University of Gloucestershire

Displaying 1-15 of 15 results

  • White Papers // Sep 2013

    SODCA: A Self-Organized Distributed Channel Access Scheme for IEEE 802.11 Networks

    Coordinating channel access is a fundamental task of the MAC layer in wireless networks. Whereas most proposed medium access techniques involve a pure contention-based mechanism or a centralized polling scheme, the authors explore distributed scheduling-based medium access. Intuitively, a scheduling-based scheme would achieve higher bandwidth efficiency and a lower collision...

    Provided By University of Gloucestershire

  • White Papers // Sep 2012

    Towards Robust Key Extraction From Multipath Wireless Channels

    This paper tackles the problem of generating shared secret keys based on the physical characteristics of the wireless channel. The authors propose intelligent quantization mechanisms for key generation, achieving high secret bits generation rate. Moreover, some practical issues affecting the performance of the key generation mechanism are deeply investigated. Mainly,...

    Provided By University of Gloucestershire

  • White Papers // Apr 2012

    CloudGPS: A Scalable and ISP-Friendly Server Selection Scheme in Cloud Computing Environments

    In order to minimize user perceived latency while ensuring high data availability, cloud applications desire to select servers from one of the multiple data centers (i.e., server clusters) in different geographical locations, which are able to provide desired services with low latency and low cost. This paper presents CloudGPS, a...

    Provided By University of Gloucestershire

  • White Papers // Jan 2012

    Low Overhead Dynamic Spectrum Reallocation in Opportunistic Spectrum Access Networks

    Opportunistic spectrum access, which allows secondary users opportunistically access unused licensed channels to exploit instantaneous spectrum availability, is a promising approach to achieve efficient spectrum utilization and mitigate spectrum scarcity. To address the challenge of dynamic spectrum access, one of the most important issues is cooperative spectrum reallocation among secondary...

    Provided By University of Gloucestershire

  • White Papers // Jan 2012

    NF-TCP: A Network Friendly TCP Variant for Background Delay-Insensitive Applications

    Delay-insensitive applications, such as P2P file sharing, generate substantial amounts of traffic and compete with other applications on an equal footing when using TCP. Further, to optimize throughput, such applications typically open multiple connections. This results in unfair and potentially poor service for applications that have stringent performance objectives (including...

    Provided By University of Gloucestershire

  • White Papers // Dec 2011

    G-COPSS: A Content Centric Communication Infrastructure for Gaming Applications

    With users increasingly focused on an online world, an emerging challenge for the network infrastructure is the need to support Massively Multiplayer Online Role Playing Games (MMORPG). This is an application domain that is attracting more players than ever before, very often with players distributed over a metropolitan area. Currently,...

    Provided By University of Gloucestershire

  • White Papers // May 2011

    PS-CCN: Achieving an Efficient Publish/Subscribe Capability for Content-Centric Networks

    Content-Centric Networks (CCN) provide a substantial degree of flexibility for users and end-systems to obtain information without regard to their location or source. Publish/subscribe (pub/sub) systems have gained popularity in society to provide the same convenience for users. Currently, on the Internet, such pub/sub systems have been built on top...

    Provided By University of Gloucestershire

  • White Papers // Apr 2011

    Gemstone: Empowering Decentralized Social Networking With High Data Availability

    Social networking platforms such as Facebook, MySpace, Twitter, and many others have seen an enormous increase in user population and user provided information. However, users are increasingly concerned about identity and data privacy since information is aggregated at single companies. To address this issue researchers have been investigating alternative solutions,...

    Provided By University of Gloucestershire

  • White Papers // Feb 2010

    NC-APT: An Efficient and Scalable Download Mirror Selecting System

    When large files are offered by many mirrors for clients to download, selecting the proper download mirrors is necessary in speeding up the clients' download. The existing method, which measures all the Round Trip Time (RTT) between clients and all mirrors, costs much time and Internet traffic. In this paper,...

    Provided By University of Gloucestershire

  • White Papers // Nov 2009

    TORI: User Provided Future Networking Testbeds

    The usage of test-beds is considered a key tool for exploring the development of new protocols and network architectures in the area of network research. Test-beds, together with simulations, are the basic tool set of network researchers to drive research, but often it is impossible to get feedback from real...

