0000000000596928

AUTHOR

Giuseppe Bianchi

showing 61 related works from this author

Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards

2007

It has been observed that different IEEE 802.11 commercial cards produced by different vendors experience different performance, either when accessing alone the channel, as well as when competing against each other. These differences persist also when thorough measurement methodologies (such as RF shielding, laptop rotation, etc) are applied, and alignment of the environmental factors (same laptop models, traffic generators, etc) is carried out. This paper provides an extensive experimental characterization of the backoff operation of six commercial NIC cards. It suggests a relevant methodological approach, namely a repeatable, well defined, set of experiments, for such a characterization. …

IEEE 802business.product_categoryComputer scienceNetwork cardsSoftware performance testingComputer software; Laptop computers; Telecommunication traffic; Low level backoff distribution measurements; Network cards; Traffic generators; Window size; Network architectureLaptop computerscomputer.software_genreSettore ING-INF/01 - ElettronicaSoftwareMicrocodeComputer softwareWindow sizeTraffic generatorsSettore ING-INF/03 - Telecomunicazionibusiness.industryFirmwareNetwork architecturePortable computers Rotation measurement Radio frequency Environmental factorsTelecommunication trafficNetwork interface controllerLaptopEmbedded systemLow level backoff distribution measurementsbusinesscomputerCommunication channelIEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications
researchProduct

Streaming Support for Vehicular Networks Using Elastic Proxy Buffers

2004

researchProduct

MAC design on real 802.11 devices: From exponential to Moderated Backoff

2016

In this paper we describe how a novel backoff mechanism called Moderated Backoff (MB), recently proposed as a standard extension for 802.11 networks, has been prototyped and experimentally validated on a commercial 802.11 card before being ratified. Indeed, for performance reasons, the time critical operations of MAC protocols, such as the backoff mechanism, are implemented into the card hardware/firmware and cannot be arbitrarily changed by third parties or by manufacturers only for experimental reasons. Our validation has been possible thanks to the availability of the so called Wireless MAC Processor (WMP), a prototype of a novel wireless card architecture in which MAC protocols can be p…

Settore ING-INF/03 - Telecomunicazionibusiness.industryFirmwareWireless ad hoc networkComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studies020206 networking & telecommunicationsTime critical02 engineering and technologyDistributed coordination functioncomputer.software_genreExponential functionComputer Networks and Communication0508 media and communicationsFormal languageMedia Technology0202 electrical engineering electronic engineering information engineeringWirelessbusinesscomputerComputer network2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
researchProduct

PCP: An End-to end Measurement Based Call Admission Control for Real-Time Services Over IP Networks

2000

Distributed end-to-end measurement based connection admission control mechanisms have been recently proposed. The goal of these schemes is to provide tight QoScon trol on a per connection basis by means of measurements taken by the edge nodes and priority based forwarding procedure at internal nodes. Since the additional flows handling procedures are implemented at the border routers and the forwarding mechanisms are for flows aggregates only, the approach is fully scalable and compatible with the IETF Differentiated Service proposal. The aim of this paper is to propose specific schemes and to investigate the advantages and limits of the approach by analyzing the basic mechanisms and evalua…

Core routerVoice over IPEnd-to-end principleNetwork packetComputer sciencebusiness.industryCall Admission ControlAdmission controlTelephonyDifferentiated servicebusinessComputer network
researchProduct

End-to-End Quality of Service Support

2005

Engineeringbusiness.industryQuality of serviceDiffServQoSend-to-endIntServEnd-to-end principleIPIP; QoS; signalling; end-to-end; DiffServ; IntServsignallingbusinessTelecommunicationsComputer network
researchProduct

On the anomalous behavior of IEEE 802.11 commercial cards

2006

IEEE 802.11 experimental measures
researchProduct

An API for Advanced Traffic Control in Diffserv Routers

2003

Distributed per-flow admission control is a promising solution for Differentiated Services networks. Its deployment in DiffSery domains requires the ability to suitably configure, in each network router, low-level packet forwarding mechanisms, such as packet dropping algorithms driven by traffic measurements. In this paper we first show that performance effectiveness is achieved by means of non traditional configuration of the forwarding mechanisms. Hence, we propose a modular Application Program Interface that allows to flexibly and adaptively configure the forwarding/dropping behavior associated to a router’s output queue, well beyond the traditional RED/RIO active queue management scheme…

RouterEngineeringDifferentiated servicesbusiness.industryNetwork packetPacket forwardingRandom early detectionAdmission controlActive queue managementbusinessQueueComputer network
researchProduct

Rethinking the IEEE 802.11e EDCA Performance Modeling Methodology

2010

Analytical modeling of the 802.11e enhanced distributed channel access (EDCA) mechanism is today a fairly mature research area, considering the very large number of papers that have appeared in the literature. However, most work in this area models the EDCA operation through per-slot statistics, namely probability of transmission and collisions referred to "slots." In so doing, they still share a methodology originally proposed for the 802.11 Distributed Coordination Function (DCF), although they do extend it by considering differentiated transmission/ collision probabilities over different slots.We aim to show that it is possible to devise 802.11e models that do not rely on per-slot statis…

IEEE 802medium access protocolSettore ING-INF/03 - TelecomunicazioniComputer Networks and Communicationsbusiness.industryComputer scienceWiFiDistributed computingQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSQoSThroughputDistributed coordination functionComputer Science ApplicationsTransmission (telecommunications)Wireless lanElectrical and Electronic EngineeringbusinessThroughput (business)SoftwareComputer networkCommunication channelIEEE/ACM Transactions on Networking
researchProduct

Remarks on IEEE 802.11 DCF performance analysis

2005

This letter presents a new approach to evaluate the throughput/delay performance of the 802.11 distributed coordination function (DCF). Our approach relies on elementary conditional probability arguments rather than bidimensional Markov chains (as proposed in previous models) and can be easily extended to account for backoff operation more general than DCF's one.

Computer scienceMarkov processThroughputDistributed coordination functionCarrier-sense multiple accesssymbols.namesakeIEEE 802.11Wireless lanComputer Science::Networking and Internet ArchitectureElectrical and Electronic EngineeringThroughput (business)IEEE 802.11Markov chainSettore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science ApplicationsComputer Science::PerformanceModeling and SimulationMultiple access controlPerformance evaluationsymbolsIEEE 802.11; Multiple access control; Performance evaluationbusinessAlgorithmComputer networkIEEE Communications Letters
researchProduct

A simulation study of load balancing algorithms in cellular packet networks

2001

This paper provides a comparative performance evaluation of various load balancing schemes in cellular packet networks. With respect to traditional schemes, that measure each cell load in terms of number of admitted calls, our schemes use supplementary packet level information, expressed in terms of effective resource consumption of each individual call when retransmission mechanisms are employed. The simulation model adopted is based on a toroidal cellular network topology, to avoid border effects affecting the numerical results.

business.industryComputer scienceNetwork packetDistributed computingRetransmissionCellular networkLoad balancing (computing)Resource consumptionbusinessComputer network
researchProduct

Understanding 802.11e contention-based prioritization mechanisms and their coexistence with legacy 802.11 stations

2005

The IEEE 802.11e task group has reached a stable consensus on two basic contention-based priority mechanisms to promote for standardization: usage of different arbitration interframe spaces and usage of different minimum/maximum contention windows. The goal of this article is to provide a thorough understanding of the principles behind their operation. To this purpose, rather than limit our investigation to high-level (e.g. throughput and delay) performance figures, we take a closer look at their detailed operation, also in terms of low-level performance metrics (e.g., the probability of accessing specific channel slots). Our investigation on one hand confirms that AIFS differentiation prov…

PrioritizationStandardsStandardizationComputer Networks and CommunicationsComputer sciencePerformanceThroughputCommunication channels (information theory)Quality of serviceLimit (music)Service differentiationNetwork protocolsSettore ING-INF/03 - Telecomunicazionibusiness.industryInter frameIEEE 802.11eTelecommunication trafficProbability distributionsNetwork protocols; Performance; Probability distributions; Quality of service; Standards; Telecommunication traffic; Enhanced distributed channel access; IEEE 802.11e; Service differentiation; Communication channels (information theory)Hardware and ArchitectureArbitrationEnhanced distributed channel accessIEEE 802.11e-2005businessSoftwareInformation SystemsCommunication channelComputer network
researchProduct

Switched Ethernet Networking over LEO Satellite

2005

Satellite onboard switching capabilities, and their possibility to enable "over-the-air" networks, are a strongly innovative achievement of modern satellite communication. The exploitation of satellite networking is especially relevant in the case of low Earth orbit satellites (LEO), where the reduced latency makes a LEO mesh network highly appealing and competitive with terrestrial solutions also in terms of performance. However, while the idea of a LEO mesh network is well understood, we are far from an ultimate answer on which is the best and more appropriate networking solution for moving LEO satellite network nodes. This paper promotes the adoption of existing layer-2 networking soluti…

EthernetSpanning treebusiness.industryComputer scienceVirtual LANSettore ING-INF/03 - TelecomunicazioniMesh networkinglaw.inventionInteroperationSoftware deploymentlawCommunications satelliteSatellitebusinessComputer network
researchProduct

Streaming for vehicular users via elastic proxy buffer management

2004

In this article we refer to the market of vehicular networks, where groups of customers located in the same public vehicle (e.g., a train or bus) connect to a terrestrial network through a wireless/satellite backbone link. Elastic buffering is a proxy management technique devised to decouple the multimedia information retrieval rate on the network backbone from the playout streaming rate at the user terminal. It has been shown in the past that the application of elastic buffering mechanisms in terrestrial networks brings significant advantages in terms of network effectiveness. We show that elastic buffering is an extremely effective means to reduce, or even eliminate, streaming service out…

Mobile radioService (systems architecture)Computer Networks and CommunicationsComputer scienceDelayed real time servicesMultimedia information retrievalCommunication channels (information theory)Resource sharing algorithmBuffer storageWirelessInformation retrievalWireless telecommunication systemsElectrical and Electronic EngineeringReal time streaming servicesProxy (statistics)Railroad car equipmentVehicular area networksBackbone networkInternetMobile computingVehicular ad hoc networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSatellite communication systemsElastic proxy buffer managementLocal area networksReal time systemsAlgorithms; Buffer storage; Communication channels (information theory); Information retrieval; Internet; Local area networks; Multimedia systems; Railroad car equipment; Real time systems; Satellite communication systems; Satellite links; Wireless telecommunication systems; Delayed real time services; Elastic proxy buffer management; Fast internet for fast train hosts (FIFTH); Real time streaming services; Resource sharing algorithm; Vehicular area networks; Mobile computingComputer Science ApplicationsTerminal (electronics)Fast internet for fast train hosts (FIFTH)businessSatellite linksAlgorithmsMultimedia systemsComputer network
researchProduct

Out-of-Band Signaling Scheme for High Speed Wireless LANs

2007

In recent years, the physical layer data rate provided by 802.11 Wireless LANs has dramatically increased thanks to significant advances in the modulation and coding techniques employed. However, previous studies show that the 802.11 MAC operation, namely the distributed coordination function (DCF), represents a limiting factor: the throughput efficiency drops as the channel bit rate increases, and a throughput upper limit does indeed exist when the channel bit rate goes to infinite high. These findings indicate that the performance of the DCF protocol will not be efficiently improved by merely increasing the channel bit rate. This paper shows that the DCF performance may significantly bene…

Computer scienceComputer network performanceWireless LANThroughputDistributed coordination functionBackward compatibilityIEEE 802.11Packet switchingWireless lanWireless LAN Throughput Bit rate Physical layer Modulation coding Access protocols Content management Signal design Media Access Protocol Performance analysisElectrical and Electronic EngineeringIEEE 802.11Settore ING-INF/03 - Telecomunicazionibusiness.industryApplied MathematicsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerCode rateComputer Science ApplicationsComputer network performance; IEEE 802.11; Wireless LANBurst switchingModulationOut-of-band managementbusinessCommunication channelComputer networkIEEE Transactions on Wireless Communications
researchProduct

Channel-dependent load balancing in wireless packet networks

2004

This paper refers to a wireless cellular packet network scenario where fast retransmission of corrupted packets is used to improve the packet error ratio. Since the ‘gross’ packet transmission rate (including retransmission) depends on the channel quality perceived, admitted calls weight unevenly in terms of effective resource consumption. In this paper, we suggest using channel quality information to drive load balancing mechanisms. We propose two novel metrics to determine the best cell to attach to, during handover or new call origination. Extensive simulation results prove the superiority of our proposed schemes with respect to traditional load balancing, which base their operation on t…

Computer Networks and Communicationsbusiness.industryNetwork packetComputer scienceRetransmissionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLoad balancing (computing)Packet switchingHandoverResource allocationWirelessElectrical and Electronic EngineeringbusinessError detection and correctionInformation SystemsCommunication channelComputer networkWireless Communications and Mobile Computing
researchProduct

Remarks on IEEE 802.11 DCF Performance Evaluation, IEEE Communication Letters, Vol. 9, Issue 8, Aug 2005 pp:765 - 767

2005

This letter presents a new approach to evaluate the throughput/delay performance of the 802.11 Distributed Coordination Function (DCF). Our approach relies on elementary conditional probability arguments rather than bidimensional Markov chains (as proposed in previous models), and can be easily extended to account for backoff operation more general than DCF's one

backoff algorithmWireless local area networks (WLAN)Throughput
researchProduct

Linee guida biopsia prostatica

2005

researchProduct

Interference Estimation in IEEE 802.11 Networks

2010

This article describes a technique for distinguishing and quantifying medium access control (MAC) and physical layer (PHY) interference in error-prone 802.11 networks. This technique, is fully distributed, allowing each station to estimate interference individually. The estimator is based on an extended Kalman filter coupled to a mechanism for revealing abrupt changes in state. The network state is a vector of two components, representing PHY interference, expressed in terms of channel-error rate, and MAC interference. Two distinct state models are considered. When PHY interference can be assumed to be constant for all stations, network congestion is expressed by the number of competing ter…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniWiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerKalman filterInterference (wave propagation)Network congestionExtended Kalman filterIEEE 802.11Control and Systems EngineeringPHYModeling and SimulationComputer Science::Networking and Internet ArchitectureElectronic engineeringWirelessElectrical and Electronic EngineeringbusinessKalman FilterComputer Science::Information Theory
researchProduct

Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches

2010

With the popularity of the IEEE 802.11 standards, many analytical saturation throughput studies for the distributed coordination function (DCF) have been reported. In this paper, we outline a number of issues and criticalities raised by previously proposed models. In particular, a careful look at backoff counter decrement rules allows us to conclude that, under saturation conditions, the slot immediately following a successful transmission can be accessed only by the station (STA) that has successfully transmitted in the previous channel access. Moreover, due to the specific acknowledgment (ACK) timeout setting adopted in the standard, the slot immediately following a collision cannot be ac…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceAerospace EngineeringThroughputDistributed coordination functionIEEE 802.11Wireless lanWireless Application ProtocolElectrical and Electronic Engineeringbusiness.industrySettore ING-INF/03 - Telecomunicazioni802.11 Performance analysisWiFiPerformance analysisComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCode ratemedium access protocolsAutomotive EngineeringbusinessTimeoutcomputerWireless sensor network802.11Computer networkCommunication channel
researchProduct

Exploring Training Options for RF Sensing Using CSI

2018

This work analyzes human behavior recognition approaches using WiFi channel state information from the perhaps less usual point of view of training and calibration needs. With the help of selected literature examples, as well as with more detailed experimental insights on our own Doppler spectrum-based approach for physical motion/presence/cardinality detection, we first classify the diverse forms of training so far employed into three main categories (trained, trained-once, and training-free). We further discuss under which conditions it is possible to move toward lighter forms of calibration or even succeed in devising fully untrained model-based solutions. Our take home messages are main…

Point (typography)Settore ING-INF/03 - TelecomunicazioniComputer Networks and CommunicationsCalibration (statistics)Computer sciencebusiness.industry010401 analytical chemistryBehavioural sciences020206 networking & telecommunications02 engineering and technologyMachine learningcomputer.software_genreTraining Wireless fidelity Calibration Doppler effect Behavioral sciences Radio frequency Sensors Channel state estimation01 natural sciencesTraining (civil)Motion (physics)0104 chemical sciencesComputer Science ApplicationsPersonalization0202 electrical engineering electronic engineering information engineeringArtificial intelligenceElectrical and Electronic EngineeringbusinesscomputerIEEE Communications Magazine
researchProduct

An analytical model of a new packet marking algorithm for TCP flows: Preliminary insights

2004

In differentiated services networks, packet marking schemes can be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the experienced performance. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing i) the TCP sources aggregate ii) the marker, and iii) the network status. Some preliminary simulative results seem to validate the model.

Scheme (programming language)Flowchartbusiness.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTelecommunications serviceTCP tuninglaw.inventionIntelligent NetworkPacket switchingDifferentiated serviceslawbusinesscomputerComputer networkcomputer.programming_language
researchProduct

One size hardly fits all

2013

This paper casts recent accomplishments in the field of Wireless MAC programmability into the emerging Software Defined Networking perspective. We argue that an abstract (but formal) description of the MAC protocol logic in terms of extensible finite state machines appears a convenient and viable data-plane programming compromise for modeling and deploying realistic MAC protocol logics. Our approach is shown to comply with existing control frameworks, and entails the ability to dynamically change the MAC protocol operation based on context and scenario conditions; in essence, move from the traditional idea of "one-size-fits-all" MAC protocol stack to the innovative paradigm of opportunistic…

WLAN 802.11Finite-state machineSettore ING-INF/03 - Telecomunicazionibusiness.industrycomputer.internet_protocolComputer scienceCognitive radioComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSContext (language use)Protocol stackComputer Networks and CommunicationHardware and ArchitectureSoftware deploymentProgrammable MACUse casebusinessSoftware-defined networkingcomputerProtocol (object-oriented programming)SoftwareReverse Address Resolution ProtocolComputer networkProceedings of the 8th ACM international workshop on Wireless network testbeds, experimental evaluation & characterization
researchProduct

