Πλοήγηση ανά Θέμα "Internet protocols"
Αποτελέσματα 1-20 από 21
-
An architecture for secure VoiIP and collaboration applications
(2007)VoIP and collaboration Internet applications are a driving force for the use and expansion of the Internet. Current applications usually require end user registration in a central user database, which in turn provides ... -
Collision-free distributed MAC protocol for passive optical intra-rack data center networks
(2022)In this paper, we present a distributed medium access control (MAC) protocol and a network architecture suitable for optical intra-rack data center networks (DCNs). The intra-rack communication is performed using passive ... -
Design and implementation of a VIPSec based application
(2007)Voice over IP (VoIP) is one of the most emerging technologies, while a respectable number of corresponding applications are being implemented or updated in daily basis. Although communications security is a constant ... -
Development of Wireless embedded system using ZigBEE protocol to avoid white Gaussian noise and 50 Hz Power line noise in ECG and Pressure Blood signals
(2008)Electrocardiogram (ECG) and Pressure blood is a main source for doctors to diagnose the health condition and pathology of heart. The magnitudes of ECG signals are usually approximate 1mV. The Electrocardiogram signals are ... -
Direct numerical simulation of dynamo transition for nonhelical MHD
(2010)Pseudospectral Direct Numerical Simulation (DNS) has been performed to simulate dynamo transition for nonhelical magnetohydrodynamics turbulence. The numerical results are compared with a recent low-dimensional model [Verma ... -
A dynamic integer programming approach for free flight air traffic management (ATM) scenario with 4D-trajectories and energy efficiency aspects
(2020)The growth in demand for air transport has generated new challenges for capacity and safety. In response, manufacturers develop new types of aircraft while airlines open new routes and adapt their fleet. This excessive ... -
Enabling ITS real world experimentation in NITOS future internet facility
(2014)Inter-Vehicle Communication is expected to be widely adopted during the next years by the car industry, enabling Vehicle-to-Vehicle and Vehicle-to-Infrastructure communication targeting at safer commuting. Therefore, the ... -
Enabling sensing and mobility on wireless testbeds
(2012)The inherent inability of simulation models to adequately express factors such as wireless signal propagation etc., can lead to incomplete evaluation of wireless protocols and applications. Thus, testing of proposed schemes ... -
An experimental framework for data gathering and analysis in wireless sensor networks
(2011)In the last decade testbeds have been set-up to evaluate network protocols and algorithms under realistic settings. Moreover, wireless sensors have lately been integrated into testbeds in order to simulate application ... -
Exploiting trust, influence, and physical proximity for improving routing performance in vehicular ad hoc networks: The SCALE protocol
(2022)Vehicular ad hoc networks (VANETs) are receiving increased attention, and several routing protocols have been proposed already by the research community. In such a framework, social aspects and human mobility are important ... -
Federated Learning Protocols for IoT Edge Computing
(2022)In this article, we provide a set of federated learning (FL) protocols for future Internet architectures, which integrate the edge computing with the Internet of Things (IoT) known as 'IoT edge computing.' The proposed ... -
A federated machine learning protocol for fog networks
(2021)In this paper, we present a federated learning (FL) protocol for fog networking applications. The fog networking architecture is compatible with the Internet of Things (IoT) edge computing concept of the Internet Engineering ... -
Forging client mobility with OpenFlow: An experimental study
(2016)The wide proliferation of IEEE 802.11 compatible devices and the provisioning of costless Internet connectivity in most cases, have created fertile ground for investigating seamless client mobility and handoff management ... -
Interference decoding in cellular wireless relay networks with space-time coding
(2016)In this paper we propose a cooperative protocol and a symbol decoding algorithm that target improved performance in the presence of inter-cell interference (ICI) in wireless cellular networks. Our scheme uses the wireless ... -
Mobility work re-visited not considered harmful
(2011)The Internet is a universal source of information for its users. However, obtaining desired content has become the main focus of interest rather than the communication with machine endpoints. The increased availability of ... -
OpenFlow enabled Integrated Routing and Bridging over Ethernet Virtual Private Networks
(2020)Ethernet Virtual Private Network is an emerging Data Center Interconnect technology, which relies on Multiprotocol BGP and an encapsulation protocol over IP, such as Virtual Extensible LAN. It enables the creation of Layer ... -
A Scalable Optical Intra-Cluster Data Center Network with an Efficient WDMA protocol: Performance and Power Consumption Study
(2021)Optical switching technology arises as the dominant technology for data center networks (DCNs), grace to its inherent capability to serve time-sensitive traffic with low power consumption. In this study, we introduce an ... -
A secure VoIP conference system: Architecture analysis and design issues
(2007)In this paper we present the architectural design of a secure VoIP conference system for mobile devices, which is using the strong security mechanisms of the Z Real Time Transport Protocol (ZRTP). We also provide implementation ... -
Software-defined optical intra-data center network and access control Strategy
(2022)The continuously emerging cloud services provide an unprecedented traffic growth into the large-scale data centers (DCs) globally. In this paper, we introduce an optical DC network (DCN) architecture to organize the servers ... -
Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification
(2006)Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...