Sciweavers

430 search results - page 6 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
CCR
2007
176views more  CCR 2007»
13 years 8 months ago
Enhanced wireless mesh networking for ns-2 simulator
The ns-2 simulator has limited support for simulating 802.11based wireless mesh networks. We have added the following new features at the MAC and PHY layer of ns-2: (i) cumulative...
Vivek Mhatre
JSAC
2007
180views more  JSAC 2007»
13 years 7 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
CN
2008
63views more  CN 2008»
13 years 8 months ago
Time-efficient distributed layer-2 auto-configuration for cognitive radio networks
Cognitive radios (CR) have the ability to dynamically adapt to local spectrum availability. In a network comprised of CR-enabled devices, layer-2 auto-configuration involves deter...
Srinivasan Krishnamurthy, Mansi Ramakrishnan Thopp...
PERCOM
2008
ACM
14 years 7 months ago
P2PNS: A Secure Distributed Name Service for P2PSIP
Decentralized Voice over IP networks are a promising alternative to classical server-based SIP networks especially in disaster areas or areas without centralized infrastructure. T...
Ingmar Baumgart
ICC
2007
IEEE
14 years 2 months ago
A Multirate code for wired Local Area Networks
— A matrix is described that transforms input vectors (blocks) of length (K − 2), consisting of digital PAM vector components, into output vectors (blocks) of length K. The mat...
J. Alexander Peek, J. B. Hans Peek