
Wired / Wireless Internet Communication
Beschreibung
Weitere Details
Weitere Ausgaben
Personen
Inhalt
- Title Page
- Preface
- Organization
- Table of Contents
- Session 1: Virtual Networks and Clouds
- VNEMX: Virtual Network Embedding Test-Bed Using MPLS and Xen
- Introduction
- Related Work
- Architecture Overview
- Resource Discovery
- Resource Reservation
- Implementation Details
- Data Transfer between Virtual Machines
- Evaluation Results
- Virtual Network Creation
- Performance Measurement
- Conclusion
- References
- Towards Large-Scale Network Virtualization
- Introduction
- Virtual Network Provisioning Overview
- Resource Assignment
- Embedding Model and Problem Formulation
- Resource Assignment Algorithm
- Virtual Link Setup
- Evaluation
- Virtual Network Provisioning
- Virtual Link Setup
- Conclusions
- References
- Prometheus: A Wirelessly Interconnected, Pico-Datacenter Framework for the Developing World
- Introduction
- Cloud Services for Rural Areas
- Related Work
- Prometheus Architecture Overview
- Design Aspects
- Components of a Prometheus Node
- The Prometheus Network
- On-Field Performance Analysis
- Wireless Propagation Analysis
- Power Budget Analysis
- Conclusion
- References
- Performance Analysis of Client Relay Cloud in Wireless Cellular Networks
- Introduction and Related Work
- System Model
- Performance Evaluation
- Numerical Results
- Conclusion
- References
- Session 2: Multimedia Systems
- Periodic Scheduling with Costs Revisited A Novel Approach for Wireless Broadcasting
- Introduction
- Related Work
- Analysis of the Proposed Scheduling Scheme
- Comparison with Related Work
- Conclusion
- References
- More for Less Getting More Clients by Broadcasting Less Data
- Introduction
- Notation and Standard Assumptions
- Analysis
- Solvable Data Subsets that Yield Maximum Number of Clients
- Simulation Results
- Conclusion and Future Work
- References
- A Method to Improve the Channel Availability of IPTV Systems with Users Zapping Channels Sequentially
- Introduction
- Related Work
- Impact of Sequential Zapping on IPTV Channel Availability
- Assumptions and Notations
- IPTV User Behavior Modeling
- Simulation Model to Investigate the Channel Availability
- Important Observation from Simulation Experiments
- A Method to Improve Channel Availability in Case of Sequential Zapping
- Analysis of Sequential Channel Zapping
- Principle of the iSD Admission Control Method
- Advantages and Disadvantages of the iSD Method
- Performance Evaluation by Means of Simulation
- Simulation Introduction
- Simulation Results
- Combination with a Recently Proposed TCAC Scheme
- Summary and Outlook
- References
- An Adaptive Bandwidth Allocation Scheme for Data Streaming over Body Area Networks
- Introduction
- Optimal Solution
- The Problem Definition
- Integer Linear Program Formulation
- Adaptive Routing and Bandwidth Allocation Scheme
- Topology Discovery
- Energy-Aware Routing Tree Construction
- Rate and Bandwidth Allocation
- Load Balancing Routing and Energy Usage
- Performance Evaluation
- Conclusion and Future Work
- References
- Session 3: Wireless Sensor Networks and Localization
- EQR: A New Energy-Aware Query-Based Routing Protocol for Wireless Sensor Networks
- Introduction
- A Brief Outline of Related Work
- Energy-Aware Query-Based Routing (EQR)
- Overview
- Initialization Process
- The Update Mechanism
- The Incentive Mechanism
- Performance Evaluation
- Simulation Model
- Simulation Results
- Conclusion
- References
- Performance Evaluation of Reliable Overlay Multicast in Wireless Sensor Networks
- Introduction
- Related Work
- SNOMC Protocol Description
- SNOMC Evaluation
- Protocol Stack
- Simulation Scenario
- Results on Time Consumption
- Results on Number of Transmissions
- Results on Energy Consumption
- Conclusions
- References
- Experimental Comparison of Bluetooth and WiFi Signal Propagation for Indoor Localisation
- Introduction
- Indoor Localisation
- Radio-Based Localisation
- Radio Signal Propagation
- Monitoring Approach
- Evaluation