Per-flow signalling extension across DiffServ domains

2003

This paper describes a framework devised to extend per-flow admission control operation across Differentiated Services domains. Although the specific case of interoperability with RSVP is under discussion, our proposal can be easily adapted to other hop-by-hop signalling protocols. In our framework, DiffSery border routers accomplish three tasks. First, during the set-up phase, flows are mapped onto PHB groups on the basis of their QoS and traffic specifications. Second, signalling packets are tunnelled into IP packets marked as “probes”, where the “probe” marking is a DCSP value associated to the considered PHB Group. Third, when the flow set-up is complete, flow data packets are marked as…

Differentiated servicesComputer scienceNetwork packetbusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSInteroperabilityScalabilityProvisioningAdmission controlbusinessComputer networkCall blocking
researchProduct

Wireless MAC processors: programming MAC protocols on commodity hardware

2012

Programmable wireless platforms aim at responding to the quest for wireless access flexibility and adaptability. This paper introduces the notion of wireless MAC processors. Instead of implementing a specific MAC protocol stack, Wireless MAC processors do support a set of Medium Access Control “commands” which can be run-time composed (programmed) through software-defined state machines, thus providing the desired MAC protocol operation. We clearly distinguish from related work in this area as, unlike other works which rely on dedicated DSPs or programmable hardware platforms, we experimentally prove the feasibility of the wireless MAC processor concept over ultra-cheap commodity WLAN hardw…

Chipsetbusiness.industryFirmwareComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReconfigurabilityNetwork interfacecomputer.software_genreWLAN 802.11 reconfigurabilityProtocol stackCognitive radioprogrammable MACEmbedded systemWireless lancognitive radio overlay software modules running on the host computer.WirelessbusinesscomputerWireless distribution systemComputer network
researchProduct

Endpoint Admission Control with Delay Variation Measurements for QoS in IP Networks.

2002

In this paper we describe a novel Endpoint Admission Control scheme (EAC) for IP telephony. EAC mechanisms are driven by independent measurements taken by the edge nodes on a flow of packets injected in the network to probe the source to destination path. Our scheme is characterized by two fundamental features. First, it does not rely on any additional procedure in internal network routers other than the capability to apply different service priorities to probing and data packets. Second, the connection admission decision is based on the analysis of the probing flow delay variation statistics. Simulation results, which focus on a IP telephony scenario, show that, despite the lack of core ro…

RouterVoice over IPComputer Networks and Communicationsbusiness.industryComputer scienceNetwork packetQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnd-to-end delayReal-time computingAdmission controlOptical IP SwitchingEnhanced Data Rates for GSM EvolutionbusinessSoftwareComputer network
researchProduct

On the accuracy of some common modeling assumptions for EDCA analysis

2005

Several models have been discussed in literature in order to evaluate the performance of the EDCA differentiation mechanisms. Despite of the exponential back off rules, usually the EDCA protocol has been modeled as a persistent slotted access protocol, and summarized into a set of access probabilities. These models often show a very different complexity and accuracy, according to the basis assumptions. In this paper, we propose a new modeling approach for EDCA, in which the medium access is described in terms of backoff counter comparisons, contention by contention, and no restrictive hypothesis is considered. Through our model, we verify the applicability of the most common protocol simpli…

backoff algorithmWireless local area networks (WLAN)Throughput
researchProduct

The Effect of Heterogeneous Link Capacities in BitTorrent-like File Sharing System

2004

researchProduct

Enabling Cognitive-Radio Paradigm on Commercial Off-The-Shelf 802.11 Hardware

2013

Cognitive Radio paradigm (CR) has been recognized as key enabler for next generation wireless networking: the pos- sibility to access the limited radio spectrum in an oppor- tunistic manner allows secondary users to boost their trans- mission performance without interfering with existing pri- mary networks. Full testing and experimenting with this paradigm, however, is still a tough task, given either the i) limited capabilities above the PHY layer of cheap SDR so- lutions, or the ii) heavy investment required for setting up multi-node testbeds powered by FPGAs. In this demo we show how we leveraged our Wireless MAC Processor archi- tecture to tackle the two issues at the same time, providi…

Wireless networkbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerLocal area networkMicroarchitectureCognitive radioEmbedded systemCognitive radio Wireless MAC Processor ControlWirelessbusinessCommercial off-the-shelfCommunication channelComputer network
researchProduct

OASIS-HT: design of a pharmacogenomic dose-finding study.

2005

Experimental evidence and observations in humans strongly support an interactive role of mutated α-adducin, sodium (Na+)/potassium (K+)-adenosine triphosphatase (ATPase) activity and endogenous ouabain in Na+homeostasis and the pathogenesis of hypertension. The Ouabain and Adducin for Specific Intervention on Sodium in HyperTension (OASIS-HT) trial is an early Phase II dose-finding study, which will be conducted across 39 European centers. Following a run-in period of 4 weeks without treatment, eligible patients will be randomized to one of five oral doses of rostafuroxin consisting of 0.05, 0.15, 0.5, 1.5, or 5.0 mg/day. Each dose will be compared to a placebo in a double-blind crossover e…

AdultMalemedicine.medical_specialtyRandomizationTime FactorsSystolic hypertensionMolecular ConformationAdministration OralBlood PressurePharmacologyPlaceboOuabainDrug Administration ScheduleDouble-Blind MethodRisk FactorsInternal medicineGeneticsClinical endpointMedicineHumansAndrostanolsOuabainAntihypertensive AgentsPharmacologyCross-Over StudiesDose-Response Relationship Drugbusiness.industryMiddle Agedmedicine.diseaseCrossover studyBlood pressureEndocrinologyTreatment OutcomeHypertensionMolecular MedicineCalmodulin-Binding ProteinsFemalebusinessHomeostasismedicine.drugPharmacogenomics
researchProduct

Is Admission-Controlled Traffic Self-Similar?

