Sciweavers

981 search results - page 7 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
GLOBECOM
2010
IEEE
13 years 5 months ago
Analysis of a Distributed Queuing Medium Access Control Protocol for Cooperative ARQ
In this paper we analyze the performance of a distributed queuing medium access control (MAC) protocol designed to execute cooperative ARQ (C-ARQ) schemes at the MAC layer. Due to ...
Jesus Alonso-Zarate, L. Alonso, Charalabos Skianis...
ATAL
2006
Springer
13 years 11 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski
IAJIT
2010
87views more  IAJIT 2010»
13 years 6 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
WINET
2010
130views more  WINET 2010»
13 years 5 months ago
Performance analysis of the cumulative ARQ in IEEE 802.16 networks
In this paper, we study the performance of the cumulative Automatic Repeat reQuest (ARQ) in IEEE 802.16 networks. An analytical model is developed to investigate some important per...
Fen Hou, James She, Pin-Han Ho, Xuemin (Sherman) S...
CORR
2011
Springer
536views Education» more  CORR 2011»
13 years 2 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...