Showing 4,321 - 4,340 results of 4,508 for search '"The Forward"', query time: 0.04s Refine Results
  1. 4321

    SDN resolve space-ground integrated network based on end side computing by Jinglin LI, Xiaolan WAN

    Published 2020-07-01
    “…There is a complex network structure of space-ground integrated network.And this kind of network has heterogeneous network,dynamic topology,intermittently connected node height exposure,and so on.There are many limitations in traditional SDN implementation.A method of SDN implement based on end side computing and a space-ground integrated network based on SDN were presented,which separated space network control and data,using the computing power of the communication terminal (mobile terminal and fixed ground backbone network),unloading the calculation of SDN controller in space-based plane,thus simplifying the data forwarding plane.A practical and effective verification method was also proposed.…”
    Get full text
    Article
  2. 4322

    Anti-frequency-shift packet detection for D2D power-saving communications over Wi-Fi network by Fan YANG, Xi LIANG, Ke-yu LONG, Li JIANG

    Published 2016-10-01
    “…An efficient packet detection scheme based on Wi-Fi interface was proposed.It was implemented by employing a novel normalized factor as a denominator in OFDM symbol synchronization-timing metric.Compared to the old-tradition schemes,the proposed scheme can not only obtain great detection probability,but also achieve the threshold setting without pre-estimation of frequency offset.Both theoretical analysis and conducted simulation results show that the new scheme facilitates threshold selection for a wide range of signal-to-noise ratio (SNR) in additive white Gaussian noise (AWGN) channel.Besides,the threshold setting in multi-path Rayleigh fading channels can be determined according to the AWGN case straight forwardly.…”
    Get full text
    Article
  3. 4323

    Multiple Addressing Coordination and Switching Technology in Space-Integrated-Ground Information Network by Wenlan DIAO, Jianping AN, Yu ZHANG, Han HU

    Published 2020-12-01
    “…The construction requirements and deployment status of the space-integrated-ground integrated information network was analyzed, and the diffi culties in the integration of satellite network and internet was discussed.To tackle the problems of complex network structure, high dynamic topology, diffi cult data compatibility and limited satellite resources, a multi addressing coordination and switching technology based on IP address, ID identifi cation and content name was proposed.In particular, a multi addressing datagram format was designed, and the multi addressing route forwarding mechanism was extended.It could realized the interconnection of heterogeneous networks, the stability of mobile communication, the compatible switching of polymorphic data, and the effi cient routing with low power consumption of satellites.…”
    Get full text
    Article
  4. 4324

    Research on distributed mobile management of satellite network based on software define network by Heng-zhi LI, Chun-feng WANG, Wei-zhong WANG, Jie ZHANG

    Published 2017-10-01
    “…Distributed mobility management (DMM) was an effective method to solve the mobile address handover.Therefore,it was considered to be a technology that can be applied to satellite network mobility management.A distributed mobile management scheme which based on software definition network (SDN) was proposed to solve the traffic redirection problem in satellite network.Different from the traditional DMM application scenario which was network-based or terminal-based,the SDN-DMM scheme implements location management and address handover in SDN controllers.Therefore,SDN-based satellite network distributed mobile management scheme can realize packet forwarding path optimization compared with traditional scheme,and it shows significant advantages in managementcost and traffic management.…”
    Get full text
    Article
  5. 4325

    Study on game-based incentive mechanism of mobile ad hoc network by Ying-you WEN, Bo ZHAO, Hong ZHAO

    Published 2014-04-01
    “…According to the selfishness of rational mobile ad hoc network nodes showed during the packet forwarding, the selfish behavior statically and dynamically based on game theory were analyzed and modeled. …”
    Get full text
    Article
  6. 4326

    Detection of selfish nodes based on credit mechanism in opportunistic networks by Zuo-yong TANG, Yi-jia YUAN, Yong-qiang DONG, Guo-xin WU

