نتایج جستجو برای: evolved packet core
تعداد نتایج: 310154 فیلتر نتایج به سال:
Since IP networks are networks of choice due to their widespread footprint, cellular networks like CDMA2000 Packet Data Networks use them as their data network backbone. However, the IP networks are prone to discrepancies like routing loops that might cause service degradation and sometimes end-toend path failures. In CDMA2000 Packet Data Networks, existence of loops between different routers i...
[1] 3GPP TR 21.905 V11.2.0 (2012-09) Vocabulary for 3GPP Specifications [2] 3GPP TR 23.882 V8.0.0 (2008-09) 3GPP System Architecture Evolution: Report on Technical Options and Conclusions [3] 3GPP TS 22.278 V12.1.0 (2012-06) Service requirements for the Evolved Packet System (EPS) [4] 3GPP TR 25.912 V11.0.0 (2012-09) Feasibility study for evolved Universal Terrestrial Radio Access (UTRA) and ev...
The paper describes research progress in technologies and architectures that give hope to deliver truly transparent switching of optical packets. The importance of all-optical packet switching/routing for convergent next generation transport network and in particularly, for QoS packet transfer in core of future generation wireless networks is pointed out. Generic photonic packet switch/router a...
A short microwave pulse is used to ionize a lithium Rydberg wave packet launched from the core at a well-defined phase of the field. We observe a strong dependence on the relative phase between the motion of the wave packet and the oscillations of the field. This phase dependent ionization is also studied as a function of the relative frequency. Our experimental observations are in good qualita...
Packet assembly at the network edge is one solution to reduce high packet rates in core network switches. Literature discusses this topic controversially because of three reasons: (1) potential negative impact of packet assembly on the traffic characteristics, (2) disruptive integration into existing networks and (3) lack of support of packet assembly in existing control plane environment. In t...
Abstract Computer networks target several kinds of attacks every hour and day; they evolved to make significant risks. They pass new trends; these open port available on the network. Several tools are designed for this purpose, such as mapping vulnerabilities scanning. Recently, machine learning (ML) is a widespread technique offered feed Intrusion Detection System (IDS) detect malicious networ...
In this paper, we consider a fluid model of a TCP network consisting of many edge routers directing traffic through a common core link equipped with a small buffer. We are interested in how packet loss at this core router can dynamically couple, and potentially synchronize, the edge traffic. By using concepts from weakly-coupled oscillator theory, we show that synchronization occurs when a so-c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید