نتایج جستجو برای: local area network

تعداد نتایج: 1648518  

1997
Sunghyun Choi Kang G. Shin

A wireless local area network (WLAN) or a cell with quality-of-service (QoS) guarantees for various types of traac is considered. A centralized (i.e., star) network is adopted as the topology of a cell which consists of a base station and a number of mobile clients. Dynamic Time Division Duplexed (TDD) transmission is used, and hence, the same frequency channel is time-shared for downlink and u...

Journal: :CoRR 2017
Ludovic Barman Italo Dacosta Mahdi Zamani Ennan Zhai Bryan Ford Jean-Pierre Hubaux Joan Feigenbaum

Popular anonymity protocols such as Tor [15] provide low communication latency but are vulnerable to trafficanalysis attacks that can de-anonymize users. Traffic-analysis resistant protocols typically do not achieve low-latency communication (e.g., Dissent [58], Riffle [30]), or are restricted to a specific type of traffic (e.g., Herd [34], Aqua [33]). In this paper, we present PriFi, the first...

2009
Judall Levine

We have completed thefirst tests of a method to synchronize the clocks of networhd computers to the NIST time scale. The method uses a server computer to dkseminate the time to other clients on the same local-ureu network. The server is synchronized to NZST wing the ACTS protocol over a dial-up telephone line. The software in both the server and the clients comtructs a statistical model of the ...

1999
Ethem M. Sozer Milica Stojanovic John G. Proakis

An underwater acoustic (UWA) local area network (LAN) is designed and tested using Opnet's Radio Modeler. The network consists of master and sensor nodes that will be deployed in sea with battery powered modems. We modeled the UWA channel using the Radio Transceiver Pipeline stages supplied with Opnet. Since the network nodes are stationary, we assumed that channel is slowly varying and stays c...

Journal: :MONET 1998
Se Hyun Park Aura Ganz Zvi Ganz

As Wireless Local Area Networks (WLANs) are rapidly deployed to expand the eld of wireless products, the provision of authentication and privacy of the information transfer will be mandatory. These functions need to take into account the inherent limitations of the WLAN medium such as limited bandwidth, noisy wireless channel and limited computational power. Moreover, some of the IEEE 802.11 WL...

2001
Pier Luca Montessoro Davide Pierattoni

New communication technologies are being developed and new requirements from users are growing, Since advances in fiber optics provide high link capacity at low cost. Traditional solutions are based on processing resources of hosts and network nodes in order to optimize link utilization. A simpler and lightweight solution could be reached by a new approach in designing the network protocols; ou...

2001
Mustafa Ergen Anuj Puri

The idea of extending Mobile IP capabilities to ad-hoc networks introduces fast agent discovery, increases cell coverage of access points, and extends ad-hoc network size by providing connection to the Internet. We aim to show that an adaptive protocol is required since different protocols are optimum for different environments. We propose two protocols called MEWLANA-TD and MEWLANA-RD based on...

2005
William P. D’Amico Mark H. Lauss

n the late 1990s, the U.S. Army’s Yuma Proving Ground (YPG) adapted wireless local area network technologies to provide test data acquisition over a large portion of that test range. YPG implemented a ground-based infrastructure that supplies two-way wireless network connectivity and seamless data acquisition for multiple, simultaneous test activities and data sources. YPG and APL, under the Tw...

1995
K. H. Kim Carlos Serro

This paper proposes a formal definition of the robustness property which, we believe, developers of future real-time (RT) local area network (LAN) protocols must aim to realize. A s a demonstration of the utility of this definition, the Carrier Sense Mult iple Access with Deterministic Collision Resolution (CSMA/DCR) protocol is then analyzed for its robustness and an extension of the CSMA/DCR ...

Journal: :Computer Networks 1986
William T. Marshall Samuel P. Morgan

We . have analyzed a ·· week's worth of . data traffic on a DATAKIT* Virtual Circuit Switch network at AT&T Bell Laboratories. The network includes 5 nodes connecting 22 host computers . and 226 terminals, with trunks to nodes elsewhere at Bell Laboratories. Users are predominantly researchers using t):1e UNIXt operating system via teletypewriter terminals and diskless work stations at 9.6 kb/s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید