Dissertationen zum Thema „SPI communication protocol“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-25 Dissertationen für die Forschung zum Thema "SPI communication protocol" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Sharma, Neena. „SERIAL PROTOCOL BRIDGE“. University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1352403332.
Der volle Inhalt der QuelleRichert, Adam. „Developing a Portable System for Medicine Dosage“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-235738.
Der volle Inhalt der QuelleProjektet som presenteras i denna rapport är tänkt att utveckla ett portabelt elektroniskt system för användning som en medicinsk pillerbehållare. Med funktionaliteten att konfigurera upp till tolv dagligen upprepande alarm är syftet med medicindoseringssystemet först och främst att påminna användaren när de ska ta sin medicin. Lysdioder och användarens egna inspelade röst som notifikationer ska implementeras för att vidare hjälpa användaren att ta rätt medicin vid varje tillfälle. Enheten ska också ha en minneslogg som sparar upp till etthundra missade doseringar, vilket gör det möjligt för auktoriserad sjukvårdspersonal att verifiera användarens följsamhet till medicineringen.En översiktlig beskrivning av funktionaliteten samt det fysiska utseendet av enheten skrevs av projektägaren Victrix AB innan projektet startades. Det som detta projekt täcker är hårdvaruoch mjukvaruutvecklingen, så väl som där tillhörande designval. Projektet siktar på att följa den föreslagna funktionalitetsspecifikationen så nära som möjligt, och samtidigt göra välgrundade val för hårdoch mjukvara med enkelhet, effektivitet, energiförbrukning och tillgänglighet i åtanke. Genom att följa specifikationen är det slutliga målet att frambringa ökad medicinföljsamhet för användare av den med det här projektet utvecklade enheten.Utvecklingen av medicindoseringssystemet föregicks av en befogad bakgrundsstudie utformad genom användningen av kvalitativa forskningsmetoder. Hårdvara att användas för en första prototyp av enheten valdes sedan baserat på den insamlade informationen om existerande teknologier och relaterat arbete. Genom grundliga tester och regelbundet informationsutbyte med kunden konstruerades en prototyp av medicindoseringssystemet baserat på en Arduinomikrokontroller. Prototypen utvärderades att uppfylla 92% av kraven som Victrix ansåg vara av hög prioritet.
Costa, Daniel Gouveia. „Uma arquitetura baseada em SCTP e SIP para suporte a aplica??es VoIP m?veis e a especifica??o formal do seu m?dulo de controle“. Universidade Federal do Rio Grande do Norte, 2006. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15461.
Der volle Inhalt der QuelleNew versions of SCTP protocol allow the implementation of handover procedures in the transport layer, as well as the supply of a partially reliable communication service. A communication architecture is proposed herein, integrating SCTP with the session initiation protocol, SIP, besides additional protocols. This architecture is intended to handle voice applications over IP networks with mobility requirements. User localization procedures are specified in the application layer as well, using SIP, as an alternative mean to the mechanisms used by traditional protocols, that support mobility in the network layer. The SDL formal specification language is used to specify the operation of a control module, which coordinates the operation of the system component protocols. This formal specification is intended to prevent ambiguities and inconsistencies in the definition of this module, assisting in the correct implementation of the elements of this architecture
Novas vers?es do protocolo SCTP permitem sua utiliza??o para implementa??o de mecanismos de handover em n?vel de transporte, bem como o fornecimento de um servi?o de transmiss?o de dados parcialmente confi?vel. Integrando o SCTP com o protocolo de inicia??o de sess?es, SIP, al?m de utilizar adicionalmente servi?os de outros protocolos auxiliares, uma arquitetura de comunica??o p?de ser proposta, a fim de atender ?s aplica??es de voz sobre IP com requisitos de mobilidade. S?o especificados ainda os procedimentos de localiza??o de usu?rio em n?vel de aplica??o, utilizando o protocolo SIP, como alternativa aos mecanismos empregados por protocolos tradicionais que suportam mobilidade na camada de rede. A linguagem de especifica??o formal SDL ? utilizada para especificar o funcionamento de um M?dulo de Controle, relacionado ? opera??o coordenada dos protocolos que comp?e a arquitetura. Pretende-se assim evitar ambig?idades e inconsist?ncias na defini??o desse m?dulo, o que pode auxiliar em implementa??es corretas de elementos dessa arquitetura
Lakay, Elthea Trevolee. „SIP-based content development for wireless mobile devices with delay constraints“. Thesis, University of the Western Cape, 2006. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_9048_1182233050.
