نتایج جستجو برای: traffic functionality
تعداد نتایج: 151788 فیلتر نتایج به سال:
Discrete packet level simulation of optical networks poses a significant challenge in that the number of events involved in the process are so large that the simulation times become unacceptably long. Given that 85%-90% of Internet traffic is based on TCP and that the protocol’s performance is a function of Round Trip Time (RTT) and the congestion in the network, it is necessary to include TCP ...
Current efforts to provide distinct levels of quality-of-service in the Internet are concentrated on the Differentiated Services (DS) approach. In order to investigate the gain for users of those differentiated services, early experiences with implementations with respect to real applications are needed. Simulation models are often not sufficient if a judgement of the behavior under realistic t...
Internet behavior is becoming more complex due to everchanging networking technologies and applications. Thus, understanding and controlling the complex behavior of the Internet are important for designing future networks. One of the complex behaviors of the Internet is traffic dynamics. Previous studies revealed that flow control in the transport layer affects the traffic dynamics of the Inter...
Smart mobile devices have displaced personal computers in many daily applications such as internet browsing and email. However, for content creation, users still need to use a large display, keyboard and mouse. Many initiatives are currently working on enabling I/O functionality for content creation and peripheral access, and on preserving the grab-and-go experience where the mobile device is n...
Simulating and understanding traffic dynamics in large networks are difficult and challenging due to the complexity of such networks and the limitations inherent in simulation modeling. Typically, simulation models used to study traffic dynamics include substantial detail representing protocol mechanisms across several layers of functionality. Such models must be restricted in space and time in...
LOADng is an on-demand routing protocol, derived from AODV, simplified for use in lossy, low-power and constrained environments, where the ability for devices to communicate is a commodity to their primary function, and where therefore not only the communications channel offers limited capacity, but also the resources available to the device’s communications subsystem are limted. LOADng simplif...
Security policies play a critical role in many of the current network security technologies such as firewalls, IPSec and IDS devices. The configuration of these policies not only determines the functionality of such devices, but also substantially affects their performance. The optimization of filtering policy configuration is critically important to provide high performance packet filtering pa...
As dependence on the World Wide Web continues to grow, so does the need for businesses to have quantitative measures of the client perceived response times of their Web services. We present ksniffer, a kernel-based traffic monitor capable of determining pageview response times as perceived by remote clients, in real-time at gigabit traffic rates. ksniffer is based on novel, online mechanisms th...
In networked driving simulation, two or more human drivers participate interactively within a shared virtual environment. Thereby, typical applications of driving simulation can be extended to consider multi-driver scenarios, where a much closer approximation of reality with its unpredictability is achieved. However, the utilized network is typically prone to a considerable amount of message tr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید