• No results found

layer protocols

010005 00 Apollo Token Ring Media Access Control Layer and Physical Layer Protocols Oct87 pdf

010005 00 Apollo Token Ring Media Access Control Layer and Physical Layer Protocols Oct87 pdf

... Apollo Token Ring Media Access Control Layer and Physical Layer Protocols... Apollo Token Ring Media Access Control Layer and Physical Layer Protocols Order No.[r] ...

29

A Survey of Transport Layer Protocols for Wireless Sensor Networks

A Survey of Transport Layer Protocols for Wireless Sensor Networks

... transport layer protocols in general wired-cum-wireless and in wireless sensor ...link layer retransmissions, splitting TCP across proxy, distributed TCP caching and retransmissions as well as ...

7

Comparative Study of MAC Layer Protocols in Wireless Sensor Networks: A Survey

Comparative Study of MAC Layer Protocols in Wireless Sensor Networks: A Survey

... MAC layer protocols we need to give stress on energy efficiency ...new protocols are being developed to provide multi-task support and efficient delivery of bursty ...MAC layer protocol is an ...

7

A Review of Link Layer Protocols for Internet of Things

A Review of Link Layer Protocols for Internet of Things

... link layer designs of ...link layer protocols that are used in IoT grouped by short and long distance ...range protocols, this article study the following: Radio Frequency Identification ...

7

Survey on Transport Layer Protocols: TCP & UDP

Survey on Transport Layer Protocols: TCP & UDP

... transport layer protocols have been studied and analysed from the QoS (Quality of Service) point of ...main protocols of transport layer (TCP and ...transport layer protocols ...

6

Cross-Layer Protocols For Mobile Ad-Hoc Networks

Cross-Layer Protocols For Mobile Ad-Hoc Networks

... There are several essential issues in adhoc wireless networks. Most adhoc wireless community programs use commercial, scientific and Medical (ISM) band that is unfastened from licensing formalities. Since wireless is a ...

5

Cross-layer Protocols for Mobile Ad-hoc networks

Cross-layer Protocols for Mobile Ad-hoc networks

... routing layer. Sharing of cross-layer cache is ...pass- layer cache can be utilized to set up a backup route to reduce the packet losses due to hyperlink ...routing layer share the ...

5

2784 OSI Transport and Session Layer Protocols pdf

2784 OSI Transport and Session Layer Protocols pdf

... By tailoring the functions provided by the protocol class according to the services provided by the Network Layer, the Transport Layer Protocol can provide constant Transport Layer Servi[r] ...

16

Energy Optimization using Cross Layer Protocols in Wireless Sensor Networks

Energy Optimization using Cross Layer Protocols in Wireless Sensor Networks

... routing protocols for VBR ...routing protocols being considered in IEEE ...routing protocols DSDV, AODV and ...routing protocols AODV, DSR, DYMO, ANODR for CBR ...

5

2785 OSI Upper Layer Protocols pdf

2785 OSI Upper Layer Protocols pdf

... The Virtual Tenninal Basic Class Service offers the following services to the VT-user: a the means to establish a VT-association between two peer VT-users for the purpose of enabling Vir[r] ...

22

A Survey of MAC Layer Issues and Application layer Protocols for Machine to Machine Communications

A Survey of MAC Layer Issues and Application layer Protocols for Machine to Machine Communications

... main factors, which are: 1) the fact that many of the devices in M2M networks are expected to be battery operated and thus power constrained; 2) the economic impact (such as operational costs and profit margins) of the ...

6

VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS

VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS

... transport layer rather than routing protocols, so these defences are not ...above. Protocols that define security in terms of path discovery success, ensuring that only valid network paths are found, ...

6

Internet of Things Application Layer Protocol: Comparison of CoAP and MQTT

Internet of Things Application Layer Protocol: Comparison of CoAP and MQTT

... Interoperable protocols tend to provide seamless interconnection with format perseverance of any communicated ...application layer of communication model and thus two widely used application layer ...

5

An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

... internet protocols, transport layer protocols, routing and mac layer protocols, internet of things (IoT) and internet of vehicles (IoV); metaheuristic optimization: fuzzy logic systems, ...

16

IJCSMC, Vol. 2, Issue. 11, November 2013, pg.331 – 338 RESEARCH ARTICLE An Enhanced Security for TCP/IP Protocol Suite

IJCSMC, Vol. 2, Issue. 11, November 2013, pg.331 – 338 RESEARCH ARTICLE An Enhanced Security for TCP/IP Protocol Suite

... application layer protocols Second aspect of the work was to enhance the security for the internet control message protocol which is one of the main protocols that was used by the network managers ...

8

Impact of MAC Layer on AODV and LAR Routing Protocols in MANETs

Impact of MAC Layer on AODV and LAR Routing Protocols in MANETs

... Link Layer (layerl-2 of the OSI reference model), this protocol is used for provide channel access mechanism when multiple users are trying to access the single channel ...MAC protocols are ...routing ...

5

Energy Efficient Protocols for Wireless Sensor Networks: A Survey and Approach

Energy Efficient Protocols for Wireless Sensor Networks: A Survey and Approach

... CONCLUSION AND FUTURE WORK In this paper, we have studied several energy efficient MAC layer and routing layer protocols for wireless sensor networks and deeply analyzed the problem for [r] ...

7

Title: Cross Layer Design Approach for Future MANET Applications

Title: Cross Layer Design Approach for Future MANET Applications

... cross layer interaction based solutions: Functionally, the two neighboring layers namely physical and medium access are closely related due to which most of the protocols suggested for directionally enabled ...

8

A Review of Cross Layer Design for Routing Protocols in MANET

A Review of Cross Layer Design for Routing Protocols in MANET

... Cross Layer Design (CLD) approach is used to design a reliable routing protocol for ...Routing protocols are found to meet the ...reactive protocols. Proactive protocols such as DSDV ...

7

Title: Security and Privacy Challenges in the Internet of Things

Title: Security and Privacy Challenges in the Internet of Things

... routing protocols used in the network layer of IoT are similar to the network layer of standard Internet; however, the network layer of IoT is specified towards low-power and lossy ...

7

Show all 10000 documents...

Related subjects