2002

It is widely recognized that the maximum number of heavy-tailed flows that can be admitted to a network link, while meeting QoS targets, can be much lower than in the case of markovian flows. In fact, the superposition of heavy-tailed flows shows long range dependence (self-similarity), which has a detrimental impact on network performance. In this paper, we show that long range dependence is significantly reduced when traffic is controlled by a Measurement-Based Admission Control (MBAC) algorithm. Our results appear to suggest that MBAC is a value added tool to improve performance in the presence of self-similar traffic, rather than a mere approximation for traditional (parameter-based) ad…

Service qualitysymbols.namesakeControl theoryComputer scienceCall Admission ControlQuality of servicesymbolsRange (statistics)Markov processNetwork performanceAdmission controlSimulation
researchProduct

Breaking layer 2: A new architecture for programmable wireless interfaces

2012

This paper introduces a new architecture for programmable wireless interfaces, aiming at responding to the emerging request of wireless access flexibility and adaptability. Instead of implementing a specific MAC protocol stack, the proposed architecture supports a set of programmable services, devised to customize the wireless access operations according to specific network and application scenarios. The services are composed by means of simpler functions, which in turns work on system primitives (i.e. elementary non-programmable functionalities, natively provided by the system) dealing with the physical transmission and reception of the frames. Our approach significantly differs from softw…

Service (systems architecture)Settore ING-INF/03 - Telecomunicazionibusiness.industryComputer scienceInterface (computing)Quality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReconfigurabilityMAC program service function architecture flexibility reconfigurabilityProtocol stackTransmission (telecommunications)PHYWirelessbusinessComputer network2012 International Conference on ICT Convergence (ICTC)
researchProduct

Performance evaluation of Peer-to-Peer file sharing systems: analytical models and simulation tools

2005

researchProduct

An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards

2006

It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance differences are evident both when the cards contend alone to the channel, and when heterogeneous cards contend together. Since the performance misalignment does not disappear by averaging the environmental factors (such as propagation conditions, laptop models, traffic generators, etc), it is evident that the well known throughput-fairness property of the DCF protocol is not guaranteed in actual networks. In this paper we propose a methodological approach devised to experimentally characterize the IEEE 802.11 commercial …

Inter-Access Point ProtocolComputer sciencebusiness.industryReal-time computingWireless local area networks (WLAN)Network allocation vectorThroughputbackoff algorithmIEEE 802.11Network interface controllerMedia access controlIEEE 802.11e-2005IEEE 802.1XbusinessThroughput (business)Computer network
researchProduct

Performance Evaluation of a new Adaptive Packet Marking Scheme for TCP over DiffServ Networks

2004

In differentiated services (DiffServ) networks, packets may receive a different treatment according to their differentiated services code point (DSCP) label. As a consequence, packet marking schemes can be devised to differentiate packets belonging to the same TCP flow, with the goal of improving the experienced performance. The paper presents an extensive performance evaluation of a new adaptive packet marking scheme, applied to a traffic scenario composed of TCP flows with different lengths. The proposed marking scheme is most efficient when applied to a scenario composed of all long-lived flows. In a realistic mixed traffic scenario, composed of both long-lived and short-lived TCP flows,…

Scheme (programming language)Queueing theoryTCP Friendly Rate ControlDifferentiated servicesbusiness.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSbusinesscomputerComputer networkcomputer.programming_languageTCP global synchronization
researchProduct

A Space-Division Time-Division MAC Protocol for broadband wireless access

2004

researchProduct

“Vendor-Affected” WLAN experimental results: A Pandora’s Box?

2008

Experimental results are typically envisioned as the ultimate validation reference for any theoretical and/or simulation modelling assumptions. However, in the case of Wireless LANs, the situation is not nearly as straightforward as it might seem. In this paper, we discuss to what (large) extent measurement results may depend on proprietary undocumented algorithms implemented in the vendor-specific card/driver employed. Specifically, we focus on the experimental study of IEEE 802.11 b/g outdoor links based on the widely used Atheros/MADWiFi card/driver pair. We show that unexpected performance divergences do emerge in two classes of comparative experiments run on a same outdoor link: broadc…

Focus (computing)S-boxComputer sciencebusiness.industryVendorBroadcastingComputer securitycomputer.software_genrePreamblePHYWireless lanUnicastbusinesscomputerMultipath propagationComputer network2008 International Conference on Telecommunications
researchProduct

Performance evaluation of a measurement-based algorithm for distributed admission control in a DiffServ framework

2002

Distributed Admission Control in IP DiffServ environments is an emerging and promising research area. Distributed admission control solutions share the idea that no coordination among network routers (i.e. explicit signaling) is necessary, when the decision whether to admit or reject a new offered flow is pushed to the edge of the IP network. Proposed solutions differ in the degree of complexity required in internal network routers, and result in a different robustness and effectiveness in controlling the accepted traffic. This paper builds on a recently proposed distributed admission control solution, called GRIP (Gauge&Gate Reservation with Independent Probing), designed to integrate the …

business.industrycomputer.internet_protocolComputer scienceQuality of serviceNode (networking)Traffic policingThroughputInternet traffic engineeringAdmission controlNetwork traffic controlInternet protocol suiteRobustness (computer science)ScalabilityTraffic shapingbusinessTraffic generation modelcomputerComputer network
researchProduct

A space-division time-division multiple access scheme for high throughput provisioning in WLANs

2005

Directional antennas may dramatically increase the capacity of a Wireless LAN by allowing several stations to simultaneously communicate. Since deployment of directive/smart antennas on the customer's terminals is awkward (for technological, cost, robustness, and convenience reasons) it is of interest to deploy advanced antenna solutions only at the Access Point. When omnidirectional transmissions are used at the Mobile Stations, the asynchronous nature of the 802.11 MAC handshake structurally limits the possibility to exploit spatial reuse. Significant throughput enhancements can be achieved only at the expense of redesigning (part of) the 802.11 MAC protocol: mainly a form of synchronizat…

Mobile radioDirectional antennaComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessSmart antennaMedium access controlThroughputSpace-division multiple accessInterference (wave propagation)Backward compatibilityAsynchronous communicationWireless landirectional antennaDirective antennasbusinessOmnidirectional antennaComputer network
researchProduct

