0000000000137513

AUTHOR

Giuseppe Bianchi

Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards

It has been observed that different IEEE 802.11 commercial cards produced by different vendors experience different performance, either when accessing alone the channel, as well as when competing against each other. These differences persist also when thorough measurement methodologies (such as RF shielding, laptop rotation, etc) are applied, and alignment of the environmental factors (same laptop models, traffic generators, etc) is carried out. This paper provides an extensive experimental characterization of the backoff operation of six commercial NIC cards. It suggests a relevant methodological approach, namely a repeatable, well defined, set of experiments, for such a characterization. …

research product

Streaming Support for Vehicular Networks Using Elastic Proxy Buffers

research product

MAC design on real 802.11 devices: From exponential to Moderated Backoff

In this paper we describe how a novel backoff mechanism called Moderated Backoff (MB), recently proposed as a standard extension for 802.11 networks, has been prototyped and experimentally validated on a commercial 802.11 card before being ratified. Indeed, for performance reasons, the time critical operations of MAC protocols, such as the backoff mechanism, are implemented into the card hardware/firmware and cannot be arbitrarily changed by third parties or by manufacturers only for experimental reasons. Our validation has been possible thanks to the availability of the so called Wireless MAC Processor (WMP), a prototype of a novel wireless card architecture in which MAC protocols can be p…

research product

PCP: An End-to end Measurement Based Call Admission Control for Real-Time Services Over IP Networks

Distributed end-to-end measurement based connection admission control mechanisms have been recently proposed. The goal of these schemes is to provide tight QoScon trol on a per connection basis by means of measurements taken by the edge nodes and priority based forwarding procedure at internal nodes. Since the additional flows handling procedures are implemented at the border routers and the forwarding mechanisms are for flows aggregates only, the approach is fully scalable and compatible with the IETF Differentiated Service proposal. The aim of this paper is to propose specific schemes and to investigate the advantages and limits of the approach by analyzing the basic mechanisms and evalua…

research product

End-to-End Quality of Service Support

research product

On the anomalous behavior of IEEE 802.11 commercial cards

research product

An API for Advanced Traffic Control in Diffserv Routers

Distributed per-flow admission control is a promising solution for Differentiated Services networks. Its deployment in DiffSery domains requires the ability to suitably configure, in each network router, low-level packet forwarding mechanisms, such as packet dropping algorithms driven by traffic measurements. In this paper we first show that performance effectiveness is achieved by means of non traditional configuration of the forwarding mechanisms. Hence, we propose a modular Application Program Interface that allows to flexibly and adaptively configure the forwarding/dropping behavior associated to a router’s output queue, well beyond the traditional RED/RIO active queue management scheme…

research product

Rethinking the IEEE 802.11e EDCA Performance Modeling Methodology

Analytical modeling of the 802.11e enhanced distributed channel access (EDCA) mechanism is today a fairly mature research area, considering the very large number of papers that have appeared in the literature. However, most work in this area models the EDCA operation through per-slot statistics, namely probability of transmission and collisions referred to "slots." In so doing, they still share a methodology originally proposed for the 802.11 Distributed Coordination Function (DCF), although they do extend it by considering differentiated transmission/ collision probabilities over different slots.We aim to show that it is possible to devise 802.11e models that do not rely on per-slot statis…

research product

Remarks on IEEE 802.11 DCF performance analysis

This letter presents a new approach to evaluate the throughput/delay performance of the 802.11 distributed coordination function (DCF). Our approach relies on elementary conditional probability arguments rather than bidimensional Markov chains (as proposed in previous models) and can be easily extended to account for backoff operation more general than DCF's one.

research product

A simulation study of load balancing algorithms in cellular packet networks

This paper provides a comparative performance evaluation of various load balancing schemes in cellular packet networks. With respect to traditional schemes, that measure each cell load in terms of number of admitted calls, our schemes use supplementary packet level information, expressed in terms of effective resource consumption of each individual call when retransmission mechanisms are employed. The simulation model adopted is based on a toroidal cellular network topology, to avoid border effects affecting the numerical results.

research product

Understanding 802.11e contention-based prioritization mechanisms and their coexistence with legacy 802.11 stations

The IEEE 802.11e task group has reached a stable consensus on two basic contention-based priority mechanisms to promote for standardization: usage of different arbitration interframe spaces and usage of different minimum/maximum contention windows. The goal of this article is to provide a thorough understanding of the principles behind their operation. To this purpose, rather than limit our investigation to high-level (e.g. throughput and delay) performance figures, we take a closer look at their detailed operation, also in terms of low-level performance metrics (e.g., the probability of accessing specific channel slots). Our investigation on one hand confirms that AIFS differentiation prov…

research product

Switched Ethernet Networking over LEO Satellite

Satellite onboard switching capabilities, and their possibility to enable "over-the-air" networks, are a strongly innovative achievement of modern satellite communication. The exploitation of satellite networking is especially relevant in the case of low Earth orbit satellites (LEO), where the reduced latency makes a LEO mesh network highly appealing and competitive with terrestrial solutions also in terms of performance. However, while the idea of a LEO mesh network is well understood, we are far from an ultimate answer on which is the best and more appropriate networking solution for moving LEO satellite network nodes. This paper promotes the adoption of existing layer-2 networking soluti…

research product

Streaming for vehicular users via elastic proxy buffer management

In this article we refer to the market of vehicular networks, where groups of customers located in the same public vehicle (e.g., a train or bus) connect to a terrestrial network through a wireless/satellite backbone link. Elastic buffering is a proxy management technique devised to decouple the multimedia information retrieval rate on the network backbone from the playout streaming rate at the user terminal. It has been shown in the past that the application of elastic buffering mechanisms in terrestrial networks brings significant advantages in terms of network effectiveness. We show that elastic buffering is an extremely effective means to reduce, or even eliminate, streaming service out…

research product

Out-of-Band Signaling Scheme for High Speed Wireless LANs

In recent years, the physical layer data rate provided by 802.11 Wireless LANs has dramatically increased thanks to significant advances in the modulation and coding techniques employed. However, previous studies show that the 802.11 MAC operation, namely the distributed coordination function (DCF), represents a limiting factor: the throughput efficiency drops as the channel bit rate increases, and a throughput upper limit does indeed exist when the channel bit rate goes to infinite high. These findings indicate that the performance of the DCF protocol will not be efficiently improved by merely increasing the channel bit rate. This paper shows that the DCF performance may significantly bene…

research product

Channel-dependent load balancing in wireless packet networks

This paper refers to a wireless cellular packet network scenario where fast retransmission of corrupted packets is used to improve the packet error ratio. Since the ‘gross’ packet transmission rate (including retransmission) depends on the channel quality perceived, admitted calls weight unevenly in terms of effective resource consumption. In this paper, we suggest using channel quality information to drive load balancing mechanisms. We propose two novel metrics to determine the best cell to attach to, during handover or new call origination. Extensive simulation results prove the superiority of our proposed schemes with respect to traditional load balancing, which base their operation on t…

research product

Remarks on IEEE 802.11 DCF Performance Evaluation, IEEE Communication Letters, Vol. 9, Issue 8, Aug 2005 pp:765 - 767

This letter presents a new approach to evaluate the throughput/delay performance of the 802.11 Distributed Coordination Function (DCF). Our approach relies on elementary conditional probability arguments rather than bidimensional Markov chains (as proposed in previous models), and can be easily extended to account for backoff operation more general than DCF's one

research product

Linee guida biopsia prostatica

research product

Interference Estimation in IEEE 802.11 Networks

This article describes a technique for distinguishing and quantifying medium access control (MAC) and physical layer (PHY) interference in error-prone 802.11 networks. This technique, is fully distributed, allowing each station to estimate interference individually. The estimator is based on an extended Kalman filter coupled to a mechanism for revealing abrupt changes in state. The network state is a vector of two components, representing PHY interference, expressed in terms of channel-error rate, and MAC interference. Two distinct state models are considered. When PHY interference can be assumed to be constant for all stations, network congestion is expressed by the number of competing ter…

research product

Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches

With the popularity of the IEEE 802.11 standards, many analytical saturation throughput studies for the distributed coordination function (DCF) have been reported. In this paper, we outline a number of issues and criticalities raised by previously proposed models. In particular, a careful look at backoff counter decrement rules allows us to conclude that, under saturation conditions, the slot immediately following a successful transmission can be accessed only by the station (STA) that has successfully transmitted in the previous channel access. Moreover, due to the specific acknowledgment (ACK) timeout setting adopted in the standard, the slot immediately following a collision cannot be ac…

research product

Exploring Training Options for RF Sensing Using CSI

This work analyzes human behavior recognition approaches using WiFi channel state information from the perhaps less usual point of view of training and calibration needs. With the help of selected literature examples, as well as with more detailed experimental insights on our own Doppler spectrum-based approach for physical motion/presence/cardinality detection, we first classify the diverse forms of training so far employed into three main categories (trained, trained-once, and training-free). We further discuss under which conditions it is possible to move toward lighter forms of calibration or even succeed in devising fully untrained model-based solutions. Our take home messages are main…

research product

An analytical model of a new packet marking algorithm for TCP flows: Preliminary insights

In differentiated services networks, packet marking schemes can be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the experienced performance. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing i) the TCP sources aggregate ii) the marker, and iii) the network status. Some preliminary simulative results seem to validate the model.

research product

One size hardly fits all

This paper casts recent accomplishments in the field of Wireless MAC programmability into the emerging Software Defined Networking perspective. We argue that an abstract (but formal) description of the MAC protocol logic in terms of extensible finite state machines appears a convenient and viable data-plane programming compromise for modeling and deploying realistic MAC protocol logics. Our approach is shown to comply with existing control frameworks, and entails the ability to dynamically change the MAC protocol operation based on context and scenario conditions; in essence, move from the traditional idea of "one-size-fits-all" MAC protocol stack to the innovative paradigm of opportunistic…

research product

Per-flow signalling extension across DiffServ domains

This paper describes a framework devised to extend per-flow admission control operation across Differentiated Services domains. Although the specific case of interoperability with RSVP is under discussion, our proposal can be easily adapted to other hop-by-hop signalling protocols. In our framework, DiffSery border routers accomplish three tasks. First, during the set-up phase, flows are mapped onto PHB groups on the basis of their QoS and traffic specifications. Second, signalling packets are tunnelled into IP packets marked as “probes”, where the “probe” marking is a DCSP value associated to the considered PHB Group. Third, when the flow set-up is complete, flow data packets are marked as…

research product

Wireless MAC processors: programming MAC protocols on commodity hardware

Programmable wireless platforms aim at responding to the quest for wireless access flexibility and adaptability. This paper introduces the notion of wireless MAC processors. Instead of implementing a specific MAC protocol stack, Wireless MAC processors do support a set of Medium Access Control “commands” which can be run-time composed (programmed) through software-defined state machines, thus providing the desired MAC protocol operation. We clearly distinguish from related work in this area as, unlike other works which rely on dedicated DSPs or programmable hardware platforms, we experimentally prove the feasibility of the wireless MAC processor concept over ultra-cheap commodity WLAN hardw…

research product

Endpoint Admission Control with Delay Variation Measurements for QoS in IP Networks.

In this paper we describe a novel Endpoint Admission Control scheme (EAC) for IP telephony. EAC mechanisms are driven by independent measurements taken by the edge nodes on a flow of packets injected in the network to probe the source to destination path. Our scheme is characterized by two fundamental features. First, it does not rely on any additional procedure in internal network routers other than the capability to apply different service priorities to probing and data packets. Second, the connection admission decision is based on the analysis of the probing flow delay variation statistics. Simulation results, which focus on a IP telephony scenario, show that, despite the lack of core ro…

research product

On the accuracy of some common modeling assumptions for EDCA analysis

Several models have been discussed in literature in order to evaluate the performance of the EDCA differentiation mechanisms. Despite of the exponential back off rules, usually the EDCA protocol has been modeled as a persistent slotted access protocol, and summarized into a set of access probabilities. These models often show a very different complexity and accuracy, according to the basis assumptions. In this paper, we propose a new modeling approach for EDCA, in which the medium access is described in terms of backoff counter comparisons, contention by contention, and no restrictive hypothesis is considered. Through our model, we verify the applicability of the most common protocol simpli…

research product

The Effect of Heterogeneous Link Capacities in BitTorrent-like File Sharing System

research product

Enabling Cognitive-Radio Paradigm on Commercial Off-The-Shelf 802.11 Hardware

Cognitive Radio paradigm (CR) has been recognized as key enabler for next generation wireless networking: the pos- sibility to access the limited radio spectrum in an oppor- tunistic manner allows secondary users to boost their trans- mission performance without interfering with existing pri- mary networks. Full testing and experimenting with this paradigm, however, is still a tough task, given either the i) limited capabilities above the PHY layer of cheap SDR so- lutions, or the ii) heavy investment required for setting up multi-node testbeds powered by FPGAs. In this demo we show how we leveraged our Wireless MAC Processor archi- tecture to tackle the two issues at the same time, providi…

research product

OASIS-HT: design of a pharmacogenomic dose-finding study.

Experimental evidence and observations in humans strongly support an interactive role of mutated α-adducin, sodium (Na+)/potassium (K+)-adenosine triphosphatase (ATPase) activity and endogenous ouabain in Na+homeostasis and the pathogenesis of hypertension. The Ouabain and Adducin for Specific Intervention on Sodium in HyperTension (OASIS-HT) trial is an early Phase II dose-finding study, which will be conducted across 39 European centers. Following a run-in period of 4 weeks without treatment, eligible patients will be randomized to one of five oral doses of rostafuroxin consisting of 0.05, 0.15, 0.5, 1.5, or 5.0 mg/day. Each dose will be compared to a placebo in a double-blind crossover e…

research product

Is Admission-Controlled Traffic Self-Similar?

It is widely recognized that the maximum number of heavy-tailed flows that can be admitted to a network link, while meeting QoS targets, can be much lower than in the case of markovian flows. In fact, the superposition of heavy-tailed flows shows long range dependence (self-similarity), which has a detrimental impact on network performance. In this paper, we show that long range dependence is significantly reduced when traffic is controlled by a Measurement-Based Admission Control (MBAC) algorithm. Our results appear to suggest that MBAC is a value added tool to improve performance in the presence of self-similar traffic, rather than a mere approximation for traditional (parameter-based) ad…

research product

Breaking layer 2: A new architecture for programmable wireless interfaces

This paper introduces a new architecture for programmable wireless interfaces, aiming at responding to the emerging request of wireless access flexibility and adaptability. Instead of implementing a specific MAC protocol stack, the proposed architecture supports a set of programmable services, devised to customize the wireless access operations according to specific network and application scenarios. The services are composed by means of simpler functions, which in turns work on system primitives (i.e. elementary non-programmable functionalities, natively provided by the system) dealing with the physical transmission and reception of the frames. Our approach significantly differs from softw…

research product

Performance evaluation of Peer-to-Peer file sharing systems: analytical models and simulation tools

research product

An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards

It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance differences are evident both when the cards contend alone to the channel, and when heterogeneous cards contend together. Since the performance misalignment does not disappear by averaging the environmental factors (such as propagation conditions, laptop models, traffic generators, etc), it is evident that the well known throughput-fairness property of the DCF protocol is not guaranteed in actual networks. In this paper we propose a methodological approach devised to experimentally characterize the IEEE 802.11 commercial …

research product

Performance Evaluation of a new Adaptive Packet Marking Scheme for TCP over DiffServ Networks

In differentiated services (DiffServ) networks, packets may receive a different treatment according to their differentiated services code point (DSCP) label. As a consequence, packet marking schemes can be devised to differentiate packets belonging to the same TCP flow, with the goal of improving the experienced performance. The paper presents an extensive performance evaluation of a new adaptive packet marking scheme, applied to a traffic scenario composed of TCP flows with different lengths. The proposed marking scheme is most efficient when applied to a scenario composed of all long-lived flows. In a realistic mixed traffic scenario, composed of both long-lived and short-lived TCP flows,…

research product

A Space-Division Time-Division MAC Protocol for broadband wireless access

research product

“Vendor-Affected” WLAN experimental results: A Pandora’s Box?