    Published 2012-11-01
    “…The existence of selfish nodes seriously affects the routing performance of opportunistic networks(OppNet).To protect the OppNet against the nodes’ selfish behavior,a credit-based selfish nodes detection mechanism was proposed to make it possible to keep away from such nodes during the process of message forwarding.The mechanism leverages 2-ACK messages to observe the nodes’behavior.Then the credit value was calculated based on the observation information and accordingly acts as the metric to distinguish the selfish nodes.Simulation results show that,when coupled with various routing algorithms,the mechanism could detect selfish nodes out accurately,and improve network performance effectively in terms of delivery rate and traffic load.…”
    Get full text
    Article
  7. 4327

    Aggregation algorithm for MPLS multicast flows based on bidirectional shared tree by LI Ling-zhi1, ZHU Yan-qin1, YANG Zhe1

    Published 2010-01-01
    “…The processes of medium nodes are simplified and the forwarding states of routers are reduced in the algorithm. …”
    Get full text
    Article
  8. 4328

    Secure-Network-Coding-Based File Sharing via Device-to-Device Communication by Lei Wang, Qing Wang

    Published 2017-01-01
    “…In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. …”
    Get full text
    Article
  9. 4329

    An energy-efficient multi-channel MAC protocol for linear sensor network by Fei TONG, Rucong SUI, Yu CHEN, Heng SU, Hengrui LIU, Shangfeng SU, Yuke YAN

    Published 2022-12-01
    “…Sensor nodes in linear sensor network (LSN) are deployed linearly due to the linear topology of the monitoring area.Most of the state-of-the-art medium access control (MAC) protocols designed for LSN adopted the duty-cycling and pipelined-forwarding (DCPF) schemes.They can reduce data propagation delay and network energy consumption but may still cause issues such as transmission competition, interference, and energy hole.To address these issues, an improved DCPF MAC protocol was proposed based on multiple channels and redundant-node deployment for LSN.The extensive simulations based on OPNET demonstrate that, compared with existing protocols, the proposed protocol shows a better performance in terms of energy efficiency, packet delivery ratio, throughput, and packet transmission latency.…”
    Get full text
    Article
  10. 4330

    The Content and Game Action Weight of Senior Football Players as Goalkeeper by A. Dinca, C. Ciorba

    Published 2024-12-01
    “…The players in the football teams are strictly specialized in playing positions, which are four in number: goalkeeper, defenders, midfielders, and forwards. The given article represents an extensive analysis of all the footballers’ actions in the position of Goalkeeper, here being analyzed in detail the content of the actions of the footballers in the position of Goalkeeper, as well as their weight in an official match. …”
    Get full text
    Article
  11. 4331

    Les réformes contre le redoublement ou les limites des recherches non collaboratives by Sabine Kahn

    Published 2010-06-01
    “…At the political level, research results are translated into instructions forwarded to teachers; these instructions take the shape of strategies to be implemented in their classes. …”
    Get full text
    Article
  12. 4332

    Random Dissemination Algorithm of Stete-Updating Message for Distributed Virtual Environments of P2P Architecture by Tao Li, Hua Hu, Haiyang Hu

    Published 2014-10-01
    “…The greedy routing algorithm can find the forwarding route and obtain the message-spreading time between the source and the destinations. …”
    Get full text
    Article
  13. 4333

    FALB: a FC protocol link aggregation algorithm by Zhaohui WANG, Jianliang SHEN, Xia ZHANG, Ting CHEN

    Published 2021-09-01
    “…Link aggregation is a common technology to increase the bandwidth by bundling multiple physical links into a logical link.However, in a switching network based on the fibre channel (FC) protocol, as the forwarding traffic continues to concentrate, traditional static link aggregation algorithms have problems of poor load balance and low reliability.A dynamic load balancing link aggregation algorithm flow adaptive load balancing (FALB) based on FC protocol messages was proposed, which could realize dynamic adaptive matching of traffic and a reconnection protection mechanism for broken links.The results show that compared with the static load balancing algorithm design, the algorithm mechanism could maintain the effective bandwidth ratio above 95%, effectively improving the load balancing characteristics and reliability of the aggregated link.…”
    Get full text
    Article
  14. 4334

    Design and implementation of semi-physical simulation platform in space delay tolerant network by Siyao ZHANG, Jing WU, Hao JIANG, Yufan XIANG

