1 |
C. Makaya and S. Pierre, "An analytical framework for performance evaluation of IPv6-based mobility management protocols," IEEE Trans. Wireless Commun., vol. 7, no. 3, pp. 972-983, Mar. 2008.
DOI
|
2 |
H. Fathi, S. S. Chakraborty, and R. Prasad, "Optimization of mobile IPv6-based handovers to support VoIP services in wireless heterogeneous networks," IEEE Trans. Veh. Technol., vol. 56, no. 1, pp. 260-270, Jan. 2007.
DOI
|
3 |
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11, 2007.
|
4 |
N. Banerjee, W. Wu, S. K. Das, S. Dawkins, and J. Pathak, "Mobility support in wireless internet," IEEE Wireless Commun., vol. 10, no. 5, pp. 54-61, Oct. 2003.
|
5 |
Higher Speed Ethernet Requirements, http://www.ieee802.org/3/hssg/public/nov06/perkins_01_1106.pdf
|
6 |
http://www.openmaniak.com/iperf.php#jperf
|
7 |
A. K. Haddad and R. H. Riedi, "Bounds on the benefit of network coding for wireless multicast and unicast," IEEE Trans. Mob. Comput., vol. 13, no. 1, pp. 102-115, Jan. 2014.
DOI
|
8 |
S. Zargar, J. Joshi, and D. Tipper, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks," IEEE Commun. Surv. Tuts., vol. 15, no. 4, pp. 2046-2069, Nov. 2013.
DOI
|
9 |
Y. R. Choi, J. Y. Chung, B. C. Park, and J. W. K. Hong, "A study on system architecture for application-level mobile traffic monitoring and analysis," KNOM Review, vol. 14, no. 2, pp. 10-21, Dec. 2011.
|