Der volle Inhalt der QuelleSIP is receiving much attention these days and it seems to be the most promising candidate as a signaling protocol for the current and future IP telephony services. Realizing this, there is the obvious need to provide a certain level of quality comparable to the traditional telephone service signalling system. Thus, we identified the major costs of SIP, which were found to be delay and security. This thesis discusses the costs of SIP, the solutions for the major costs, and the development of a low cost SIP application. The literature review of the components used to develop such a service is discussed, the networks in which the SIP is used are outlined, and some SIP applications and services previously designed are discussed. A simulation environment is then designed and implemented for the instant messaging service for wireless devices. This environment simulates the average delay in LAN and WLAN in different scenarios, to analyze in which scenario the system has the lowest costs and delay constraints.
El, Saghir Bassam. „A new approach for context-aware management of SIP communications“. Evry, Institut national des télécommunications, 2009. http://www.theses.fr/2009TELE0009.
Der volle Inhalt der QuelleIn recent years, the world telecommunications sector has undergone unprecedented changes driven mainly by the deployment of new communication technologies and services. Telecom operators are suffering from a steady decline in their revenues per user due to fierce competition and market saturation for traditional services. In order to attract new customers and retain existing ones, communication services proposed by these operators need to be aware of the user’s context, which includes information related to the user himself as well as his environment (e. G. His location, current activities and available devices). Unfortunately, interworking proposed context-aware solutions with current and next-generation networks still represents a big challenge for communication service providers as well as operators. This thesis addresses issues related to the development of context-aware communication systems by proposing a network-based agent called INCA (Intelligent Network-based Communication Assistant). INCA provides advanced management of SIP communications based on context information that is retrieved through a dedicated framework for context publication and notification. Its multilayered architecture is based on a generic layer model and implements a plan-centric approach for SIP session management. It also relies on a new context-aware communication model for providing communication adaptation based on user preferences
Troudi, Rami. „Étude, conception et structure de commande temps réel d'un onduleur multiniveau à partir d'une seule source DC ; applications énergies renouvelables et véhicules électriques“. Thesis, Poitiers, 2021. http://www.theses.fr/2021POIT2262.
Der volle Inhalt der QuelleRami Troudi's thesis research work addresses three problematics:- the first is to design a three-phase multilevel inverter for applications based on renewable energies connected to the power grid, or for electric motor drive of electric vehicles. In the first application, the use of multilevel arms greatly limit the coupling inductances with the power grid, while in the second application, the torque delivered by the motor is of better quality.- the second is to design a DC-DC converter structure having only one DC source destinated to supply this multilevel inverter.- the third is the design of a real-time control architecture based on microcontrollers leading to a large capacity of evolution and calculation and an ease industrialization.The thesis manuscript is organized into four chapters.The first chapter presents a state of art of multilevel inverter structures. This technology is becoming an important research topic today. This chapter gives the advantages and disadvantages of each conventional multilevel inverter topology as well as the new topologies with a reduction in the number of components. This chapter also give a reviews of the state of art of chopper structures with one or multiple inputs-outputs (MISO, MIMO and SIMO). This chapter also presents the advantages and the disadvantages of each family of structure with their regulation. The end of the chapter presents the new topologies retained for the multilevel inverter and the SIQO chopper (one input-four outputs).The second chapter is devoted to the presentation of the structure of the proposed multilevel inverter, as well as to the study of its mode of operation, its close control device and its use in a closed loop application. This chapter shows that this structure has the advantage of minimizing losses in power components by having, at any time, few components that conduct the current of each arm, which allows to increase its efficiency. In addition, this chapter shows the simplicity of the used close control of the inverter employing a very simple algorithm. Experimental tests are given at the end of the chapter after the description of the test bed.The third chapter discusses in detail the structure of the SIQO DC-DC converter used to supply the multilevel inverter, its operation mode, its modeling and the development of a multi-input multi-output (MIMO) control. This structure is designed from a coupling of the SEPIC structure with the buck-boost structure and the doubling of each output by a switching system which leads to obtain four outputs from a single DC input. Each structure (SEPIC and buck-boost) manages two outputs with the calculation of two duty cycles. For this, a control synthesis based on an Hinfini method is presented to be robust to the variations of the currents and the changes of the setpoint. The results of the experimental tests are given at the end of the chapter after the description of the test bed.Chapter four discusses the development of one architecture based on multi-microcontroller system. This structure is applied to the control of the three-phase multilevel inverter. This chapter describes all the functions that compose this architecture at the hardware and software level. The distribution of the hardware and algorithmic needs several microcontrollers makes it easier to evolve the demands for additional functions, namely the diagnosis and reconfiguration of an arm, as well as the addition of the active filtering function. This architecture is based on SPI (Serial Peripheral Interface) bus communication which allows rapid exchanges between the microcontrollers and also towards an HMI (human-machine interfaces) system
Bédard, Normand. „Sécurité d'une application de communication multimédia sous protocole IP dans un contexte médical“. Mémoire, Université de Sherbrooke, 2010. http://savoirs.usherbrooke.ca/handle/11143/1530.
Der volle Inhalt der QuelleElleuch, Wajdi. „Mobilité des sessions dans les communications multimédias en mode-conférence basées sur le protocole SIP“. Thèse, Université de Sherbrooke, 2011. http://hdl.handle.net/11143/5799.
Der volle Inhalt der QuelleHussain, Intesab. „Solving flooding and SPIT based denial of service problems in voice over IP communications“. Thesis, Paris 5, 2013. http://www.theses.fr/2013PA05S007.
Der volle Inhalt der QuelleSession Initiation Protocol (SIP) is the widely used signaling protocol for voiceand video communication as well as other multimedia applications. Despiteof its flexibility and a common standard that can be leveraged to efficientlycombine a wide array of communication systems and technologies, it is exposedto a number of problems, including the vulnerability to several types of attacksdue to its open nature, in particular, and lack of a clear defense line. Likewise,flooding attack is one of the most destructive attacks targeting both User AgentServer (UAS) and User Agent Client (UAC), leading to a Denial of Service (DoS)in VoIP applications. In particular, INVITE message is considered as one of themajor root causes of flooding attacks in SIP. This is due to the fact that an attackermay send numerous INVITE requests without waiting for responses from theUAS or proxy in order to exhaust their resources. Moreover, SPIT problem inSIP is also a challenging issue which needs proper attention and appropriatesolutions.Most of the solutions proposed to overcome the flooding attacks are eitherdifficult to deploy in practice or require significant changes in the SIP servers.Additionally, the diverse nature of flooding attacks offers a huge challenge toenvisage appropriate prevention mechanisms. In this survey, we present acomprehensive study on flooding attacks against SIP by addressing its differentvariants and analyzing its consequences. We also classify the existing solutionscorresponding to different flooding behaviors, types and targets, and then weperform an extensive investigation of their main weaknesses and strengths.Additionally, we also take into account the underlying assumptions of eachsolution for a better understanding of its limitations. Specifically, we havethoroughly analyzed SPIT problems and few of the existing solutions proposedfor their prevention.The theoretical framework derived from our extensive literature survey led us topropose a solution for handling specific number of SIP requests in a particulartime window. Our proposed "Light Weight Scheme" is implemented in a SERSIP server. The evaluation results presented in this thesis depict the satisfactoryperformance of this approach. In order to cope with SIP flooding attacks, wepropose another solution based on "Strategy Based Proxy". This solution isdesigned for a SIP proxy that calculates the probability of a call being maliciouson the basis of its current experience. The obtained experience is also utilized tocalculate the probabilities of a successful call setup. This approach is useful forboth state-ful and state-less proxy servers.For dealing with SPIT, we have designed a 2-step solution. In first step, weextract the useful information from the VoIP traffic. In second step, we apply aNaive Bayes classifier on the date extracted from first step to determine whetherthe nature of an incoming SIP call is malicious or it is a harmless routine call.With this mechanism, we can detect the SPIT calls from a group of incomingSIP calls. Finally, we presents a detailed discussion and conclusions derivedfrom our case study carried out in this thesis along with future directions andpotential research areas related to VoIP security threats
Iqbal, Zeeshan. „Self-Organizing Wireless Sensor Networks For Inter-Vehicle Communication“. Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-230.