Experimental results are typically envisioned as the ultimate validation reference for any theoretical and/or simulation modelling assumptions. However, in the case of Wireless LANs, the situation is not nearly as straightforward as it might seem. In this paper, we discuss to what (large) extent measurement results may depend on proprietary undocumented algorithms implemented in the vendor-specific card/driver employed. Specifically, we focus on the experimental study of IEEE 802.11 b/g outdoor links based on the widely used Atheros/MADWiFi card/driver pair. We show that unexpected performance divergences do emerge in two classes of comparative experiments run on a same outdoor link: broadc…

research product

Performance evaluation of a measurement-based algorithm for distributed admission control in a DiffServ framework

Distributed Admission Control in IP DiffServ environments is an emerging and promising research area. Distributed admission control solutions share the idea that no coordination among network routers (i.e. explicit signaling) is necessary, when the decision whether to admit or reject a new offered flow is pushed to the edge of the IP network. Proposed solutions differ in the degree of complexity required in internal network routers, and result in a different robustness and effectiveness in controlling the accepted traffic. This paper builds on a recently proposed distributed admission control solution, called GRIP (Gauge&Gate Reservation with Independent Probing), designed to integrate the …

research product

A space-division time-division multiple access scheme for high throughput provisioning in WLANs

Directional antennas may dramatically increase the capacity of a Wireless LAN by allowing several stations to simultaneously communicate. Since deployment of directive/smart antennas on the customer's terminals is awkward (for technological, cost, robustness, and convenience reasons) it is of interest to deploy advanced antenna solutions only at the Access Point. When omnidirectional transmissions are used at the Mobile Stations, the asynchronous nature of the 802.11 MAC handshake structurally limits the possibility to exploit spatial reuse. Significant throughput enhancements can be achieved only at the expense of redesigning (part of) the 802.11 MAC protocol: mainly a form of synchronizat…

research product

Packet management techniques for measurement based end-to-end admission control in IP networks

End-to-end Measurement Based connection Admission Control (EMBAC) mechanisms have been proposed to support real-time flows quality of service requirements over a Differentiated Services Internet architecture. The EMBAC basic idea is to decentralize the admission control decision, by requiring each individual user to probe the network path during flow setup, and by basing the accept/reject decision on the probing traffic statistics measured at the destination. In conformance with the differentiated services framework, routers are oblivious to individual flows and only need to serve data packets with a higher priority than probing traffic. In this paper, we build upon the observation that som…

research product

"MAC Parameters Tuning for Best Effort Traffic in 802.11e Contention-Based Networks"

research product

On the Fidelity of IEEE 802.11 commercial cards

The IEEE 802.11 D CF protocol is known to be fair in terms of long-term resource repartition among the contending stations. However, when considering real scenarios, where commercial 802.11 cards interact, very unpredictable as well as sometimes surprising behaviors emerge. Motivation of this paper is to investigate the reasons of the very evident disagreement between the theoretical IEEE 802.11 DCF protocol models and its practical implementations. Inparticular, we try to characterize the card behavior not only in terms of perceived throughput, but also in terms of low-level channel access operations. In fact, the simple throughput analysis does not allow to identify what affecting paramet…

research product

A new Three Color Marker for TCP flows

In Differentiated Services networks, packets may receive a different treatment according to their Differentiated Services Code Point (DSCP) label. As a consequence, packet marking schemes can be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the experienced performance. This paper presents an extensive performance evaluation of a new adaptive packet marking scheme, which relies on three different service classes, provided by the DiffServ network. The scheme provides protection of vulnerable packets in the TCP flows and adaptivity through "probes" packets. The performance have been evaluted in a traffic scenario composed of TCP flows with different …

research product

Wireless MAC Processor Networking: A Control Architecture for Expressing and Implementing High-Level Adaptation Policies in WLANs

The current proliferation of unplanned wireless local area networks (WLANs) is creating the need for implementing different adaptation strategies to improve network performance under mutating and evolving interference scenarios. In this article, we envision a new solution for expressing and implementing high-level adaptation policies in WLANs, in contrast to the current approaches based on vendor-specific implementations. We exploit the hardware abstraction interface recently proposed by the wireless medium access control (MAC) processor (WMP) architecture and some flow-control concepts similar to the Openflow model for defining MAC adaptation policies. A simple control architecture for dis…

research product

Design and performance evaluation of an hybrid reservation-polling MAC protocol for power-line communications