Packet management techniques for measurement based end-to-end admission control in IP networks

2000

End-to-end Measurement Based connection Admission Control (EMBAC) mechanisms have been proposed to support real-time flows quality of service requirements over a Differentiated Services Internet architecture. The EMBAC basic idea is to decentralize the admission control decision, by requiring each individual user to probe the network path during flow setup, and by basing the accept/reject decision on the probing traffic statistics measured at the destination. In conformance with the differentiated services framework, routers are oblivious to individual flows and only need to serve data packets with a higher priority than probing traffic. In this paper, we build upon the observation that som…

RouterComputer Networks and CommunicationsNetwork packetbusiness.industryComputer scienceQuality of serviceThroughputAdmission controlNetwork congestionDifferentiated servicesEnd-to-end principlebusinessInformation SystemsComputer network
researchProduct

"MAC Parameters Tuning for Best Effort Traffic in 802.11e Contention-Based Networks"

2006

researchProduct

On the Fidelity of IEEE 802.11 commercial cards

2006

The IEEE 802.11 D CF protocol is known to be fair in terms of long-term resource repartition among the contending stations. However, when considering real scenarios, where commercial 802.11 cards interact, very unpredictable as well as sometimes surprising behaviors emerge. Motivation of this paper is to investigate the reasons of the very evident disagreement between the theoretical IEEE 802.11 DCF protocol models and its practical implementations. Inparticular, we try to characterize the card behavior not only in terms of perceived throughput, but also in terms of low-level channel access operations. In fact, the simple throughput analysis does not allow to identify what affecting paramet…

Signal processingCommunication channels (information theory); Internet; Signal processing; Wireless telecommunication systems; Baseband signals; Carrier sense function; MAC layer; Network protocolsComputer scienceMAC layerWireless local area networks (WLAN)backoff algorithmCommunication channels (information theory)IEEE 802.11Wireless telecommunication systemsNetwork protocolsThroughput (business)InternetBaseband signalsChannel allocation schemesSIMPLE (military communications protocol)Settore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerCarrier sense functionThroughputNetwork interface controllerEmbedded systemResource allocationbusinessComputer networkCommunication channel
researchProduct

A new Three Color Marker for TCP flows

2004

In Differentiated Services networks, packets may receive a different treatment according to their Differentiated Services Code Point (DSCP) label. As a consequence, packet marking schemes can be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the experienced performance. This paper presents an extensive performance evaluation of a new adaptive packet marking scheme, which relies on three different service classes, provided by the DiffServ network. The scheme provides protection of vulnerable packets in the TCP flows and adaptivity through "probes" packets. The performance have been evaluted in a traffic scenario composed of TCP flows with different …

lcsh:T58.5-58.64lcsh:Information technologyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDiffServRIOMarkingTCPREDlcsh:P87-96lcsh:Communication. Mass mediaJournal of Systemics, Cybernetics and Informatics
researchProduct

Wireless MAC Processor Networking: A Control Architecture for Expressing and Implementing High-Level Adaptation Policies in WLANs

2013

The current proliferation of unplanned wireless local area networks (WLANs) is creating the need for implementing different adaptation strategies to improve network performance under mutating and evolving interference scenarios. In this article, we envision a new solution for expressing and implementing high-level adaptation policies in WLANs, in contrast to the current approaches based on vendor-specific implementations. We exploit the hardware abstraction interface recently proposed by the wireless medium access control (MAC) processor (WMP) architecture and some flow-control concepts similar to the Openflow model for defining MAC adaptation policies. A simple control architecture for dis…

OpenFlowbusiness.industryWireless networkService setComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless WANlaw.inventionlawAutomotive EngineeringMultiple Access with Collision Avoidance for WirelessWi-FiControl architecture Wireless MAC Processor MAClet distribution flow controlbusinessHeterogeneous networkComputer networkWireless distribution system
researchProduct

Design and performance evaluation of an hybrid reservation-polling MAC protocol for power-line communications

2003

This paper presents an hybrid reservation-polling MAC protocol able to effectively deal with the channel disturbances typical of Power-line communication systems. Channel access is controlled by a scheduler running on a centralized station. Fast retransmission of corrupted packets is employed to achieve high performance on Power-line channels characterized by frequent error bursts due to impulsive noise. The performance of our proposed mechanism are evaluated by means of simulation, for the more challenging case of time-sensitive traffic sources (voice calls). Results show that the system efficiency is virtually not affected by lightly to moderately disturbed PLC channel. Moreover, by sligh…

Computer Networks and CommunicationsNetwork packetComputer sciencebusiness.industryRetransmissionReal-time computingReservationCommunications systemNoise (electronics)Packet lossElectrical and Electronic EngineeringPollingbusinessComputer networkCommunication channelInternational Journal of Communication Systems
researchProduct

PCP-DV: An End-to end Admission Control Mechanism for IP Telephony

2001

In this paper we describe a novel endpoint admission control mechanism for IP telephony:the PCP-DV which is characterized by two fundamental features. First, it does not rely on any additional procedure in internal network routers other than the capability to apply different service priority to probing and data packets. Second, the triggering mechanism for the connection admission decision is based on the analysis of the delay variation statistics over the probing flow. Numerical results for an IP telephony traffic scenario prove that 99th delay percentiles not greater than few ms per router are guaranteed even in overload conditions.