- Technical Characteristics
- Experiment B: Manufacturing Discrepancies
- Experiment C: Propagation Paths
- Conclusion
- References
- Localization in Presence of Multipath Effect in Wireless Sensor Networks
- Introduction
- Our Contribution
- Related Works
- Basic Idea
- Proposed Localization Algorithm
- System Model
- The Algorithm
- Simulation
- Conclusions
- References
- Session 4: Ad Hoc Networks
- RNBB: A Reliable Hybrid Broadcasting Algorithm for Ad-Hoc Networks
- Introduction
- Related Work
- Reliable Neighbor-Based Broadcasting (RNBB)
- Design Principles
- Algorithm
- Evaluation
- Static Scenarios
- Mobility Scenarios
- Special Scenario
- Conclusion
- References
- Exploiting Opportunistic Overhearing to Improve Performance of Mutual Exclusion in Wireless Ad Hoc Networks
- Introduction
- Network Model
- Token Overhearing Algorithm (TOA)
- Example of Algorithm Operation
- Overview of Token Overhearing Algorithm (TOA)
- Token and Request Overhearing Algorithm (TROA)
- Data Structures, Messages and algorithm procedures
- Simulations
- Conclusion
- References
- MANET Location Prediction Using Machine Learning Algorithms
- Introduction
- Machine Learning Algorithms
- Decision Trees
- Neural Networks
- Support Vector Regression
- Experimental Configuration
- Obtaining the Data
- Matlab Configuration
- Results
- Random Waypoint Model
- Reference Point Group Mobility
- Conclusion
- References
- Cooperative Sensing-Before-Transmit in Ad-Hoc Multi-hop Cognitive Radio Scenarios
- Introduction
- Background and Related Work
- Background
- Related Work
- CoSBT-MAC Description
- Sensing Phase
- Decision Phase
- Additional Remarks
- Evaluation Results
- Achievable throughput
- Protection of Primary Users
- Conclusions
- References
- Session 5: Handover Techniques and Channel Access
- An Evaluation of Vertical Handovers in LTE Networks
- Introduction
- Related Work
- Protocol Design, Experimental Tests and Analysis
- Proxy Mobile IPv6 Plus (PMIPv6+)
- Experimental Tests and Analysis
- Conclusions
- References
- Connection Cost Based Handover Decision for Offloading Macrocells by Femtocells
- Introduction
- Related Works
- Handover for Maximization of the Time Spent in Femtocells
- System Model
- Model for Connection Cost
- Simulation Models
- Results
- Evaluation of the Handover Decision Algorithms
- Optimum CINR Threshold over Connection Cost Ratio
- Conclusions
- References
- Direct Link Assignment Approach for IEEE 802.16 Networks
- Introduction
- Preliminaries
- Signal Propagation Model
- Mobility Model
- Feasible Region Analysis
- Feasible Region in DL Subframe
- Feasible Region in UL Subframe
- Direct Link Assignment (DLA) Approach
- Performance Evaluation
- Concluding Remarks
- References
- Dynamic Contention Resolution in Multiple-Access Channels
- Introduction
- Related Work
- Our Result
- Preliminaries
- Algorithm
- Algorithm Description
- Analysis
- Conclusion
- References
- Session 6: Delay-Tolerant and Opportunistic Networks
- An Assessment of Community Finding Algorithms for Community-Based Message Routing in DTNs
- Introduction
- Message Routing
- Communities for Routing
- Community Finding
- Community Finding Data
- Message Routing Using BubbleH
- BubbleH versus BubbleRAP Evaluation
- Simulation
- Evaluation
- Results
- Conclusion and Future Work
- References
- Routing for Opportunistic Networks Based on Probabilistic Erasure Coding
- Introduction
- Related Work
- Probabilistic Erasure Coding Routing
- Proportional Allocation Method
- The Proposed Allocation Method
- Rules Definition
- Simulation Results
- Simulation Model
- Experiments in General Network Scenarios
- Experiments in Scenarios with Limited Storage Resources
- Conclusions and Future Work
- References
- On the Performance of Erasure Coding over Space DTNs
- Introduction
- Related Work
- Erasure Coding Experimental Protocol
- Experimental Methodology
- Scenario - Parameters
- Performance Metrics
- Experimental Results
- Conclusions - Future Work
- References
- Work-in-Progress Session
