Results 1 - 10
of
7,997
Table 2. Cross-layer LDA
Table 1. Cross-layer LDA
"... In PAGE 2: ... The idea of our alternative algorithm is to count the number of MAC retransmissions for each of the n segments composing the current TCP window when the TCP layer is alerted by the reception of three duplicated ACKs. As described in Table1 , if for one of these segments at least, the number of MAC retransmissions (RetryCount) is equal to the Retry Limit threshold (its default value is 6 for all the 802.11 equipments), we consider that the loss is due to interferences and not to TCP congestion.... ..."
Table 1. Cross-layer Information Produced by Different Protocol Layers
2006
"... In PAGE 3: ... To this end, we first identify the different cross-layer information. Table1 presents a snap- shot of such information commensurate with the functionality provided by a particular layer. For example, the link layer (such as SP [15]) uses the physical condition of the environment as input to produce link status information as output that may be useful to other modules.... In PAGE 5: ...Table1 presents a snapshot of such data com- mensurate with the functionality provided by a particular layer. For example, the link layer (such as SP) uses the physical condition of the environment as input to produce link status information as output that may be useful to other modules.... ..."
Cited by 1
Table 1. WSN projects on cross-layer design
2007
"... In PAGE 7: ...4 Table1 summarizes the projects reviewed in this paper. Table 1.... ..."
Cited by 1
Table 2. Comparison of WSN projects
2007
"... In PAGE 8: ....3. Comparative Study and Summary This part of the paper will compare different current research design factors and interaction approaches of cross-layer communication protocols for WSN. Table2 presents a comparison of different relevant research projects on cross-layer design for WSNs in terms of the cross-layer design factors and interaction approaches outlined previously with a view to addressing the challenges they have encountered. Table 2.... In PAGE 8: ...We have presented a comparison of WSN projects in Table2 , comparing the projects in terms of cross- layer design factors and interaction approaches. Next, we summarize the challenges addressed by these different projects and suggested some solutions as follows: i.... ..."
Cited by 1
Table 3: Cross-layer Information Produced by Difierent Protocol Layers Protocol Layer Sample Implementa-
2006
"... In PAGE 69: ... To this end, we flrst identify the difierent cross-layer information. Table3 presents a snapshot of such information com- mensurate with the functionality provided by a particular layer. For example, the link layer (such as SP [61]) uses the physical condition of the environment as input to produce \link status quot; information as output that may be useful to other modules.... In PAGE 71: ... we flrst identify the difierent cross-layer data and develop a taxonomy for grouping them. Table3 presents a snapshot of such data commensurate with the functionality provided by a particular layer. For example, the link layer (such as SP) uses the physical condition of the environment as input to produce \link status quot; information as output that may be useful to other modules.... ..."
Table 1. Enterprise Architecture as a Cross layer View of Aggregate Artifacts
Table 4: Example XML descriptions for a taxonomy of cross layer information
2006
"... In PAGE 71: ... Important resources to identify include details regarding available energy, CPU, memory, radio, and sensors. Table4 shows an example in this category for a battery resource.... In PAGE 72: ...an collect routing metric based information, e.g., energy, location, and availability. Table4 shows an example entry for a node in the neighborhood. Using this information, a link layer protocol can use the timeOn and the timeOfi flelds to minimize idle listening.... In PAGE 73: ... We group them as wildcard in our taxonomy. Table4 shows an example wildcard entry (the speciflc entry shown describes the role played by a node in a DFuse application). 4.... ..."
Table I qualitatively compares the existing methods with CLASS under the above criteria (extended). In short, CLASS overcomes the two major drawbacks aforementioned. TABLE I: COMPARISON OF THE CROSS-LAYER SIGNALLING METHODS
TABLE I COMPARISON OF TCP AND NETWORK CROSS LAYER PROPOSALS TO DISTINGUISH BETWEEN LOSSES DUE TO ROUTE FAILURES AND CONGESTION.
2005
Cited by 3
Results 1 - 10
of
7,997