Academic literature on the topic 'Wireless communication systems. Wireless application protocol (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless communication systems. Wireless application protocol (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wireless communication systems. Wireless application protocol (Computer network protocol)"

1

Wu, Tsu-Yang, Lei Yang, Zhiyuan Lee, Shu-Chuan Chu, Saru Kumari, and Sachin Kumar. "A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2021 (April 14, 2021): 1–15. http://dx.doi.org/10.1155/2021/5537018.

Full text
Abstract:
The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session-specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross-Abadii-Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.
APA, Harvard, Vancouver, ISO, and other styles
2

Birur Viswanath, Shruti, Thippeswamy Muddenahalli Nagendrappa, and Krishna Rao Venkatesh. "JSMCRP: Cross-Layer Architecture based Joint-Synchronous MAC and Routing Protocol for Wireless Sensor Network." ECTI Transactions on Electrical Engineering, Electronics, and Communications 19, no. 1 (March 22, 2021): 94–113. http://dx.doi.org/10.37936/ecti-eec.2021191.240719.

Full text
Abstract:
The exponential rise in wireless technologies and allied applications has revitalized academia-industries to develop more efficient and economic routing solution to meet Quality-of-Service (QoS) provision. Amongst the major wireless communication systems, Wireless Sensor Network (WSN) is the most sought technology for defense surveillance, healthcare monitoring, industrial monitoring and control, civic and strategic infrastructure surveillance etc. Additionally, the up surge in Internet of Things (IoT) and Machine to Machine (M2M) communication systems too have broadened the horizon for WSNs based communication. However, the parallel increase in communication environment, complex network conditions etc confine efficacy of the classical WSN protocols. Dynamic network and node conditions often force classical protocols to undergo pre-mature link outage, delayed transmission, energy exhaustion and eventual QoS violation. To address such issues enhancing Median Access Control (MAC) and allied routing decision can have vital significance. However major existing efforts either focus on MAC enhancement or routing optimization, even under static WSN topology. Considering it as motive in this paper a highly robust “Cross-layer architecture based Joint-Synchronous MAC and Routing Protocol for WSN communication (JSMCRP)” has been developed. Being cross layer model JSMCRP protocol employs Application Layer, Network Layer, MAC Layer and PHY Layer to perform Network Adaptive MAC scheduling and Dynamic Routing Decision. JSMCRP employs Data Traffic Assessment, Prioritization and Scheduling (DTAPS), Proactive Network Monitoring and Knowledge (PNMK), Dynamic Congestion Index Estimation (DCIE), Adaptive Link Quality, Packet Injection Rate and Cumulative Rank Sensitive Routing Decision (CRSRD) to perform routing decision. Additionally, exploiting dynamic network/node conditions it performs Cognitive MAC scheduling to ensure QoS centric communication over IEEE 802.15.4 protocol stack. JSMCRP exhibited higher PDR, lower PLR and low delay under varying network conditions, suitable for real-time communication over constrained mobile WSN conditions.
APA, Harvard, Vancouver, ISO, and other styles
3

Wei-Wei, Lin, Zeng Hong-Wei, and Jung Yoon Kim. "A Combining Method for Wireless Protocol Conformance Testing: A Empirical Case." Wireless Communications and Mobile Computing 2021 (July 15, 2021): 1–14. http://dx.doi.org/10.1155/2021/6378139.

Full text
Abstract:
Ensuring the consistency of protocol implementation and protocol specification is the basic premise of wireless communication. With the application of wireless communication in more and more fields, the wireless communication environment becomes more and more complex, and the fault coverage of wireless protocol conformance testing is also facing more and more challenges. To solve this problem, this paper uses Finite State Machine (FSM) as a formal description tool for wireless protocols and presents a combining test method based on two test methods with complementary characteristics in the test technologies based on structural coverage and state identification. Then, the paper evaluates the effectiveness of the method based on 14 empirical cases. The experimental results show that the fault coverage of each empirical case can be effectively improved to 100% when the average test cost is only increased by 17.99%.
APA, Harvard, Vancouver, ISO, and other styles
4

Sarang, Sohail, Goran M. Stojanović, Stevan Stankovski, Željen Trpovski, and Micheal Drieberg. "Energy-Efficient Asynchronous QoS MAC Protocol for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2020 (September 24, 2020): 1–13. http://dx.doi.org/10.1155/2020/8860371.