RouterVoice over IPEnd-to-end principleNetwork packetbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThe InternetOptical IP SwitchingAdmission controlTelephonybusinessComputer network
researchProduct

MAClets: Active MAC Protocols over hard-coded devices

2012

We introduce MAClets, software programs uploaded and executed on-demand over wireless cards, and devised to change the card's real-time medium access control operation. MAClets permit seamless reconfiguration of the MAC stack, so as to adapt it to mutated context and spectrum conditions and perform tailored performance optimizations hardly accountable by an once-for-all protocol stack design. Following traditional active networking principles, MAClets can be directly conveyed within data packets and executed on hard-coded devices acting as virtual MAC machines. Indeed, rather than executing a pre-defined protocol, we envision a new architecture for wireless cards based on a protocol interpr…

WLAN 802.11business.industryComputer scienceNetwork packetSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork virtualizationControl reconfigurationAccess controlProtocol stackSoftware portabilityprogrammable MACEmbedded systemcognitive radiobusinessProtocol (object-oriented programming)reconfigurabilityActive networkingComputer network
researchProduct

Supporting Multimedia Streaming in VANs

2004

researchProduct

Deploying Virtual MAC Protocols Over a Shared Access Infrastructure Using MAClets

2013

Network virtualization has been extensively researched in the last years as a key enabler for improving the network performance. However, virtualization in wireless networks pose some unique challenges: first, the usual over-provisioning approach for providing isolation between multiple virtual entities is not viable; second, the partitioning criteria are often ambiguous, since the actual resources perceived by each entity depend on many external (and time-varying) factors. In this demo, we show an effective virtualization solution for wireless local area networks, solving the problem of isolation and flexible resource paritioning, based on the concept of MAClets. MAClets are software progr…

Full virtualizationHardware virtualizationNetwork packetComputer scienceWireless networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniDistributed computingLocal area networkNetwork virtualizationVirtualizationcomputer.software_genreUploadNetwork performancebusinesscomputerComputer networkCognitive network wireless internet mac layer
researchProduct

An explanation for unexpected 802.11 outdoor link-level measurement results

2008

This paper provides experimental evidence that "weird'/poor outdoor link-level performance measurements may be caused by driver/card-specific antenna diversity algorithms unexpectedly supported/activated at the WLAN transmitter side. We focus our analysis on the Atheros/MADWiFi card/driver case, and we observe that the transmit antenna diversity mechanisms remain by default enabled when the available antennas are not homogeneous in terms of gain or, even worse, when only a single antenna is connected. This may cause considerable performance impairments (large frame loss ratio), in conditions frequently encountered in outdoor link deployments. The negative impact of transmit antenna diversit…

Transmission (telecommunications)business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniFrame (networking)TransmitterLink levelBroadcastingAntenna (radio)UnicastTelecommunicationsbusinessAntenna diversity
researchProduct

Performance analysis of the Out-of-Band signalling scheme for high speed wireless LANs

2004

researchProduct

Endpoint Admission Control over Assured Forwarding PHBs and Its Performance over RED Implementations

2001

The Assured Forwarding Per Hop Behavior (AF PHB) has been devised by the IETF Differentiated Services (DiffServ) working group to provide drop level differentiation. The intent of AF is to support services with different loss requirements, but with no strict delay and jitter guarantees. Another suggested use of AF is to provide differentiated support for traffic conforming to an edge conditioning/policing scheme with respect to nonconforming traffic. Scope of this paper is twofold. First, we show that, quite surprisingly, a standard AF PHB class is semantically capable of supporting per flow admission control. This is obtained by adopting the AF PHB as core routers forwarding mechanism in c…

Core routerEdge deviceDifferentiated servicesbusiness.industryComputer scienceQuality of serviceAdmission controlbusinessQueueComputer networkJitterHop (networking)
researchProduct

Performance evaluation of differentiated access mechanisms effectiveness in 802.11 networks

2005

The IEEE 802.11e draft specification aims to extend the original 802.11 MAC protocol by introducing priority mechanisms able to manage bandwidth and resource allocation according to the QoS needs of real-time applications. Different strategies based on MAC parameter diversifications, such as contention window limits, contention window updating factor and silence monitoring time, can be pursued in order to provide service differentiation, also in the case of distributed access. In this paper, we investigate on the behaviour of each differentiation possibility under different load conditions and traffic requirements. Our results show that the most powerful mechanisms which provide service dif…

Service (systems architecture)Order (exchange)business.industryComputer scienceQuality of serviceWireless lanBandwidth (computing)Resource allocationWindow (computing)businessProtocol (object-oriented programming)Computer network
researchProduct

Performance analysis of the out-of-band signaling scheme for high speed wireless LANs

2005

In this paper, we study the performance of our earlier proposed out-of-band signaling (OBS) scheme for high speed wireless local area networks (WLANs). We employ the system approximation technique for modeling of the OBS scheme. An equivalent state dependent single server queue, that describes the OBS scheme, is constructed for the analysis of the throughput and delay performances. Moreover, we study the throughput optimization of the OBS scheme, which provides a means for optimizing the performance of the OBS scheme, given a particular network environment. Finally, we conduct several simulation experiments to validate our analytical results.

Scheme (programming language)Wi-Fi arraybusiness.industryComputer scienceAstrophysics::High Energy Astrophysical PhenomenaLocal area networkWireless WANThroughputWireless LAN controllerComputer Science::PerformanceWireless lanOut-of-band managementComputer Science::Networking and Internet ArchitectureWirelessHigh Energy Physics::ExperimentbusinesscomputerThroughput (business)computer.programming_languageComputer network
researchProduct

An analytical model of a new packet marking algorithm for TCP flows

2005

In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…

TCP accelerationComputer Networks and CommunicationsComputer scienceTransmission Control ProtocolTCP tuningThroughputRandom early detectionRound-trip delay timeH-TCPActive queue managementTCP sequence prediction attackComputer securitycomputer.software_genrelaw.inventionTCP Westwood plusTCP Friendly Rate ControlPacket switchinglawInternet ProtocolZeta-TCPQueueNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSToken bucketTelecommunications networkTCP global synchronizationDifferentiated servicesNetwork servicebusinesscomputerComputer network
researchProduct

Adaptive Low Priority Packet Marking for Better TCP Performance

2003

This paper proposes a packet marking scheme for TCP traffic. Unlike previous literature work, in our scheme the majority of TCP packets are transmitted as high priority. The role of a low priority packet appears that of a probe, whose goal is to early discover network congestion conditions. Low priority packets are marked according to an adaptive marking algorithm. Numerical results show that our scheme provides improved throughput/delay performance.