This paper presents an hybrid reservation-polling MAC protocol able to effectively deal with the channel disturbances typical of Power-line communication systems. Channel access is controlled by a scheduler running on a centralized station. Fast retransmission of corrupted packets is employed to achieve high performance on Power-line channels characterized by frequent error bursts due to impulsive noise. The performance of our proposed mechanism are evaluated by means of simulation, for the more challenging case of time-sensitive traffic sources (voice calls). Results show that the system efficiency is virtually not affected by lightly to moderately disturbed PLC channel. Moreover, by sligh…

research product

PCP-DV: An End-to end Admission Control Mechanism for IP Telephony

In this paper we describe a novel endpoint admission control mechanism for IP telephony:the PCP-DV which is characterized by two fundamental features. First, it does not rely on any additional procedure in internal network routers other than the capability to apply different service priority to probing and data packets. Second, the triggering mechanism for the connection admission decision is based on the analysis of the delay variation statistics over the probing flow. Numerical results for an IP telephony traffic scenario prove that 99th delay percentiles not greater than few ms per router are guaranteed even in overload conditions.

research product

MAClets: Active MAC Protocols over hard-coded devices

We introduce MAClets, software programs uploaded and executed on-demand over wireless cards, and devised to change the card's real-time medium access control operation. MAClets permit seamless reconfiguration of the MAC stack, so as to adapt it to mutated context and spectrum conditions and perform tailored performance optimizations hardly accountable by an once-for-all protocol stack design. Following traditional active networking principles, MAClets can be directly conveyed within data packets and executed on hard-coded devices acting as virtual MAC machines. Indeed, rather than executing a pre-defined protocol, we envision a new architecture for wireless cards based on a protocol interpr…

research product

Supporting Multimedia Streaming in VANs

research product

Deploying Virtual MAC Protocols Over a Shared Access Infrastructure Using MAClets

Network virtualization has been extensively researched in the last years as a key enabler for improving the network performance. However, virtualization in wireless networks pose some unique challenges: first, the usual over-provisioning approach for providing isolation between multiple virtual entities is not viable; second, the partitioning criteria are often ambiguous, since the actual resources perceived by each entity depend on many external (and time-varying) factors. In this demo, we show an effective virtualization solution for wireless local area networks, solving the problem of isolation and flexible resource paritioning, based on the concept of MAClets. MAClets are software progr…

research product

An explanation for unexpected 802.11 outdoor link-level measurement results

This paper provides experimental evidence that "weird'/poor outdoor link-level performance measurements may be caused by driver/card-specific antenna diversity algorithms unexpectedly supported/activated at the WLAN transmitter side. We focus our analysis on the Atheros/MADWiFi card/driver case, and we observe that the transmit antenna diversity mechanisms remain by default enabled when the available antennas are not homogeneous in terms of gain or, even worse, when only a single antenna is connected. This may cause considerable performance impairments (large frame loss ratio), in conditions frequently encountered in outdoor link deployments. The negative impact of transmit antenna diversit…

research product

Performance analysis of the Out-of-Band signalling scheme for high speed wireless LANs

research product

Endpoint Admission Control over Assured Forwarding PHBs and Its Performance over RED Implementations

The Assured Forwarding Per Hop Behavior (AF PHB) has been devised by the IETF Differentiated Services (DiffServ) working group to provide drop level differentiation. The intent of AF is to support services with different loss requirements, but with no strict delay and jitter guarantees. Another suggested use of AF is to provide differentiated support for traffic conforming to an edge conditioning/policing scheme with respect to nonconforming traffic. Scope of this paper is twofold. First, we show that, quite surprisingly, a standard AF PHB class is semantically capable of supporting per flow admission control. This is obtained by adopting the AF PHB as core routers forwarding mechanism in c…

research product

Performance evaluation of differentiated access mechanisms effectiveness in 802.11 networks

The IEEE 802.11e draft specification aims to extend the original 802.11 MAC protocol by introducing priority mechanisms able to manage bandwidth and resource allocation according to the QoS needs of real-time applications. Different strategies based on MAC parameter diversifications, such as contention window limits, contention window updating factor and silence monitoring time, can be pursued in order to provide service differentiation, also in the case of distributed access. In this paper, we investigate on the behaviour of each differentiation possibility under different load conditions and traffic requirements. Our results show that the most powerful mechanisms which provide service dif…

research product

Performance analysis of the out-of-band signaling scheme for high speed wireless LANs

In this paper, we study the performance of our earlier proposed out-of-band signaling (OBS) scheme for high speed wireless local area networks (WLANs). We employ the system approximation technique for modeling of the OBS scheme. An equivalent state dependent single server queue, that describes the OBS scheme, is constructed for the analysis of the throughput and delay performances. Moreover, we study the throughput optimization of the OBS scheme, which provides a means for optimizing the performance of the OBS scheme, given a particular network environment. Finally, we conduct several simulation experiments to validate our analytical results.