Der volle Inhalt der QuelleNow a day, one of the most attractive research topics in the area of Intelligent Traffic Control is
Inter-vehicle communication (V2V communication). In V2V communication, a vehicle can
communicate to its neighbouring vehicles even in the absence of a central Base Station. The
concept of this direct communication is to send vehicle safety messages one-to-one or one-to-
many vehicles via wireless connection. Such messages are usually short in length and have very
short lifetime in which they must reach the destination. The Inter-vehicle communication system
is an ad-hoc network with high mobility and changing number of nodes, where mobile nodes
dynamically create temporary sensor networks and transferring messages from one network to
others by using multiple hops due to limitation of short range.
The goal of the project is to investigate some basic research questions in order to organize such
sensor networks and at the same time highlight the appropriate routing protocol that support
mobile ad hoc networks in an efficient and reliable manner.
In our investigation, we have answered the technical issues in order to construct a V2V
communication system. We have also studied some mobile ad hoc network routing protocols in
detail and then selected the DSR (Dynamic Source Routing) for our V2V communication and
then simulated it according to our system requirements. We are quite satisfied by the result of
DSR, but at the same time much more work is required to come up with an absolute application
for the end user.
Jacobs, Ashley. „Investigating call control using MGCP in conjuction with SIP and H.323“. Thesis, Rhodes University, 2005. http://hdl.handle.net/10962/d1006516.
Der volle Inhalt der QuelleAguilar, Teck. „Vers un protocole de routage géographique avec contention et communications coopératives pour les réseaux de capteurs“. Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00612332.
Der volle Inhalt der QuelleHsieh, Ming Chih. „Service provisioning in two open-source SIP implementation, cinema and vocal“. Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1008195.
Der volle Inhalt der QuelleKMBT_363
Adobe Acrobat 9.54 Paper Capture Plug-in
Boongerd, Sanhawad, und Fredrik Lindstein. „Analys av datakommunikationssäkerhet för VoIP-protokoll“. Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105774.
Der volle Inhalt der QuelleVoice over IP (VoIP) är en datakommunkationsteknik som möjliggör röstsamtal överdatanätverk. Med VoIP är det möjligt att sänka kostnader, utöka funktionalitet och flexibilitet.Från Försvarsmaktens perspektiv är säkerhetsfrågan med VoIP av stor vikt, därför läggs speciellfokus för denna rapport på säkerhetsaspekten av de två största öppna VoIP-protokollen H.323och SIP, några av de vanligaste attackerna, och åtgärder mot dessa attacker. Eftersom uppbyggnaden av ett H.323- eller SIP-baserat nätverk är komplext och inte allsbeprövat i samma utsträckning som traditionell telefoni, innehåller det många kända säkerhetshåloch förmodligen för närvarande många okända säkerhetsbrister. Slutsatsen är att det krävs mycket stor kunskap och insikt hur ett VoIP-nätverk baserat på H.323eller SIP fungerar för att göra nätverket tillräckligt säkert i nuläget, vilket gör det till en tveksamttillfredställande lösning för Försvarsmakten idag för deras kommunikation av känsligare slag.
Salazar, Gaitàn Oscar. „Statégies de roaming inter-opérateur dans un réseau mobile hétérogène“. Paris, ENST, 2007. https://pastel.hal.science/pastel-00003796.