- On Passive Characterization of Aggregated Traffic inWireless Networks
- Introduction
- Methodology
- Passive Estimation of Aggregated Traffic Intensity Using PHY-Layer Statistics
- Test-Bed Experiments and Data Gathering
- Randomness and Correlation Analysis
- Modeling and Assessment
- Assessment of the Quality and Accuracy of the Model
- Conclusions
- References
- TCP InitialWindow: A Study
- Introduction
- Analysis Using Simulation
- Settings
- Results
- IW as a Function of TCP Flow-Size
- Conclusions and Future Work
- References
- Performance Evaluation of Bandwidth and QoS Aware LTE Uplink Scheduler
- Introduction
- Bandwidth and QoS Aware Uplink Scheduler
- Time Domain Packet Scheduling
- Frequency Domain Packet Scheduling
- Simulation Results and Analysis
- Conclusion and Outlook
- References
- Voice Quality Improvement with Error Concealment in Audio Sensor Networks
- Introduction
- Voice Coding and Transmission
- Voice Quality Assessment
- Experimental Setup
- Performance Analysis
- Conclusion
- References
- Analysis of the Cost of Handover in a Mobile Wireless Sensor Network
- Introduction
- RI-MAC And Its Optimization
- Handover
- Performance Analysis
- With Handover Support
- Without Handover Support
- Analytical Result and Discussion
- Conclusion
- References
- Optimized Service Aware LTE MAC Scheduler with Comparison against Other Well Known Schedulers
- Introduction
- LTE Scheduling State of the Art
- Optimized Service Aware Scheduler
- QCI Classification
- Time Domain Scheduling
- Frequency Domain Scheduling
- LTE Simulation Model, Configurations and Results
- Conclusion and Outlook
- References
- Invited Session: Delay- and Disruption-Tolerant Networks (DTNs): Scenarios, Applications and Protocols
- Achieving Energy-Efficiency with DTN: A Proof-of-Concept and Roadmap Study
- Introduction
- Related Work
- Energy-Efficient Internetworking Overlay
- DTN Overlay Simulation Model
- Experimental Results
- Varying Bandwidth FTP Transfer
- Varying Target Buffer Occupancy FTP Transfer
- Model Development and Future Work
- Bandwidth Estimation Model
- DTN Agent Model
- Conclusions
- References
- A Novel Security Architecture for a Space-Data DTN
- Introduction
- Background Literature
- Security Architecture
- DTN Data Security
- Conclusions and Future Work
- References
- Cirrus: A Disruption-Tolerant Cloud
- Introduction
- Aims and Objectives
- Research Challenges
- Abiding by the NIST Cloud Computing model definition
- Providing Specialized IaaS, SaaS and PaaS Services for Real-Time, Data Centric Applications.
- Allowing for the Elastic Use of Cloud Services by Ad-Hoc Networks
- Allowing for the Elastic Incorporation of Ad-Hoc Resources in the Cloud
- Conclusions and Future Work
- References
- Reliable Data Streaming over Delay Tolerant Networks
- Introduction
- Related Work
- Bundle Streaming Service Analysis
- Usage Scenario
- Implementation Details and Preliminary Experimental Results
- Conclusion
- References
- Space Mission Characteristics and Requirements to be Addressed by Space-Data Router Enhancement of Space-Data Exploitation
- Introduction
- Space-Data Routers Enhancements
- Application Scenarios
- Demonstrate the Capability of the Space-Data Routers to Extend End-User Access to Space Data. Case: Combining Real-Time/Archived AVHRR HRPT Data from Local HRPT Receiving Stations Worldwide
- Demonstrate the Potential of Exploiting Data from Deep Space and Disseminate It Naturally through Unified Communication Channels. Case: Hyperspectral Images Captured by MEx/OMEGA
- Demonstrate the Sufficiency of DTN Space-Data overlays to Administer Thematic Cross-Mission Space Data
- Demonstrate the Capability of Space-Data Routers to Deliver Efficiently to End-Users Vast Volumes of Data over Terrestrial Internetworks. Case: New Deployments in Space: Sentinels
- Summary
- References
- DTN-tg A DTN Traffic Generator
- Introduction
- DTN-tg Functionality
- DTN-tg Functional Components
- DTN-tg Extended Functionality
- Future Work
- References
- Author Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.