    Provided By University of Gloucestershire

  • White Papers // Oct 2009

    Marketing Sustainable Consumption Within Stores: A Case Study Of The UK's Leading Food Retailers

    Sustainable consumption is a core policy objective within the UK Government's Sustainable Development Strategy and there is a growing awareness that retailers have a vital role to play in promoting more sustainable patterns of consumption. This paper explores how the UK's top ten food retailers are communicating sustainable consumption agendas...

    Provided By University of Gloucestershire

  • White Papers // Sep 2009

    A Unified Security Backplane for Trust and Reputation Systems in Decentralized Networks

    In decentralized networks such as Peer-to-Peer (P2P), challenged networks (e.g. DTNs) or Wireless Mesh networks (WMN) nodes have to rely on the service provided by other participating nodes. From a node's perspective it could be desirable to utilize the other nodes' services without contributing its own resources in return. Examples...

    Provided By University of Gloucestershire

  • White Papers // Mar 2009

    Loop-Free Forwarding Table Updates With Minimal Link Overflow

    The forwarding paths in an IP network may change due to a link failure, network equipment maintenance, or reconfiguration of link weights. The forwarding tables in the routers need then to be updated. These updates may cause transient loops and link overflow, if they are not performed in an appropriate...

    Provided By University of Gloucestershire

  • White Papers // Nov 2008

    Firewall Traversal in Mobile IPv6 Networks

    Middleboxes such as firewalls are an important aspect for a majority of IP networks today. Current IP networks are predominantly based on IPv4 technology, and hence various firewalls as well as Network Address Translators (NATs) have been originally designed for these networks. Deployment of IPv6 networks is currently work in...

    Provided By University of Gloucestershire

  • White Papers // Sep 2008

    Technologies and Mechanics Behind Virtual Worlds Final Report

    Today virtual worlds are mainly 3D-online-infratructures. The most important goal is the creation and simulation of a so called \"Metaverse\". It describes a world similar to the reality, where people are able to interact with each other represented by avatars. They can also move around or use and combine virtual...

    Provided By University of Gloucestershire

  • White Papers // Sep 2012

    Towards Robust Key Extraction From Multipath Wireless Channels

    This paper tackles the problem of generating shared secret keys based on the physical characteristics of the wireless channel. The authors propose intelligent quantization mechanisms for key generation, achieving high secret bits generation rate. Moreover, some practical issues affecting the performance of the key generation mechanism are deeply investigated. Mainly,...

    Provided By University of Gloucestershire

  • White Papers // Oct 2009

    Marketing Sustainable Consumption Within Stores: A Case Study Of The UK's Leading Food Retailers

    Sustainable consumption is a core policy objective within the UK Government's Sustainable Development Strategy and there is a growing awareness that retailers have a vital role to play in promoting more sustainable patterns of consumption. This paper explores how the UK's top ten food retailers are communicating sustainable consumption agendas...

    Provided By University of Gloucestershire

  • White Papers // Apr 2012

    CloudGPS: A Scalable and ISP-Friendly Server Selection Scheme in Cloud Computing Environments

    In order to minimize user perceived latency while ensuring high data availability, cloud applications desire to select servers from one of the multiple data centers (i.e., server clusters) in different geographical locations, which are able to provide desired services with low latency and low cost. This paper presents CloudGPS, a...

    Provided By University of Gloucestershire

  • White Papers // Apr 2011

    Gemstone: Empowering Decentralized Social Networking With High Data Availability

    Social networking platforms such as Facebook, MySpace, Twitter, and many others have seen an enormous increase in user population and user provided information. However, users are increasingly concerned about identity and data privacy since information is aggregated at single companies. To address this issue researchers have been investigating alternative solutions,...

    Provided By University of Gloucestershire

  • White Papers // Dec 2011

    G-COPSS: A Content Centric Communication Infrastructure for Gaming Applications

    With users increasingly focused on an online world, an emerging challenge for the network infrastructure is the need to support Massively Multiplayer Online Role Playing Games (MMORPG). This is an application domain that is attracting more players than ever before, very often with players distributed over a metropolitan area. Currently,...