CUBIC TCPTCP VegasTCP accelerationbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingTCP tuningTCP global synchronizationTCP Westwood plusTCP Friendly Rate ControlZeta-TCPbusinessComputer network
researchProduct

Analysis of the IEEE 802.11e EDCA Under Statistical Traffic

2006

Many models have been proposed to analyze the performance of the IEEE 802.11 distributed coordination function (DCF) and the IEEE 802.11e enhanced distributed coordination function (EDCA) under saturation condition. To analyze DCF under statistical traffic, Foh and Zukerman introduce a model that uses Markovian Framework to compute the throughput and delay performance. In this paper, we analyze the protocol service time of EDCA mechanism and introduce a model to analyze EDCA under statistical traffic using Markovian Framework. Using this model, we analyze the throughput and delay performance of EDCA mechanism under statistical traffic.

IEEE 802Computer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMarkov processWireless local area networks (WLAN)ThroughputDistributed coordination functionThroughputComputer Science::OtherComputer Science::Performancebackoff algorithmsymbols.namesakeWireless lanComputer Science::Networking and Internet ArchitecturesymbolsbusinessThroughput (business)Protocol (object-oriented programming)Computer network
researchProduct

Quality of Service Multicasting over Differentiated Services Networks

2003

This paper proposes a solution to support real-time multicast traffic with Quality of Service (QoS) constraints over Differentiated Services (DiffServ) IP networks. Our solution allows multicast users to dynamically join and leave the multicast tree. Moreover, it allows a multicast user which has negotiated a best-effort session to upgrade to a QoS-enabled session. Our solution is backward compatible with the Protocol Independent Multicast (PIM) scheme. It combines two ideas. First, resource availability along a new QoS path is verified via a probe-based approach. Second, QoS is maintained by marking replicated packets with a special DSCP value, before forwarding them on the QoS path.

MulticastProtocol Independent MulticastComputer scienceInter-domainbusiness.industrycomputer.internet_protocolNetwork packetDistributed computingQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDistance Vector Multicast Routing ProtocolAdmission controlSource-specific multicastDifferentiated servicesInternet Group Management ProtocolReliable multicastMulticast addressIP multicastXcastbusinesscomputerPragmatic General MulticastComputer network
researchProduct

Capture Aware Sequential Waterfilling for LoraWAN Adaptive Data Rate

2020

LoRaWAN (Long Range Wide Area Network) is emerging as an attractive network infrastructure for ultra low power Internet of Things devices. Even if the technology itself is quite mature and specified, the currently deployed wireless resource allocation strategies are still coarse and based on rough heuristics. This paper proposes an innovative "sequential waterfilling" strategy for assigning Spreading Factors (SF) to End-Devices (ED). Our design relies on three complementary approaches: i) equalize the Time-on-Air of the packets transmitted by the system's EDs in each spreading factor's group; ii) balance the spreading factors across multiple access gateways, and iii) keep into account the c…

FOS: Computer and information sciencesComputer scienceDistributed computingInternet of ThingsWireless communicationresource allocationServers02 engineering and technologyNetwork topologyspreading factorsinter-SF interferenceComputer Science - Networking and Internet Architecturechannel captureBandwidthServerLPWAN0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureElectrical and Electronic Engineeringinternet of t6hingsNetworking and Internet Architecture (cs.NI)Network packetbusiness.industryApplied MathematicsResource managementinternet of t6hings; LoRaWAN; spreading factors; resource allocation; adaptive data rate; channel capture; inter-SF interference020206 networking & telecommunicationsComputer Science ApplicationsLoRaWANadaptive data rateWide area networkScalabilityHeuristicsbusinessInterferenceUplinkCommunication channel
researchProduct

Improved support for streaming services in vehicular networks

2004

This paper presents a resource management mechanism aimed at improving the effectiveness of streaming services in vehicular networks. The scenario considered in this paper is that of a group of customers located into a same public vehicle, e.g. a moving train connected to the network via a satellite link, and requesting either video-on-demand-like services, as well as real-time diffusive (broadcast) streaming services. We show that a proxy server, devised to introduce an elastic buffer aimed at decoupling the information retrieval download speed on the outer network from the natural play-out speed used in the vehicular network, results to be an extremely effective approach in reducing the o…

Mobile radioVehicular ad hoc networkbusiness.industryDownloadComputer scienceQuality of serviceTelecommunications servicecomputer.software_genreProxy serverIntelligent NetworkResource managementbusinesscomputerComputer network2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577)
researchProduct

MAC learning

2016

Cognition as a way to deal with the challenges of future wireless networks has been largely considered by the recent literature, with a main focus on physical layer adaptability and dynamic spectrum access. In this demo, we show how a simple cognition mechanism can be also applied at the MAC layer, by exploiting the emerging paradigm of programmable wireless cards. The idea is using the formal definition of simple MAC protocol components and platform-independent representation of channel events gathered from the wireless node, for emulating the behavior of protocols which are not currently running on the network, learning about their expected performance, and dynamically reconfiguring the w…

ScheduleSIMPLE (military communications protocol)Wireless networkbusiness.industryComputer scienceDistributed computingNode (networking)Physical layer020206 networking & telecommunications02 engineering and technology0202 electrical engineering electronic engineering information engineeringWirelessbusinessProtocol (object-oriented programming)Computer networkCommunication channelProceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization
researchProduct

A Migration Path for the Internet: From Best-Effort to a QoS Capable Infrastructure by Means of Localized Admission Control

2000

Looking back at many proposals appeared on the scene in these years, a fundamental lesson to be learned is that their success or failure is strictly tied to their backward compatibility with existing infrastructures. In this paper, we consider the problem of providing explicit admission control decisions for QoS aware services. We rely the decision to admit a new flow upon the successful and timely delivery, through the Internet, of probe packets independently generated by the end points. Our solution, called GRIP (Gauge&Gate Realistic Internet Protocol), is fully distributed and scalable, as admission control decisions are taken at the edge network nodes, and no coordination between router…

Routerbusiness.industryComputer scienceNetwork packetResource Reservation Protocolcomputer.internet_protocolQuality of serviceInternet layerDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAdmission controlBackward compatibilitylaw.inventionlawInternet ProtocolThe InternetbusinesscomputerComputer network
researchProduct