In recent years, opportunities to view streaming flows are increasing. For this reason, it is a problem that various types of communication requests occupy bandwidth. In order to solve such a problem, call admission c...
详细信息
ISBN:
(纸本)9781538636527
In recent years, opportunities to view streaming flows are increasing. For this reason, it is a problem that various types of communication requests occupy bandwidth. In order to solve such a problem, call admission control (CAC) that the total user satisfaction level is maximized by threshold has been proposed [1]. However, focused users in CAC were only new arrival users. In this paper, we assume that some connecting users are altruistic. We show the effectiveness of CAC by considering altruistic behavior.
Underwater wireless sensor network is one of the emerging research areas. Small size sensors are deployed in the deep-sea water. These sensors are constrained with limited, energy, memory, and computing. Sensors are u...
详细信息
作者:
ShilpaDahiya, MamtaVirmani, CharuMriirs
Computer Science And Engineering Faridabad India Mriirs
Computer Science Engineering School Of Engineering And Technology Faridabad India
Cloud computing has developed as a vital technology for offering on-demand computing resources that meet the changing requirements of modern applications. The cloud environment, on the other hand, is especially vulner...
详细信息
advances in networking and computing are moving society towards a cyber space, in which more aspects of our daily lives are being conducted over the Internet. This movement generates concerns regarding trust between t...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
advances in networking and computing are moving society towards a cyber space, in which more aspects of our daily lives are being conducted over the Internet. This movement generates concerns regarding trust between the parties involved in these aspects. Nevertheless, trust is a broad topic and thus it is challenging to define a unified mechanism for evaluating trust in communication networks. This article focuses on presenting a general model of trust in communication networks that is flexible enough to be implemented by a wide range of use cases. The model is based on the concept of trust functions, a type of relationship used to evaluate trust. Trust functions are evaluated between two subjects, based on the action that is about to take place and the objects being affected by that action. We use this model to describe a use case of Trust Enhanced networking and present a discussion regarding trust in communication networks and future challenges.
Internet of things is a new technology which is heavily affecting different aspects of human life. The number of smart devices connecting to IoT and the amount of data gathered or produced by these devices are increas...
详细信息
ISBN:
(纸本)9781538659069
Internet of things is a new technology which is heavily affecting different aspects of human life. The number of smart devices connecting to IoT and the amount of data gathered or produced by these devices are increasing. In order to organize, secure and analyse the IoT data, novel and creative ideas for IoT design and management are required. Software Defined networking is a new and promising paradigm. Its main idea is to decouple the control functions from physical devices and set them inside a logically centralized control layer. In this paper, a distributed approach is proposed for accelerating data management and balancing the load between IoT devices based on SDN principles. The proposed framework makes it possible to apply different management strategies in a distributed manner. Experimental results indicate that our scheme distributes tasks between devices equally and exhibits a reduction in the average turnaround time and the average waiting time and it will improve the processing performance.
The major issue in wireless sensor network (WSN) is the power control since it is impossible to recharge or replace the batteries of the sensors. The sensors transmit at high power to make its transmission successful....
详细信息
ISBN:
(纸本)9781467356930
The major issue in wireless sensor network (WSN) is the power control since it is impossible to recharge or replace the batteries of the sensors. The sensors transmit at high power to make its transmission successful. Transmitting at high power not only reduces the lifetime of the nodes and that of the network, it also introduces excessive interference. Therefore, every node should transmit at minimal power while satisfying the quality of service (QoS) requirements. This paper proposes a power control game with error control coding (ECC) while considering the QoS requirements. The performance of the power control game satisfying QoS delay constraints with Reed Solomon (RS) and Multivariate Interpolation Decoded RS code (MIDRS) code for WSN is evaluated in terms of bit error rate (BER), throughput and delay.
Accompanying dramatic advances in wireless Mesh networking, the demand for advanced mechanisms to employ wireless Mesh networks in public safety continues to grow. However, this special field communication brings new ...
详细信息
ISBN:
(纸本)9781424437092
Accompanying dramatic advances in wireless Mesh networking, the demand for advanced mechanisms to employ wireless Mesh networks in public safety continues to grow. However, this special field communication brings new security challenges. In this paper, we import the expectancy-value theory in cognitive psychology to behavioral evaluation of node and propose a behavioral model named NODE EYE for public safety communication in wireless Mesh networks and exercise the model to reason a variation of station-to-station key agreement protocol. We contend that our model facilitates reasoning about protocols designed for public safety by integrating the behavioral trust and cryptographic aspects of communication in the special field. We illustrate our concept by introducing the key agreement to support the special communication cases associated with the public safety.
The prime objective of a sugar mill is to produce sugar crystals. It is always desirable to yield maximum quantity of rich quality sugar. In this paper, another aspect of sugar mill has been taken up as a case study a...
详细信息
With the advancement of technology and easy accessibility of internet, an enormous amount of audio visual content is generated daily. This multimedia content takes a lot of space and time to be processed which decreas...
详细信息
The main purpose of Software Defined networking (SDN) is to allow network engineers to respond quickly to changing network industrial requirements. This network technology focuses on making network as adaptable and ac...
详细信息
ISBN:
(纸本)9781509030385
The main purpose of Software Defined networking (SDN) is to allow network engineers to respond quickly to changing network industrial requirements. This network technology focuses on making network as adaptable and active as virtual server. SDN is physical separation of control plane from Data plane and control plane is centralized to manage underlying infrastructure. Hence, the SDN permit network administrator to adjust wide traffic flow from centralized control console without having to touch Switches and Routers, and can provide the services to wherever they are needed in the network. As in SDN the control plane is disassociated from underlying forwarding plane, however, susceptible to many security challenges like Denial of Service (DoS) attack, Distributed DoS (DDoS) attack, Volumetric attack. In this paper, we highlight some security challenges and evaluate some security solutions.
暂无评论