    Provided By University of Gloucestershire

  • White Papers // Jan 2012

    Low Overhead Dynamic Spectrum Reallocation in Opportunistic Spectrum Access Networks

    Opportunistic spectrum access, which allows secondary users opportunistically access unused licensed channels to exploit instantaneous spectrum availability, is a promising approach to achieve efficient spectrum utilization and mitigate spectrum scarcity. To address the challenge of dynamic spectrum access, one of the most important issues is cooperative spectrum reallocation among secondary...

    Provided By University of Gloucestershire

  • White Papers // Jan 2012

    NF-TCP: A Network Friendly TCP Variant for Background Delay-Insensitive Applications

    Delay-insensitive applications, such as P2P file sharing, generate substantial amounts of traffic and compete with other applications on an equal footing when using TCP. Further, to optimize throughput, such applications typically open multiple connections. This results in unfair and potentially poor service for applications that have stringent performance objectives (including...

    Provided By University of Gloucestershire

  • White Papers // May 2011

    PS-CCN: Achieving an Efficient Publish/Subscribe Capability for Content-Centric Networks

    Content-Centric Networks (CCN) provide a substantial degree of flexibility for users and end-systems to obtain information without regard to their location or source. Publish/subscribe (pub/sub) systems have gained popularity in society to provide the same convenience for users. Currently, on the Internet, such pub/sub systems have been built on top...

    Provided By University of Gloucestershire

  • White Papers // Feb 2010

    NC-APT: An Efficient and Scalable Download Mirror Selecting System

    When large files are offered by many mirrors for clients to download, selecting the proper download mirrors is necessary in speeding up the clients' download. The existing method, which measures all the Round Trip Time (RTT) between clients and all mirrors, costs much time and Internet traffic. In this paper,...

    Provided By University of Gloucestershire

  • White Papers // Mar 2009

    Loop-Free Forwarding Table Updates With Minimal Link Overflow

    The forwarding paths in an IP network may change due to a link failure, network equipment maintenance, or reconfiguration of link weights. The forwarding tables in the routers need then to be updated. These updates may cause transient loops and link overflow, if they are not performed in an appropriate...

    Provided By University of Gloucestershire

  • White Papers // Nov 2009

    TORI: User Provided Future Networking Testbeds

    The usage of test-beds is considered a key tool for exploring the development of new protocols and network architectures in the area of network research. Test-beds, together with simulations, are the basic tool set of network researchers to drive research, but often it is impossible to get feedback from real...

    Provided By University of Gloucestershire

  • White Papers // Sep 2009

    A Unified Security Backplane for Trust and Reputation Systems in Decentralized Networks

    In decentralized networks such as Peer-to-Peer (P2P), challenged networks (e.g. DTNs) or Wireless Mesh networks (WMN) nodes have to rely on the service provided by other participating nodes. From a node's perspective it could be desirable to utilize the other nodes' services without contributing its own resources in return. Examples...

    Provided By University of Gloucestershire

  • White Papers // Sep 2008

    Technologies and Mechanics Behind Virtual Worlds Final Report

    Today virtual worlds are mainly 3D-online-infratructures. The most important goal is the creation and simulation of a so called \"Metaverse\". It describes a world similar to the reality, where people are able to interact with each other represented by avatars. They can also move around or use and combine virtual...

    Provided By University of Gloucestershire

  • White Papers // Nov 2008

    Firewall Traversal in Mobile IPv6 Networks

    Middleboxes such as firewalls are an important aspect for a majority of IP networks today. Current IP networks are predominantly based on IPv4 technology, and hence various firewalls as well as Network Address Translators (NATs) have been originally designed for these networks. Deployment of IPv6 networks is currently work in...

    Provided By University of Gloucestershire

  • White Papers // Sep 2013

    SODCA: A Self-Organized Distributed Channel Access Scheme for IEEE 802.11 Networks

    Coordinating channel access is a fundamental task of the MAC layer in wireless networks. Whereas most proposed medium access techniques involve a pure contention-based mechanism or a centralized polling scheme, the authors explore distributed scheduling-based medium access. Intuitively, a scheduling-based scheme would achieve higher bandwidth efficiency and a lower collision...

    Provided By University of Gloucestershire