Learn More
Mobility is one of the major issues in the performance characterization of wireless communication systems. Various approaches exist in the literature for performance evaluation of mobile systems, especially the handoff phenomenon. However, since the probability of an ongoing call being dropped due to a handoff failure and the probability of a new call being(More)
In recent years, there has been a huge trend towards running network intensive applications, such as Internet servers and Cloud-based service in virtual environment, where multiple virtual machines (VMs) running on the same machine share the machine's physical and network resources. In such environment, the virtual machine monitor (VMM) virtualizes the(More)
The increase on the demand of IT resources diverted enterprises to the use of costly physical servers. However, besides cooling and power cost, most of the times, physical servers are poorly utilized. Server virtualization is a way of better utilizing such resources and reducing power consumption. In this paper, a performance model for two virtual servers(More)
Mobility is one of the major issues in the performance characterization of wireless communication systems. Wireless communication systems encounter failures. These failures can occur because of software, hardware, human error, or a combination of these factors. The probability of an ongoing call being dropped due to a handoff failure and the probability of(More)
Open queuing network systems are useful in the computer industry. In this paper, a multi-node open network, with heterogeneous nodes, each node serving external as well as routed internal arrivals of jobs is considered. The nodes are prone to failures and repairs, the buffers are of finite size. An approximate performability model is developed based on an(More)
Kerberos is a widely used computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. This paper presents an approach that involves a new authentication protocol that combines delaying the decryption with timed authentication by using passwords and(More)
A Wireless Sensor Network (WSN) is composed of distributed sensors with limited processing capabilities and energy restrictions. These unique attributes pose new challenges amongst which prolonging the WSN lifetime is one of the most important. Challenges are often tackled by a code-and-fix process that relies on low-level hardware and software information.(More)
Data encryption process can easily be quite complicated and usually requires significant computation time and power despite significant simplifications. This paper discusses about pipelined and non-pipelined implementation of one of the most commonly used symmetric encryption algorithm, Data Encryption Standard (DES). The platform used for this matter is,(More)
Multi-channel assignments are becoming the solution of choice to improve performance in single radio for wireless networks. Multi-channel allows wireless networks to assign different channels to different nodes in real-time transmission. In this paper, we propose a new approach, Multi-channel Distributed Coordinated Function (MC-DCF) which takes advantage(More)