Der volle Inhalt der QuelleIn a future, existing wireless access technologies such as WiFi (Wireless Fidelity), WiMAX (Worldwide Interoperability for Microwave Access) and UMTS (Universal Mobile Telecommunication System) will coexist on daily basis. Nevertheless, this daily coexistence does not imply that they will be able to fully interoperate. Thus, my research work focuses on a specific roaming scenario which is formed by heterogeneous wireless access networks managed by different operators. Our main objective is to provide a seamless (for the mobile user) roaming architecture to enable network interoperability under a heterogeneous multi-operator wireless environment, all this without major changes in current wireless architectures. In this regard, we also aim at reducing the roaming signaling exchange caused by the authentication and authorization mechanisms in the network registration and session initiation process while providing robust network security. The results obtained through computer simulation indicated that the use of our approach reduces significantly the network registration and session initiation delay, hence outperforming the traditional Roaming-SIP method. We also confirmed that the wireless delay introduced by the VN increases considerably when increasing the traffic congestion level in the Visiting Networks. Thus, from the simulations results we can state that by reducing the signaling message exchange, and maintaining acceptable congestion levels in the wireless network, hence reducing the wireless transmission delay, we can improved the overall de-lay in both network registration and session initiaition process
Shanmugalingam, Sivasothy. „Convergence of web and communication services“. Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00997697.
Der volle Inhalt der QuelleMasri, Aladdin. „Vers le contrôle commande distribué des systèmes de production manufacturiers : approche composant pour la prise en compte de l'architecture de communication dans la modélisation“. Phd thesis, Ecole Centrale de Lille, 2009. http://tel.archives-ouvertes.fr/tel-00578841.
Der volle Inhalt der QuelleMani, Mehdi. „Stratégies d'overlay de service : d'une architecture centalisée vers le Pair-à-Pair“. Paris 6, 2008. http://www.theses.fr/2008PA066188.
Der volle Inhalt der QuelleChvátal, Michal. „Řízení dodávky vody v rodinném domě“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442453.
Der volle Inhalt der QuelleEl, Kaed Charbel. „Home Devices Mediation using ontology alignment and code generation techniques“. Thesis, Grenoble, 2012. http://www.theses.fr/2012GRENM002/document.
Der volle Inhalt der QuelleUbiquitous systems imagined by Mark Weiser are emerging thanks to the development of embedded systems and plug-n-play protocols like the Universal Plug aNd Play (UPnP), the Intelligent Grouping and Resource Sharing (IGRS), the Device Pro le for Web Services (DPWS) and Apple Bonjour. Such protocols follow the service oriented architecture (SOA) paradigm and allow an automatic device and service discovery in a home network. Once devices are connected to the local network, applications deployed for example on a smart phone, a PC or a home gateway, discover the plug-n-play devices and act as control points. The aim of such applications is to orchestrate the interactions between the devices such as lights, TVs and printers, and their corresponding hosted services to accomplish a specific human daily task like printing a document or dimming a light. Devices supporting a plug-n-play protocol announce their hosted services each in its own description format and data content. Even similar devices supporting the same services represent their capabilities in a different representation format and content. Such heterogeneity along with the protocols layers diversity, prevent applications to use any available equivalent device on the network to accomplish a specific task. For instance, a UPnP printing application cannot interacts with an available DPWS printer on the network to print a document. Designing applications to support multiple protocols is time consuming since developers must implement the interaction with each device pro le and its own data description. Additionally, the deployed application must use multiple protocols stacks to interact with the device. More over, application vendors and telecoms operators need to orchestrate devices through a common application layer, independently from the protocol layers and the device description. To accomplish interoperability between plug-n-play devices and applications, we propose a generic approach which consists in automatically generating proxies based on an ontology alignment. The alignment contains the correspondences between two equivalent devices descriptions. Such correspondences actually represent the proxy behaviour which is used to provide interoperability between an application and a plug and play device. For instance, the generated proxy will announce itself on the network as a UPnP standard printer and will control the DPWS printer. Consequently, the UPnP printing application will interact transparently with the generated proxy which adapts and transfers the invocations to the real DPWS printer. We implemented a prototype as a proof of concept that we evaluated on several real UPnP and DPWS equivalent devices
Spencer, Logan Lemuella C. „Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /“. Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.
