|
[1]IEEE Std. 802.11-1999, Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements – Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE, 1999. [2]IEEE Std. 802.11a-1999, Supplement to IEEE Standard for Information technology - Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements – Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications:High-speed Physical Layer in 5 GHz Band, IEEE, 1999. [3]IEEE Std. 802.11b-1999, Supplement to IEEE Standard for Information technology - Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements – Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications:High-speed Physical Layer Extension in 2.4 GHz Band, IEEE, 1999. [4]IEEE Std. 802.11g-2004, IEEE Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements – Part11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 4: Further Higher Data Rate Extension in the 2.4 GHz Band, IEEE, 2004. [5]C. Perkins, “IP Mobility Support,” RFC 2002, IETF, 1996. [6]A. Belenky and N. Ansari, “On IP traceback,” IEEE Communications Magazine, Volume 41, Issue 7, July 2003, pp. 142–153. [7]J. Postel, “Transmission Control Protocol,” RFC 793, IETF, January 1980. [8]Z.W. Park, J.H. Lee and M.K. Kim, “Design of an extended TCP for preventing DOS attacks,” International Symposium on Science and Technology, Volume:2, July 2003, pp.385-389. [9]R. Stewart et al., “Stream Control Transmission Protocol,” RFC 2960, IETF, October 2000. [10]Md. Nurul Islam and A. Kara, “Throughput Analysis of SCTP over a Multi-homed Association,” Proceedings of IEEE CIT’06, 2006. [11]L. Sourabh and D. A. Paul, “Improving Multiple File Transfers Using SCTP Multistreaming,” Proceedings IPCCC, April 2004. [12]J. K. Song and W. Wang, “A simulation study of IP-based vertical handoff in wireless convergent networks”, Wirel. Commun. Mob. Comput., 2006. [13]The network simulator - ns-2: http://www.isi.edu/nsnam/ns, June 2008. [14]C. Perkins, “IP Mobility Support for IPv4,” RFC 3220, IETF, 2002. [15]C. Perkins, “IP Mobility Support for IPv4,” RFC 3344, IETF, 2002. [16]S. Deering, “ICMP Router Discovery Messages,” RFC 1256, IETF, 1991. [17]ns-2 sctp module: http://pel.cis.udel.edu, June 2008. [18]K. Fall and K. Varadhan, The ns Manual (formerly ns otes and Documentation), http://www.isi.edu/nsnam/ns/doc/, June 2008. [19]E. Altman and T. Jimenez, NS Simulator for beginners, http://www-sop.inria.fr/maestro/personnel/Eitan.Altman/COURS-NS/n3.pdf, June 2008. [20]A. V. Aho, B. W. Kernighan and P. J. Weinberger, The AWK Programming Language, Addison-Wesley, 1988. [21]T. Chen, M. Sortais, G. Schäfer, S. Adams, C. Fan and A. Wolisz, “Performance analysis of a Denial of Service protection scheme for optimized and QoS-aware handover, ” Computer Networks, Volume:49, 2005, pp.449-464.
|