A “Storage-Area Network” (SAN) comprises computers (“Initiators”), storage “block devices” (“Targets”), and a Controller(s). Most SANs use the SCSI protocol over v...
In this research, we first investigate the cross-layer interaction between TCP and routing protocols in the IEEE 802.11 ad hoc network. On-demand ad hoc routing protocols respond t...
Wireless communication is inherently vulnerable in nature and packets can be corrupted due to various reasons. The network performance can potentially be improved if one is able t...
— We derive two new energy efficient reliable data transport protocols for overcoming the negative impact of asymmetric radio links in wireless sensor networks. The energy effici...
Ren Ping Liu, Zvi Rosberg, Iain B. Collings, Carol...
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...