Full text
Abstract:
In recent years, wireless sensor networks (WSNs) have gained significant attention in both industry and academia. In WSNs, each sensor node is normally equipped with a small-size battery with finite capacity. Hence, energy-efficient communication is considered a key factor for the extension of network lifetime. Formerly, a large number of medium access control (MAC) protocols have been proposed to improve energy efficiency to prolong the network lifetime. There are applications that generate different types of data packets and require quality of service (QoS) without any disruption in network operation. Therefore, these applications need an energy-efficient QoS MAC protocol that can support QoS by considering energy efficiency as the primary goal to avoid any failure in the network. This article proposes an energy-efficient asynchronous QoS (AQSen) MAC protocol, called AQSen-MAC. The AQSen-MAC considers different types of data packets and uses two novel techniques: self-adaptation and scheduling to enhance energy efficiency, packet delivery ratio, and network throughput. Furthermore, in the protocol, the receiver adjusts its duty cycle according to the remaining energy to prolong the network operation. Finally, the performance of the AQSen-MAC protocol has been evaluated through detailed simulation using Castalia and compared with MPQ-MAC, PMME-MAC, and QAEE-MAC protocols. The simulation results indicate that the AQSen-MAC protocol significantly reduces the energy consumption at the receiver of up to 13.4%, consumption per bit of up to 3% and improves the packet delivery ratio and network throughput of up to 12% in the network.
APA, Harvard, Vancouver, ISO, and other styles
5

Murgod, Tejaswini R., and S. Meenakshi Sundaram. "A comparative study of different network simulation tools and experimentation platforms for underwater communication." Bulletin of Electrical Engineering and Informatics 10, no. 2 (April 1, 2021): 879–85. http://dx.doi.org/10.11591/eei.v10i2.1466.

Full text
Abstract:
Study of computer networks and their performance parameters like delay, bandwidth utilization, throughput, latency, jittering, and packet loss. have gained significant importance in the recent times. Simulation studies have been preferred for these parameters in computer networks, which in a real time is a difficult task. A network consists of many networking devices as gateways, routers, bridges, wireless access points and hub connected to it. To implement any new protocol or algorithm in a network is costlier and time consuming. Recently lot of research is going on underwater wireless sensor networks (UWSNs). Conducting real time experiments for underwater applications are overpriced, so as an alternative solution for this, we can conduct simulation studies to reduce the cost and quicken the research activities.In this paper we explore the different experimentation platforms and simulation tools available that help the network architects to develop new protocols or do changes to the existing protocol in a productive manner. We classify the tools based on various parameters and provide guidelines for researchers to choose a suitable platform based on their requirements.
APA, Harvard, Vancouver, ISO, and other styles
6

Jimenez, Jose M., José Luis García-Navas, Jaime Lloret, and Oscar Romero. "Architecture and Protocol to Optimize Videoconference in Wireless Networks." Wireless Communications and Mobile Computing 2020 (October 5, 2020): 1–22. http://dx.doi.org/10.1155/2020/4903420.

Full text
Abstract:
In the past years, videoconferencing (VC) has become an essential means of communications. VC allows people to communicate face to face regardless of their location, and it can be used for different purposes such as business meetings, medical assistance, commercial meetings, and military operations. There are a lot of factors in real-time video transmission that can affect to the quality of service (QoS) and the quality of experience (QoE). The application that is used (Adobe Connect, Cisco Webex, and Skype), the internet connection, or the network used for the communication can affect to the QoE. Users want communication to be as good as possible in terms of QoE. In this paper, we propose an architecture for videoconferencing that provides better quality of experience than other existing applications such as Adobe Connect, Cisco Webex, and Skype. We will test how these three applications work in terms of bandwidth, packets per second, and delay using WiFi and 3G/4G connections. Finally, these applications are compared to our prototype in the same scenarios as they were tested, and also in an SDN, in order to improve the advantages of the prototype.
APA, Harvard, Vancouver, ISO, and other styles
7

Ehrlich, Marco, Arne Neumann, Alexander Biendarra, and Jürgen Jasperneite. "Quality-of-Service monitoring of hybrid industrial communication networks." at - Automatisierungstechnik 67, no. 1 (January 28, 2019): 69–78. http://dx.doi.org/10.1515/auto-2018-0057.

