion over mmWave 5G Channels?
It is well known that transport protocol performance is severely hindered by wireless channel impairments. We study the applicability of Machine Learning (ML) techniques to predict congestion status of 5G access networks, in particular mmWave links.
Luis Diez +4 more
doaj +1 more source
A New Linear Model for the Calculation of Routing Metrics in 802.11s Using ns-3 and RStudio
Wireless mesh networks (WMNs) offer a pragmatic solution with a cost-effective ratio when provisioning ubiquitous broadband internet access and diverse telecommunication systems.
Juan Ochoa-Aldeán +1 more
doaj +1 more source
Architecture, design and source code comparison of ns-2 and ns-3 network simulators [PDF]
Ns-2 and its successor ns-3 are discrete-event simulators. Ns- 3 is still under development, but offers some interesting characteristics for developers while ns-2 still has a big user base.
Amaya Rodríguez, Claudio Antonio +4 more
core +1 more source
Herein, we propose the use of the logarithmic values of data transmission rates for multi-armed bandit (MAB) algorithms that adjust the modulation and coding scheme (MCS) levels of data packets in carrier-sensing multiple access/collision avoidance (CSMA/
Soohyun Cho
doaj +1 more source

