The mobile devices have gained much functionality and intelligence with the growth of network technologies, the abundance of network resources, and the increase of various services...
End-to-End (E2E) flow monitoring is useful for observing performance of networks such as throughput, loss rate, and jitter. Typically, E2E flow monitoring is carried out at end hos...
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...
Network topology discovery for the large IP networks is a very well studied area of research. Most of the previous work focus on improving the efficiency in terms of time and compl...
Most of Voice over IP(VoIP) systems are deployed using SIP protocol and based in a client-server architecture. A lot of people and companies could be benefited if the system did n...
Felipe de Castro Louback Rocha, Linnyer Beatrys Ru...
Standby power is the energy consumed by appliances when they are not performing their main functions or when they are switched off. In this paper, we propose a Host-Agent based sta...
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
This paper represents a new clustering approach for wireless sensor network. It is a decentralized algorithm having the topology control information in each sensor node. A post lea...
Md. Obaidur Rahman, Byung Goo Choi, Muhammad Mosta...
The multi-homing technology can provide an extended coverage area via distinct access technologies. Also, it is able to redirect a flow from one interface to another without reinit...
Network Mobility (NEMO) and IPv6 over Low power Wireless PAN (6LoWPAN) protocols are the two significant important technologies in the current networking research areas and seem to...