Full text
Abstract:
Abstract Today many hybrid (wired & wireless) industrial communication networks with a huge variety of heterogeneous technologies and protocols are present in the manufacturing and automation domain. The increasing requirements regarding e. g., latency, reliability, or determinism create the need for a holistic network management concept in order to assure a network-wide Quality-of-Service (QoS) resource provisioning and the assurance of the admissioned resources. Consequently, a monitoring of the whole network is required to feed the network management system with the needed information about the underlying network processes. Various technical approaches using different methods of extracting the information from network traffic are available for the purpose of QoS parameter observance and measurement at the moment. Therefore, this paper provides a state of the art research about network management and QoS provisioning respectively QoS assurance concepts. In addition, the passive network monitoring approach using the flow export technique based on the Internet Protocol Flow Information Export (IPFIX) is investigated for a utilisation in the nowadays industry domain based on a conceptual case study with a wireless protocol. As a conclusion, an evaluation is performed in order to clarify the limits and the overall usability of IPFIX for the monitoring of industrial networks in order to support future network management systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Hilmani, Adil, Abderrahim Maizate, and Larbi Hassouni. "Hierarchical Protocol Based on Recursive Clusters for Smart Parking Applications Using Internet of Things (IOT)." Wireless Communications and Mobile Computing 2020 (July 13, 2020): 1–21. http://dx.doi.org/10.1155/2020/9179530.

Full text
Abstract:
With the increasing number of vehicles, the management of parking spaces in cities is becoming increasingly important in improving the quality of life and combating air pollution. Indeed, finding a parking space at peak times and in congested areas of the population becomes a huge challenge for drivers. To remedy this problem, most modern cities have smart parking. The equipment of these smart parking is mainly based on the implementation of wireless sensor networks (WSN) to monitor, track, and collect real-time information on the occupancy status of each parking space. This information is then made available to drivers who are looking for an available parking space. However, sensor nodes have limitations in terms of energy and communication that affect the performance and quality of the wireless sensor network. Therefore, the design of a self-organization protocol for WSN that minimizes power consumption and maximizes the longevity of the WSN network must be taken into account when implementing and developing a sustainable and viable intelligent parking system. In this paper, we propose a protocol for self-organization of wireless sensor networks (WSN) for the management of parking spaces in outdoor and urban car parks. This protocol is based on building clusters using ZigBee transmission technology for multihop communication. Each sensor node will be installed in the ground of each parking space to monitor its availability by sending the empty or busy state of that space to the gateway using cluster head nodes (CHs). This approach has a robust and efficient self-organizing algorithm that minimizes energy dissipation and increases the lifetime of sensor nodes and the WSN network. The simulation results show that parking management systems in outdoor and urban car parks using the self-organization protocol presented are efficient and sustainable in terms of energy consumption, reliability of data transmission, and the longevity of the WSN network compared to other existing parking systems that use different self-organizing protocols for wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
9

T, SAMPRADEEPRAJ, and RAJA S P. "On Improving Reliability in Multicast Routing Protocol for Wireless Sensor Network." Information Technology And Control 49, no. 2 (June 16, 2020): 260–74. http://dx.doi.org/10.5755/j01.itc.49.2.24111.

Full text
Abstract:
Multicast routing becomes the most challenging problem in Wireless Sensor Networks (WSN). Multicasting is an effective way to facilitate group communication in which the multicast data need to be sent from a source node to multiple receivers. In this paper, a simple and efficient algorithm Minimum Connected Dominating Set (MCDS) is used to form a virtual backbone as forwarding group of the network. The MCDS aims at minimizing the number of nodes, where few nodes should be dominated, which are responsible for forwarding the multicast packets by applying Random Linear Network Coding (RLNC). RLNC has great potential to improve the performance of multicast routing protocol. The objective of this paper is to improve the performance of On-Demand Multicasting Routing Protocol (ODMRP) with respect to reliability using RLNC over MCDS for WSN, so that bandwidth utilization can be increased in the network. The proposed approach is named as RLNMCDS-ODMRP, which deliver multicast data in high reliable. Experimental results and performance analysis show that the proposed protocol outperforms the classical multicast routing protocols that use MCDS or RLNC.
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar Dwivedi, Anshu, Awadhesh Kumar Sharma, and Pawan Singh Mehra. "Energy Efficient Sensor Node Deployment Scheme for Two Stage Routing Protocol of Wireless Sensor Networks assisted IoT." ECTI Transactions on Electrical Engineering, Electronics, and Communications 18, no. 2 (August 31, 2020): 158–69. http://dx.doi.org/10.37936/ecti-eec.2020182.240541.

