Results 1 - 10
of
5,631
Testing IPv6 Routers with the Neighbor Discovery Protocol
"... reproduced in whole or in part, by photocopy ..."
On designing neighbor discovery protocols: a code-based approach
- In Proceedings of IEEE INFOCOM
, 2014
"... Abstract—In mobile wireless networks, the emerging proximity-based applications have led to needs for highly effective and energy-efficient neighbor discovery protocols. However, existing works cannot realize the optimal worst-case latency in symmetric case, and their performances with asymmetric du ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract—In mobile wireless networks, the emerging proximity-based applications have led to needs for highly effective and energy-efficient neighbor discovery protocols. However, existing works cannot realize the optimal worst-case latency in symmetric case, and their performances with asymmetric
1Code-Based Neighbor Discovery Protocols In Mobile Wireless Networks
"... Abstract—In mobile wireless networks, the emerging proximity-based applications have led to the need for highly effective and energy-efficient neighbor discovery protocols. However, existing works cannot realize the optimal worst-case latency in symmetric case, and their performances with asymmetric ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract—In mobile wireless networks, the emerging proximity-based applications have led to the need for highly effective and energy-efficient neighbor discovery protocols. However, existing works cannot realize the optimal worst-case latency in symmetric case, and their performances
Automatic testing of neighbor discovery protocol based on fsm and ttcn
- In The 2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceedings., pages 805 – 809 vol.2, Bejing
, 2004
"... Abstract — Protocol conformance testing is an important method to ensure the quality of network communication software. In this paper, we present a formal method to test neighbor discovery protocol, which is one of the basic IPv6 protocols. The formal model EFSM is extended with simple timed operati ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract — Protocol conformance testing is an important method to ensure the quality of network communication software. In this paper, we present a formal method to test neighbor discovery protocol, which is one of the basic IPv6 protocols. The formal model EFSM is extended with simple timed
ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks
"... Slot assignment is crucial for time-multiplexed channel access schemes. All existing approaches for slot assignment assume that the network nodes are synchronized with high precision, which is costly to maintain. We propose a novel slot assignment protocol which does not rely on time synchronization ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
synchronization among nodes in the network. As a byproduct, each node discovers its neighbors along with a local schedule of their channel access times, which is a crucial piece of information for many networking protocols. We describe our approach, present the Asynchronous Slot Assignment and Neighbor Discovery
1 ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks
"... Slot assignment is crucial for time-multiplexed channel access schemes. All existing approaches for slot assignment assume that the network nodes are synchronized with high precision, which is costly to maintain. We propose a novel slot assignment protocol which does not rely on time synchronization ..."
Abstract
- Add to MetaCart
synchronization among nodes in the network. As a byproduct, each node discovers its neighbors along with a local schedule of their channel access times, which is a crucial piece of information for many networking protocols. We describe our approach, present the Asynchronous Slot Assignment and Neighbor Discovery
A Novel Neighbor Discovery Protocol for Ultraviolet Wireless Networks
"... Ultraviolet (UV) communication is an attractive option for tactical networks or environmental monitoring. The underlying UV PHY layer has unique characteristics that render previously proposed higher layer protocols for RF communications inappropriate or inefficient. Neighbor discovery is an importa ..."
Abstract
- Add to MetaCart
Ultraviolet (UV) communication is an attractive option for tactical networks or environmental monitoring. The underlying UV PHY layer has unique characteristics that render previously proposed higher layer protocols for RF communications inappropriate or inefficient. Neighbor discovery
An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6
"... The Neighbor Discovery Protocol (NDP) is one of the main protocols in the Internet Protocol version 6 (IPv6) suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN), such as address autoconfiguration and address resolution. However, it has many vul ..."
Abstract
- Add to MetaCart
The Neighbor Discovery Protocol (NDP) is one of the main protocols in the Internet Protocol version 6 (IPv6) suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN), such as address autoconfiguration and address resolution. However, it has many
PERFORMANCE COMPARISON OF NEIGHBOR DISCOVERY PROTOCOLS IN WIRELESS AD-HOC NETWORK
, 2015
"... In this thesis we consider the problem of neighbor discovery in synchronous single hop wireless ad-hoc networks. The central problem is to establish a broadcasting sequence such that only one transmitter broadcasts at a time while all others listen and every transmitter in the network gets at least ..."
Abstract
- Add to MetaCart
In this thesis we consider the problem of neighbor discovery in synchronous single hop wireless ad-hoc networks. The central problem is to establish a broadcasting sequence such that only one transmitter broadcasts at a time while all others listen and every transmitter in the network gets at least
Results 1 - 10
of
5,631