    Published 2016-07-01
    “…The architecture of space delay tolerant networking can effectively support a deep space communication network with long delay,high error rate and on-off frequently link characteristics through“store-carry-forwards”and other features.Due to the experiment of application of deep space communication is not easy to carry,so building an accurate and reliable semi-physical simulation platform for simulating and making an argumentation of the design of deep space communication tasks was very necessary.A space DTN semi-physical simulation platform was proposed which supported a variety of specific deep space communication tasks simulation.The simulation platform provided new theory and technology for ground simulation and verification,and provided analysis tools and test instruments for carrying out deep space communication application study.…”
    Get full text
    Article
  15. 4335

    Research on improving the registration success rate of VoWi-Fi under multiple equivalent path scenarios by Deyi CHENG, Jian QIAO

    Published 2019-01-01
    “…When IPSec faces a path forwarding fault in a multi-equivalent path environment of a metropolitan area network, it can't actively evade, and the service can't be registered. …”
    Get full text
    Article
  16. 4336

    Improved SpaceTwist privacy protection method based on anchor optimization algorithm by Zhen-peng LIU, Xuan ZHAO, Ya-wei DONG, Bin ZHANG

    Published 2017-10-01
    “…With location-based services worldwide used,private location data appealed easily in query process which caused serious security problems.So the introduction of SpaceTwist incremental nearest neighbor query algorithm,proposes protection of privacy method combined with improved SpaceTwist location optimization algorithm.The anchor point authentication server added to distributed system structure,user generate a k anonymous area according to their privacy preference and actual environment,using optimization algorithm to generate the anchor point.Forwarding users use the incremental nearest neighbor query throught the anchor point and accurate.Experiments in road network environment with different data sets show that the privacy protection works well in the algorithm,and own high work efficiency.…”
    Get full text
    Article
  17. 4337

    Research on dynamic routing mechanism in network simulation by HAO Zhi-yu, ZHAI Jian-hong, YUN Xiao-chun, ZHANG Hong-li

    Published 2007-01-01
    “…A fundamental requirement for any network simulation environment is the realistic forwarding of packets from a source to a destination in the simulated topology.The routing decisions will be affected by topology changes.In almost all current simulators,all the nodes know the topology changes instantaneously,which is obviously unrealistic.The model of dynamic routing was presented and analyzed.Further an approach was proposed to compute the time needed for each node to know the topology changes,and dynamic MTree<sub>N</sub>ix routing mechanism was presented,which maintains static routing table and a message queue of topology changes,and looks up routing states according to the known time of different changes.Experimental results show that our approach can improve the realism of dynamic routing in network simulation,with high simulation efficiency.…”
    Get full text
    Article
  18. 4338

    Moving target defense against network eavesdropping attack using POF by Duohe MA, Qiong LI, Dongdai LIN

    Published 2018-02-01
    “…Eavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches.Since existing encryption or dynamic address methods could only confuse part of fields of network protocols,they couldn’t form a comprehensive protection.Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed,through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy.It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.Experiments and compare studies show its efficiency.…”
    Get full text
    Article
  19. 4339

    GBSS:researches on group-based semantic search by CHEN Hai-tao, GONG Zheng-hu, HUANG Zun-guo

    Published 2006-01-01
    “…A group-based semantic search method-GBSS was presented.With regard to architecture,GBSS introduced a hybrid architecture in which the storage and search of raw data was based on DHT network,but the storage and search of meta-data was based on unstructured P2P network.With regard to search algorithm,GBSS presented a file grouping method without users’ description and constructs friend relations between nodes based on search interests and sharing files.The design idea came from some conclusions of P2P researches and complex network researches.The forwarding of user requests came use of friend relations in search process,which integrated effective caching strategy.The simulation tests prove that the GBSS algorithm is efficient,stable,and the performance improved times compared with traditional algorithms.…”
    Get full text
    Article
  20. 4340

    5G deterministic network key technology research and application by ZHU Shiyin, YANG Jian, KONG Lei

    Published 2024-08-01
    “…Secondly, cyclic queue forwarding technology was explored in 5G networks to eliminate end-to-end jitter. …”
    Get full text
    Article