scispace - formally typeset
Search or ask a question

Showing papers in "Computer Communications in 2004"


Journal ArticleDOI
TL;DR: Analytical results and simulation experiments indicate that BLR provides efficient and robust routing in highly dynamic mobile ad hoc networks.

359 citations


Journal ArticleDOI
TL;DR: The prototype GARA implementation builds on differentiated services mechanisms to enable the coordinated management of two distinct flow types-foreground media flows and background bulk transfers-as well as the co-reservation of networks, CPUs, and storage systems.

259 citations


Journal ArticleDOI
TL;DR: This paper proposes methods for reducing energy consumption of networked desktop computers with a proxying Ethernet adapter that handles routine network tasks for a desktop computer when it is in a low-power sleep mode and can be saved in the range of 0.8-2.7 billion US dollars/year.

221 citations


Journal ArticleDOI
TL;DR: The benefits of cross-layer feedback on the mobile device and a representative survey are discussed and the proposed protocol stack would be useful to improve the efficiency of these protocol stacks.

196 citations


Journal ArticleDOI
TL;DR: A survey on current anomaly detection methods for network intrusion detection in classical wired environments and describes the problems addressed by these methods as well as the problems that still remain open.

175 citations


Journal ArticleDOI
TL;DR: It is shown that the BS scheme extends the cluster's overall network lifetime significantly while maintaining a similar sensing coverage compared with the DS and the RS schemes for sensor clusters.

160 citations


Journal ArticleDOI
TL;DR: A vertical handover mechanism suitable for multimedia applications in pervasive systems is proposed which uses context information regarding user devices, user location, network environment and requested QoS.

146 citations


Journal ArticleDOI
TL;DR: Simulation results show that LS-SCTP is extremely beneficial for networks with limited bandwidth, high loss rate and failure prone links.

142 citations


Journal ArticleDOI
TL;DR: This paper is among the first papers to provide a comprehensive survey of most of the various milestone research work in application level multicast in terms of both breadth and depth and classifies them into different broad categories based on their topology design, service model and architecture.

129 citations


Journal ArticleDOI
TL;DR: This paper reviews the software agent technology applications in communications with more emphasis on mobile agents since it is an emerging agent technology.

128 citations


Journal ArticleDOI
TL;DR: A very efficient and provably secure group key agreement well suited for unbalanced networks consisting of devices with strict power consumption restrictions and wireless gateways with less stringent restrictions is proposed.

Journal ArticleDOI
TL;DR: This paper analyzes the handoff performance of SIP in a IP-based 4G network with Universal Mobile Telecommunication System (UMTS) and Wireless LAN (WLAN) access networks and shows that the minimum delay is unacceptable for streaming multimedia traffic and requires the deployment of soft-handoff techniques.

Journal ArticleDOI
TL;DR: It is shown that the most significant difference of computing BDP and BDP-UB in MANET is the coupling of bandwidth and delay over a wireless link, where only one packet is allowed to be transmitted over the channel at a time.

Journal ArticleDOI
TL;DR: An overview of extensible Retrieval, Annotation and Caching Engine (eRACE), a modular and distributed intermediary infrastructure that collects information from heterogeneous Internet sources according to registered profiles or end-user requests, is presented.

Journal ArticleDOI
TL;DR: This work evaluates Web service performance of handheld resource-constrained clients using different wireless technologies and presents measurement results of a simple dynamic scheme that provides benefits by compressing responses only when the required server resources are available.

Journal ArticleDOI
TL;DR: A new metric for quality assessment of long video transmissions (considerably longer than 10 s) is presented and applied to the simulation results and it is found that the combined system approach increases the number of supportable terminals per cell by up to 300%.

Journal ArticleDOI
TL;DR: The proposed scheme offers a bandwidth routing protocol for QoS support in a multihop mobile network, namely link-state multi-path QoS routing, protocol in a wireless mobile ad-hoc network (MANET).

Journal ArticleDOI
TL;DR: A new protocol called Load Aware Routing in Ad hoc (LARA) networks protocol for efficient data transmission in mobile ad hoc networks and defines a new metric for routing called traffic density to represent the degree of contention at the medium access control layer.

Journal ArticleDOI
TL;DR: This paper analyzes simple slow CW decrease functions and uses simulations and mathematical modeling to show their considerable improvements at all contention levels and transient phases, especially in high congested environments.

Journal ArticleDOI
TL;DR: An extension of Transmission Control Protocol (TCP) Westwood allowing the management of the Efficiency/Friendliness-to-NewReno tradeoffs is shown to be able to achieve higher total link utilization, yet at the same time maintain friendliness.

Journal ArticleDOI
TL;DR: This paper proposes several novel solutions to the bandwidth-delay-constrained least-cost multicast routing problem based on genetic algorithms (GA), consisting of six different schemes for genotype representation, and also several new heuristic algorithms for mutation, crossover, and creation of random individuals.

Journal ArticleDOI
TL;DR: Proposals for the enhancement of the 3G-security architecture, and the provision of advanced security services to end-user data traffic within and outside the UMTS core network are discussed.

Journal ArticleDOI
TL;DR: The security threats and propose security services to counteract these threats in cluster-based NTDR ad hoc networks are described and secure schemes for a mobile node to initiate, join and leave a cluster are described.

Journal ArticleDOI
TL;DR: It is argued that an energy map can be the basis for the entire design trajectory including all functionalities to be included in a wireless sensor network, and both probabilistic and statistical prediction-based approaches are proposed.

Journal ArticleDOI
TL;DR: The state-of-the-art in router-based mechanisms to address the TCP-friendliness problem is surveyed and a description of the most important algorithms, design issues, advantages and disadvantages are presented, and a performance evaluation is presented.

Journal ArticleDOI
TL;DR: A model of users' satisfaction is presented, which considers the effects of both users' request and price paid, and it is possible to investigate the relationship between the radio resource allocation and the provider revenue.

Journal ArticleDOI
TL;DR: It is demonstrated that the distribution of packet arrival and the distributionof byte arrival in Ethernet network traffic are the alpha-stable distributions.

Journal ArticleDOI
TL;DR: This paper applies energy saving mechanisms for security protocols in wireless networks to existing security protocols and demonstrates the reduction in energy consumption that is possible with the suggested approaches.

Journal ArticleDOI
TL;DR: A new methodology for evaluating fault recovery performance of some existing mechanisms, which considers the establishment of quality of service network paths with protection and an analysis of the relationship between these protection components and different traffic classes is introduced.

Journal ArticleDOI
TL;DR: It is found that higher mobility speed results in better connectivity, and irrespective of the speed, when multiple connected components are present, they typically consist of a very large component and (potentially several) extremely small ones, alluding to similarities to the 'giant component' in random graphs.