Evaluation of well-known protocol implementation techniques for application in mobile networks

被引:0
|
作者
Langendörfer, P [1 ]
König, H [1 ]
机构
[1] IHP Microelect, D-15204 Frankfurt, Germany
关键词
protocol implementation techniques; wireless networks; energy saving; integrated layer processing; adaptable protocol implementations;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we discus the impact of protocol implementation on the achivable protocol performance. First we present several implementation techniques that; are expected to speed up protocol processing. Then we introduce the eXample Data Transfer (XDT) Protocol that we used for the performance evaluation. Our simulation results show that implementation techniques that lead to a reasonable speed up in wired networks are not always suitable for errorprone wireless networks.
引用
收藏
页码:451 / 457
页数:7
相关论文
共 50 条
  • [21] The Effect of Group Membership and Individuating Information on Automatic and Deliberate Evaluation of Well-Known People
    Navon, Mayan
    Shechter, Anat
    Bar-Anan, Yoav
    JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY, 2021, 121 (03) : 498 - 523
  • [22] Evaluation of Antileukemic and Antimalarial Potential of Zanthoxylum rhetsa DC (Rutaceae), A Well-known Spice
    Mallya, Rashmi
    Bhitre, Milind
    CURRENT DRUG THERAPY, 2022, 17 (03) : 208 - 216
  • [23] Evaluation of the Multimetric Proactive Routing Protocol Implementation for Mobile Ad-Hoc Networks
    Krygier, Jaroslaw
    Bednarczyk, Mariusz
    Maslanka, Krzysztof
    2012 19th International Conference on Microwave Radar and Wireless Communications (MIKON), Vols 1 and 2, 2012, : 259 - 261
  • [24] WHETHER A TRADEMARK QUALIFIES AS A WELL-KNOWN MARK?-APPLICATION OF BAD FAITH IN DETERMINING THE DEGREE OF WELL-KNOWNNESS
    Chang, Ai-Tang Irene
    NTUT JOURNAL OF INTELLECTUAL PROPERTY LAW AND MANAGEMENT, 2012, 1 (01): : 53 - 93
  • [25] Implementation of an Optimized Steganography Technique over TCP/IP and Tests Against Well-Known Security Equipment
    Tarhda, Mohamed
    El Gouri, Rachid
    Hlou, Laamari
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2018, 8 (06) : 3515 - 3520
  • [26] Implementation of a cluster based routing protocol for mobile networks
    Marshall, G
    Erciyes, K
    COMPUTATIONAL SCIENCE - ICCS 2005, PT 1, PROCEEDINGS, 2005, 3514 : 388 - 395
  • [27] (Im)politeness in Paremiology the Application of Well-Known Proverbs in Politeness Education in the Academic Environment in Poland
    Maj-Malinowska, Barbara
    PHRASEOLOGIE UND PAROMIOLOGIE DER (UN)HOEFLICHKEIT, 2019, 1 : 337 - 348
  • [28] Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application
    Miluzzo, Emiliano
    Lane, Nicholas D.
    Fodor, Kristof
    Peterson, Ronald
    Lu, Hong
    Musolesi, Mirco
    Eisenman, Shane B.
    Zheng, Xiao
    Campbell, Andrew T.
    SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, 2008, : 337 - 350
  • [29] A model-based evaluation of several well-known variance estimators for the combined ratio estimator
    Kott, PS
    STATISTICA SINICA, 1998, 8 (04) : 1165 - 1173
  • [30] Performance evaluation of several well-known and new scintillators for MeV X-ray imaging
    Tisseur, D.
    Estre, N.
    Tamagno, L.
    Eleon, C.
    Eck, D.
    Payan, E.
    Cherepy, N.
    2018 IEEE NUCLEAR SCIENCE SYMPOSIUM AND MEDICAL IMAGING CONFERENCE PROCEEDINGS (NSS/MIC), 2018,