Learn More
The hidden terminal problem is unique to wireless networks and as of now, there is very limited understanding about it's effects on network performance. Results are presented from a simulation study of the IEEE 802.11 MAC protocol when operating in the presence of hidden terminals. We also propose a framework for modeling hidden terminals which can handle(More)
This paper investigates the performance of IEEE 802.11 wireless local area network (WLAN) protocol's Distributed Coordination Function (DCF) in the presence of mobile and hidden terminals. In order to study the joint effect of hidden terminals and user mobility on the performance of IEEE 802.11 DCF, we extend To-bagi and Kleinrock's [14] hearing graph(More)
Mobile computing environments are characterized by slow wireless links and relatively underprivileged hosts with limited battery powers, predisposed to frequent disconnections. Caching data at the mobile hosts (MHs) in a wireless network helps alleviate problems associated with slow, limited bandwidth wireless links, by reducing latency and conserving(More)
ÐModern distributed systems involving large number of nonstationary clients (mobile hosts, MH) connected via unreliable low-bandwidth communication channels are very prone to frequent disconnections. This disconnection may occur because of different reasons: The clients may voluntarily switch off (to save battery power), or a client may be involuntarily(More)
Channel allocation schemes in a mobile computing (wireless) environment can be either static or dynamic. Static allocation offers negligible channel acquisition time and zero message complexity and works well at a low system load; the performance steadily decreases as system load increases since many calls are dropped; in case of even temporary hot spots(More)
This paper reports the modeling and implementation of a general purpose mobile computing environment. The design is modular and it incorporates all intrinsic operations of mobile computing, using the working of a mobile telephony system as a basis. The SES/Workbench has been used as the primary tool for implementation; oneof the purposes was to investigate(More)
The concept Cloud computing has not only reshaped the field of distributed systems but also fundamentally changed how business potential extends today. In recent advancements, Cloud computing applications are provided as services to end-users. The application services hosted under Cloud computing model have complex provisioning, configuration, and(More)
MANET (Mobile Ad-hoc network) is a decentralized and self-organizing network. At present trends because of its security provided by MANET, so MANET becomes one of the most important wireless communication mechanisms among all other. In MANET within the network, the intermediate nodes route the packets from the source node to the destination node without any(More)
Postoperative venous thromboembolism is one of the most serious complications following total joint arthroplasty. Pharmacological and mechanical prophylaxis methods are used to reduce the risk of postoperative symptomatic deep vein thrombosis and pulmonary embolism. Use of pharmacological prophylaxis requires a fine balance between the efficacy of the drug(More)