Full text
Abstract:
Now a day wireless sensor networks (WSNs) is an essential unit of the internet of things (IoT). IoT theater a vital role in real-time applications which is more useful in real life. Due to its small price and potential use, WSNs have shown importance in different applications over the past year. Health concerns, environmental observation, human protection, military operations, surveillance systems, etc. WSNs have a small device called a sensor node (SN) that has a limited battery. IoT based WSNs consume more energy in sensor node communication. Therefore a Novel energy-efficient sensor node deployment scheme for two-stage routing protocol (EE- DSTRP) has been proposed to reduce the energy consumption of sensor nodes and extend the lifetime of the network. Sensor node deployment is a novel approach based on the golden ratio. All traditional protocols divide network zones for communication. No existing protocols tell about the sensor node deployment ratio in each zone. The deployment method is an important factor in reducing the energy usage of a network. To validate its efficiency, in this article, simulation results prove that the proposed IoT based EE-DSTRP protocol is superior to other existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Wireless communication systems. Wireless application protocol (Computer network protocol)"

1

Ding, Jin. "Communication protocols for wireless ad-hoc and sensor networks." Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Spring2006/j%5Fding%5F050306.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tsang, Cheuk-kan Ken, and 曾卓勤. "Vertical handoff in heterogeneous wireless networks with mSCTP." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40687636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tsang, Cheuk-kan Ken. "Vertical handoff in heterogeneous wireless networks with mSCTP." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B40687636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tönsing, Christoph Erik. "Energy -efficient MAC protocol for wireless sensor networks." Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-09042008-143948/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Page, Jonathan Grant. "Energy efficient hybrid routing protocol for wireless sensor networks." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-09042008-130625/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Celly, Bhrigu. "Wireless messaging and project management system." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2215.

Full text
Abstract:
Wireless is an important part of the future and utilizing the wireless technology in project management is a great tool. This project is a messaging system designed using WAP and Java Server pages, as both of them are the technologies of the future. The project puts together a tool to help in project management made with the use of Java Server Pages and MySQL as the backend database. It uses Wireless Markup Language as the basic language for the cellular phones and the hand held wireless devices. The prototype has been modeled on project planning for power plants done by Asea Brown Boveri, Ltd.
APA, Harvard, Vancouver, ISO, and other styles
7

Khan, Moazzam. "Security metric based risk assessment." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47527.

Full text
Abstract:
Modern day computer networks have become very complex and attackers have benefited due to this complexity and have found vulnerabilities and loopholes in the network architecture. In order to identify the attacks from an attacker all aspects of network architecture needs to be carefully examined such as packet headers, network scans, versions of applications, network scans, network anomalies etc. and after the examination attributes playing a significant impact on the security posture of the organization needs to be highlighted so that resources and efforts are directed towards those attributes. In this work we extensively look at network traffic at dormitory network of a large campus and try to identify the attributes that play a significant role in the infection of a machine. Our scheme is to collect as much attributes from the network traffic applying the heuristic of network infection and then devise a scheme called decision centric rank ordering of security metric that gives the priority to the security metrics so that network administrators can channel their efforts in the right direction. Another aspect of this research is to identify the probability of an attack on a communication infrastructure. A communication infrastructure becomes prone to attack if certain elements exist in it, such as vulnerabilities in the comprising elements of the system, existence of an attacker and motivation for him to attack. Focus of this study is on vulnerability assessment and security metrics such as user behavior, operating systems, user applications, and software updates. To achieve a quantified value of risk, a set of machines is carefully observed for the security metrics. Statistical analysis is applied on the data collected from compromised machines and the quantified value of risk is achieved.
APA, Harvard, Vancouver, ISO, and other styles
8

Chinpanich, Vorapong. "Helpdesk Support Alert System." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2674.

Full text
Abstract:
The goal of this project was to implement the Helpdesk Support Alert System in the Data Center Services (DCS) of California State University, San Bernardino's (CSUSB's) Information Resource and Technology Division (IRT). DCS is responsible for ensuring uninterrupted operation of all CSUSB administrative computing systems. These responsibilities include user support, system maintenance, and system security. The DCS helpdesk cannot be staffed 24 hours a day; this application is designed to alert DCS technicians of emergencies when they are away from the helpdesk. The Helpdesk Support Alert System sends out an automated emergency alert in the form of a short text message to technicians' mobile phones. Technicians respond back to their main office by using the Wireless Application Protocol (WAP) capability of their mobile phones.
APA, Harvard, Vancouver, ISO, and other styles
9