research product

An analytical model of a new packet marking algorithm for TCP flows

In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…

research product

Adaptive Low Priority Packet Marking for Better TCP Performance

This paper proposes a packet marking scheme for TCP traffic. Unlike previous literature work, in our scheme the majority of TCP packets are transmitted as high priority. The role of a low priority packet appears that of a probe, whose goal is to early discover network congestion conditions. Low priority packets are marked according to an adaptive marking algorithm. Numerical results show that our scheme provides improved throughput/delay performance.

research product

Analysis of the IEEE 802.11e EDCA Under Statistical Traffic

Many models have been proposed to analyze the performance of the IEEE 802.11 distributed coordination function (DCF) and the IEEE 802.11e enhanced distributed coordination function (EDCA) under saturation condition. To analyze DCF under statistical traffic, Foh and Zukerman introduce a model that uses Markovian Framework to compute the throughput and delay performance. In this paper, we analyze the protocol service time of EDCA mechanism and introduce a model to analyze EDCA under statistical traffic using Markovian Framework. Using this model, we analyze the throughput and delay performance of EDCA mechanism under statistical traffic.

research product

Quality of Service Multicasting over Differentiated Services Networks

This paper proposes a solution to support real-time multicast traffic with Quality of Service (QoS) constraints over Differentiated Services (DiffServ) IP networks. Our solution allows multicast users to dynamically join and leave the multicast tree. Moreover, it allows a multicast user which has negotiated a best-effort session to upgrade to a QoS-enabled session. Our solution is backward compatible with the Protocol Independent Multicast (PIM) scheme. It combines two ideas. First, resource availability along a new QoS path is verified via a probe-based approach. Second, QoS is maintained by marking replicated packets with a special DSCP value, before forwarding them on the QoS path.

research product

Capture Aware Sequential Waterfilling for LoraWAN Adaptive Data Rate

LoRaWAN (Long Range Wide Area Network) is emerging as an attractive network infrastructure for ultra low power Internet of Things devices. Even if the technology itself is quite mature and specified, the currently deployed wireless resource allocation strategies are still coarse and based on rough heuristics. This paper proposes an innovative "sequential waterfilling" strategy for assigning Spreading Factors (SF) to End-Devices (ED). Our design relies on three complementary approaches: i) equalize the Time-on-Air of the packets transmitted by the system's EDs in each spreading factor's group; ii) balance the spreading factors across multiple access gateways, and iii) keep into account the c…

research product

Improved support for streaming services in vehicular networks

This paper presents a resource management mechanism aimed at improving the effectiveness of streaming services in vehicular networks. The scenario considered in this paper is that of a group of customers located into a same public vehicle, e.g. a moving train connected to the network via a satellite link, and requesting either video-on-demand-like services, as well as real-time diffusive (broadcast) streaming services. We show that a proxy server, devised to introduce an elastic buffer aimed at decoupling the information retrieval download speed on the outer network from the natural play-out speed used in the vehicular network, results to be an extremely effective approach in reducing the o…

research product

MAC learning

Cognition as a way to deal with the challenges of future wireless networks has been largely considered by the recent literature, with a main focus on physical layer adaptability and dynamic spectrum access. In this demo, we show how a simple cognition mechanism can be also applied at the MAC layer, by exploiting the emerging paradigm of programmable wireless cards. The idea is using the formal definition of simple MAC protocol components and platform-independent representation of channel events gathered from the wireless node, for emulating the behavior of protocols which are not currently running on the network, learning about their expected performance, and dynamically reconfiguring the w…

research product

A Migration Path for the Internet: From Best-Effort to a QoS Capable Infrastructure by Means of Localized Admission Control

Looking back at many proposals appeared on the scene in these years, a fundamental lesson to be learned is that their success or failure is strictly tied to their backward compatibility with existing infrastructures. In this paper, we consider the problem of providing explicit admission control decisions for QoS aware services. We rely the decision to admit a new flow upon the successful and timely delivery, through the Internet, of probe packets independently generated by the end points. Our solution, called GRIP (Gauge&Gate Realistic Internet Protocol), is fully distributed and scalable, as admission control decisions are taken at the edge network nodes, and no coordination between router…

research product