Der volle Inhalt der QuelleChuang, Chihchiang, und 莊智強. „Integrating SIP with Three-way Key and Agreement Exchange Protocol for Secure Multimedia Communications“. Thesis, 2012. http://ndltd.ncl.edu.tw/handle/15899236282073643136.
Der volle Inhalt der Quelle國立中正大學
資訊工程研究所
100
Network security has become an important issue since various attacks are appearing in the IP network, and the key exchange protocol is one of the most important cryptography mechanisms to protect end-to-end communication by the secret session key encryption. In this paper, we focus on the four-party key exchange protocol in an environment in which two clients are registered under two distinct servers, and both registered parties have to communicate through their corresponding server respectively. We integrate SIP with the three-way key exchange and agreement protocol (TW-KEAP), denoted by SIP+TW-KEAP. The SIP+TW-KEAP uses an attribute (a=crypto) of SDP in the SIP message body to carry key parameters without exchanging any extra message according to RFC 4568 SDES (Session description protocol security descriptions for media streams). It makes two communication parties have a secret session key to protect their subsequent communications on an efficient way, and intends servers to involve with the key exchange procedure to derive the session key for the lawful interception support. In addition, we utilize GNU oSIP library and crypto++ library to implement the proposed scheme. The SIP+TW-KEAP has not only the shortest total service time based on the experimental results but also the shortest queuing delay, wireless transmission delay, and energy consumption from numerical analysis, as compared with the current alternative.
Rambim, Dorothy Apondi. „Transmission control protocol (TCP) and medium access control (MAC) cross-layer enchancement in wireless“. Thesis, 2011. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000384.
Der volle Inhalt der QuelleWidespread deployment of wireless local area networks (WLANs) and a gradual increase in streaming applications have brought about a demand for improved Quality of Service (QoS) in wireless networks. The IEEE 802.11e standard was proposed to provide QoS mechanisms for assigning high priority to delay-sensitive applications. However, Internet traffic is still dominated by TCP based applications, and the negative effects of the IEEE 802.11e service differentiation scheme on TCP performance in the presence of high priority traffic are becoming a challenging issue. TCP has been found to perform poorly in wireless networks, including IEEE 802.11e; more applications with higher QoS demands use UDP in the transport layer than TCP. Therefore, the QoS of low priority traffic in 802.11e is not guaranteed in networks highly loaded with high priority traffic. This is aggravated by the class differentiation introduced in current QoS protocols, which results in TCP applications being starved during high traffic load. The motivation of this work is to enhance the interaction between the TCP and MAC protocols in order to improve TCP performance in WLANs.
Banda, Laurence. „Improvement of internet protocol (IP) mobility support in vehicular scenarios“. 2013. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000343.
Der volle Inhalt der QuellePresents an IPv6-based mobility support scheme for vehicular scenarios. The focus of this study is on modelling of an efficient network layer handover scheme suitable for vehicular network environments. In order to achieve this, a Vehicular Fast handovers for Mobile IPv6 (VFMIPv6) network layer protocol has been proposed.
Kabiwa, Tchokonte Maxime Stephane. „Development of an improved link metric for routing protocols in wireless ad-hoc networks“. 2014. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001649.
Der volle Inhalt der QuelleDiscusses the interference and bandwidth adjusted ETX routing metric uses a logical interference model that refers to the interference arising from the Carrier Sensing Multiple Access with Collision Avoidance (CSMA-CA) based Medium Access Control. This approach of capturing inter-flow is complex and more restrictive. In this dissertation, a more realistic and less restrictive approach based on the information available at the physical layer (signal strength) is used to capture the interference.In contrast to the logical interference model, this has the excellent advantage of measuring the parameters using online data traffic. The question is whether actual capacity improvements can be achieved by considering the physical interference model.