Lakhiani, Avinash. "A transparent authentication protocol for wireless networks." Ohio : Ohio University, 2003. http://www.ohiolink.edu/etd/view.cgi?ohiou1049469715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Boinpalli, Vamshi Krishna. "A Robust Wireless Multicast Protocol." Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1121356426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Wireless communication systems. Wireless application protocol (Computer network protocol)"

1

Scott, Sbihli, and NetLibrary Inc, eds. The wireless application protocol (WAP): A Wiley tech brief. New York: John Wiley, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Programming applications with the wireless application protocol: The complete developer's guide. New York: Wiley, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kornak, Adam. Cap Gemini Ernst & Young guide to wireless enterprise application architecture. New York: Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pekka, Niskanen. Inside WAP: Programming applications with WML and WMLScript. Harlow, England: IT Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

TechTV's Cutting the Cord: A Wireless Consumer Guide. Upper Saddle River: Pearson Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

network), TechTV (Television, ed. TechTV's cutting the cord: A wireless consumer guide. Indianapolis, Ind: Que, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shou ji shang wang xiao bai ke. Taibei Shi: Dian nao ren wen hua shi ye gu fen you xian gong si, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wireless Web development. 2nd ed. Berkeley, CA: Apress, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wireless Web development. Berkeley, CA: Apress, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alesso, H. P. The intelligent wireless Web. Boston, MA: Addison-Wesley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Wireless communication systems. Wireless application protocol (Computer network protocol)"

1

Liang, Ben, Ahmed H. Zahran, and Aladdin O. M. Saleh. "Application Signal Threshold Adaptation for Vertical Handoff in Heterogeneous Wireless Networks." In NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 1193–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11422778_96.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Srinivasan, Sridhar, and Ellen Zegura. "Scheduling Uplink Bandwidth in Application-Layer Multicast Trees." In NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 1018–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11422778_82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alexandraki, Adamantia, and Michael Paterakis. "Performance Evaluation of the Deadline Credit Scheduling Algorithm for Soft-Real-Time Applications in Distributed Video-on-Demand Systems." In NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, 202–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47906-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hong, Choong Seon, and Yubai Yang. "A Hierarchical Secure Ring-Oriented Multicast Protocol over Mobile Ad Hoc Network." In NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 1471–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11422778_140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hausheer, David, and Burkhard Stiller. "PeerMint: Decentralized and Secure Accounting for Peer-to-Peer Applications." In NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 40–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11422778_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

O’Neill, Shane, Alan Marshall, and Roger Woods. "A Novel Packet Marking Function for Real-Time Interactive MPEG-4 Video Applications in a Differentiated Services Network." In NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 1031–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11422778_83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Perelló, Jordi, Eduard Escalona, Salvatore Spadaro, Fernando Agraz, Jaume Comellas, and Gabriel Junyent. "Control Plane Protection Using Link Management Protocol (LMP) in the ASON/GMPLS CARISMA Network." In NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 1182–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11753810_106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Samal, Tushar Kanta, Manas Ranjan Kabat, and Prasant Kumar Dash. "Media Access Control Protocols for Healthcare Sensor Networks." In Advances in Wireless Technologies and Telecommunication, 353–71. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0501-3.ch014.

Full text
Abstract:
The advancement of information and communication technology directly influences the life style of human being by making their life easier, sophisticated in many circumstances. The healthcare sensor network is one of the emerging areas of research for both computer science and health professionals. The Quality of Service (QoS) requirement of the traffic in emergency situation is one of the key challenges in this network. The Medium Access Control (MAC) layer plays vital role for reliable and on time delivery in the healthcare sensor networks. The healthcare system provides remote monitoring, real-time identification and control information which helps in identifying the unusual patterns and making more precise information about the situation. In this chapter, we present the issues and challenges of supporting sensor networks for healthcare applications. Then we present an extensive survey of MAC protocols developed to address the major challenges and improve the capacity of healthcare system in WSN.
APA, Harvard, Vancouver, ISO, and other styles
9

"Application of a security protocol to wireless multiple access systems." In Network Security and Communication Engineering, 113–16. CRC Press, 2015. http://dx.doi.org/10.1201/b18660-23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lan, Kun-chan, Zhe Wang, Mahbub Hassan, Tim Moors, Rodney Berriman, Lavy Libman, Maximilian Ott, Bjorn Landfeldt, Zainab Zaidi, and Ching-Ming Chou. "Deployment of a Wireless Mesh Network for Traffic Control." In Developments in Wireless Network Prototyping, Design, and Deployment, 290–310. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1797-1.ch014.

Full text
Abstract:
Wireless mesh networks (WMN) have attracted considerable interest in recent years as a convenient, new technology. However, the suitability of WMN for mission-critical infrastructure applications remains by and large unknown, as protocols typically employed in WMN are, for the most part, not designed for real-time communications. In this chapter, the authors describe a wireless mesh network architecture to solve the communication needs of the traffic control system in Sydney. This system, known as SCATS and used in over 100 cities around the world — from individual traffic light controllers to regional computers and the central TMC —places stringent requirements on the reliability and latency of the data exchanges. The authors discuss experience in the deployment of an initial testbed consisting of 7 mesh nodes placed at intersections with traffic lights, and share the results and insights learned from measurements and initial trials in the process.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wireless communication systems. Wireless application protocol (Computer network protocol)"

1

Oluwatope, Ayodeji, Biodun Obabire, G. Adesola Aderounmu, and Matthew Adigun. "End-to-End Performance Evaluation of Selected TCP Variants across a Hybrid Wireless Network." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/3022.

Full text
Abstract:
Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. TCP is intended for use as a highly reliable end-to-end transport protocol for transporting applications such as World-Wide Web (WWW) between hosts in packet-switched computer communication networks. TCP was originally designed for wired links where the error rate is really low and actually assumed that packet losses are due to congestion in the network. However, the increasing popularity of wireless networks indicates that wireless links will play more important role in future internetworks but TCP performance in such networks suffers from significant throughput degradation and very high interactive delays. TCP responds to all losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance in wireless and lossy systems. Thus, in a bid to show and determine the possibility of adapting TCP protocol for optimal performance on the wireless link, this paper reviews and models the behaviors of TCP variants with a view to evaluate the end-to-end performance analysis of TCP versions: TCP Reno, TCP SACK and TCP Westwood (TCPW), which are designed to improve the performance of TCP in lossy networks. A wireless network model was developed using NS-2 network simulator which and the model was simulated. The results were analyzed in MATLAB 6.5 using throughput as a metric for comparison. The overall results indicate that TCP Westwood (TCPW) demonstrates better performance indices over other versions in a hybrid wireless network environment.
APA, Harvard, Vancouver, ISO, and other styles
2

Mahakalkar, Namrata, and Rahul Pethe. "Review of Routing Protocol in a Wireless Sensor Network for an IOT Application." In 2018 3rd International Conference on Communication and Electronics Systems (ICCES). IEEE, 2018. http://dx.doi.org/10.1109/cesys.2018.8723935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yarde, Pallavi, Sumit Srivastava, and Kumkum Garg. "A Delay Abridged Judicious Cross-Layer Routing Protocol for Wireless Sensor Network." In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2019. http://dx.doi.org/10.1109/ccoms.2019.8821743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kawka, Paul A., Nicholas J. Ploplys, and Andrew G. Alleyne. "UDP Network Communications for Wireless Control With Loop Coordination." In ASME 2004 International Mechanical Engineering Congress and Exposition. ASMEDC, 2004. http://dx.doi.org/10.1115/imece2004-60025.

Full text
Abstract:
With the advent of Bluetooth and wireless 802.11 Ethernet protocols having transmission speeds up to 54 Mbps, wireless communication for closed-loop control is becoming more and more achievable. Some researchers have utilized Bluetooth networks for wireless control, resulting in successful stabilization of an unstable plant with a network controller. Previously, the authors of this paper developed a novel event-based control with time-based sensing and actuation communication method using 11 Mbps wireless Ethernet with the user datagram protocol (UDP). Near real-time control of an unstable Furuta pendulum with up to 250 Hz closed loop bandwidth was obtained using off the shelf hardware, Matlab, and Windows 2000 operating systems. The present work extends that communication scheme to two independent wireless loops that share a mutual goal, making additional communication between the two controllers advantageous. The communication framework for the coupled control in this ad hoc peer-to-peer network is presented along with some practical limitations. Data from a physical system implementing this framework demonstrates its effectiveness in application. The test plant couples a simple light tracking plant with a Furuta pendulum and a shared goal of maintaining line of sight (LOS) under normal conditions as well as reestablishing LOS in the case of lost contact due to sudden obstacles.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography