Search results for " local area"

showing 10 items of 14 documents

Efficiency analysis of burst transmissions with block ACK in contention-based 802.11e WLANs

2005

The channel utilization efficiency of the standard 802.11 networks is severely compromised when high data transmission rates are employed, since physical layer headers and control frames are transmitted at low rate, thus wasting more channel time, proportionally. The extensions defined in the emerging 802.11e for quality-of-service (QoS) provisioning include some new mechanisms developed in order to improve the efficiency. Those include data transmission bursting (referred to as TXOP operation) and acknowledgment aggregation (referred to as block ACK). These two features allow it to offer new data transmission services, in which the data delivery and acknowledgment unit is not a single fram…

Computer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingPhysical layerWireless local area networks (WLAN)ThroughputThroughputbackoff algorithmIntelligent NetworkWireless lanIEEE 802.11e-2005businessData transmissionCommunication channelBlock (data storage)Computer network
researchProduct

Streaming for vehicular users via elastic proxy buffer management

2004

In this article we refer to the market of vehicular networks, where groups of customers located in the same public vehicle (e.g., a train or bus) connect to a terrestrial network through a wireless/satellite backbone link. Elastic buffering is a proxy management technique devised to decouple the multimedia information retrieval rate on the network backbone from the playout streaming rate at the user terminal. It has been shown in the past that the application of elastic buffering mechanisms in terrestrial networks brings significant advantages in terms of network effectiveness. We show that elastic buffering is an extremely effective means to reduce, or even eliminate, streaming service out…

Mobile radioService (systems architecture)Computer Networks and CommunicationsComputer scienceDelayed real time servicesMultimedia information retrievalCommunication channels (information theory)Resource sharing algorithmBuffer storageWirelessInformation retrievalWireless telecommunication systemsElectrical and Electronic EngineeringReal time streaming servicesProxy (statistics)Railroad car equipmentVehicular area networksBackbone networkInternetMobile computingVehicular ad hoc networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSatellite communication systemsElastic proxy buffer managementLocal area networksReal time systemsAlgorithms; Buffer storage; Communication channels (information theory); Information retrieval; Internet; Local area networks; Multimedia systems; Railroad car equipment; Real time systems; Satellite communication systems; Satellite links; Wireless telecommunication systems; Delayed real time services; Elastic proxy buffer management; Fast internet for fast train hosts (FIFTH); Real time streaming services; Resource sharing algorithm; Vehicular area networks; Mobile computingComputer Science ApplicationsTerminal (electronics)Fast internet for fast train hosts (FIFTH)businessSatellite linksAlgorithmsMultimedia systemsComputer network
researchProduct

Dynamic MAC Parameters Configuration for Performance Optimization in 802.11e Networks

2006

Quality of service support in wireless LAN is a theme of current interest. Several solutions have been proposed in literature in order to protect time-sensitive traffic from best-effort traffic. According to the EDCA proposal, which is a completely distributed solution, the service differentiation is provided by giving probabilistically higher number of channel accesses to stations involved in real-time applications. To this purpose, the MAC parameter settings of each contending stations can be tuned dynamically. In this paper, we face the problem of tuning the EDCA MAC parameters in common scenarios in which a given number of low-rate delay-sensitive traffic flows share the channel with so…

backoff algorithmWireless local area networks (WLAN)Throughput
researchProduct

Remarks on IEEE 802.11 DCF Performance Evaluation, IEEE Communication Letters, Vol. 9, Issue 8, Aug 2005 pp:765 - 767

2005

This letter presents a new approach to evaluate the throughput/delay performance of the 802.11 Distributed Coordination Function (DCF). Our approach relies on elementary conditional probability arguments rather than bidimensional Markov chains (as proposed in previous models), and can be easily extended to account for backoff operation more general than DCF's one

backoff algorithmWireless local area networks (WLAN)Throughput
researchProduct

Governing Local Area Development through Dynamic Performance Management

2017

Several attempts of local areas development fail due to a predominant attention to the internal performance of public organizations. The perspective of local area development may enhance performance management in public entities by considering: a) their outcomes in the local area; b) the inter-institutional relationships actable with other local areas’ organizations to achieve such outcome; c) the improvement of the activity of other social institutions, enterprises and families, through networking and trust. This paper proposes a dynamic performance management (DPM) conceptual model to govern local area development and includes a case study of the Integrated Water System of Agrigento, Ital…

Process managementPerformance managementbusiness.industrymedia_common.quotation_subject05 social sciencesEnvironmental resource managementOutcome (game theory)0506 political scienceDevelopment (topology)0502 economics and business050602 political science & public administrationConceptual modelBusiness Management and Accounting (miscellaneous)Social institutionbusinessLawDynamic performance management (DPM) systems. Local area development. Social capital. Outcome. Public organization.050203 business & managementPublic financemedia_commonPublic Organization Review
researchProduct

On the accuracy of some common modeling assumptions for EDCA analysis

2005

Several models have been discussed in literature in order to evaluate the performance of the EDCA differentiation mechanisms. Despite of the exponential back off rules, usually the EDCA protocol has been modeled as a persistent slotted access protocol, and summarized into a set of access probabilities. These models often show a very different complexity and accuracy, according to the basis assumptions. In this paper, we propose a new modeling approach for EDCA, in which the medium access is described in terms of backoff counter comparisons, contention by contention, and no restrictive hypothesis is considered. Through our model, we verify the applicability of the most common protocol simpli…

backoff algorithmWireless local area networks (WLAN)Throughput
researchProduct

An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards

2006

It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance differences are evident both when the cards contend alone to the channel, and when heterogeneous cards contend together. Since the performance misalignment does not disappear by averaging the environmental factors (such as propagation conditions, laptop models, traffic generators, etc), it is evident that the well known throughput-fairness property of the DCF protocol is not guaranteed in actual networks. In this paper we propose a methodological approach devised to experimentally characterize the IEEE 802.11 commercial …

Inter-Access Point ProtocolComputer sciencebusiness.industryReal-time computingWireless local area networks (WLAN)Network allocation vectorThroughputbackoff algorithmIEEE 802.11Network interface controllerMedia access controlIEEE 802.11e-2005IEEE 802.1XbusinessThroughput (business)Computer network
researchProduct

Revisit of RTS/CTS Exchange in High-Speed IEEE 802.11 Networks

2005

IEEE 802.11 medium access control (MAC), called distributed coordination function (DCF), provides two different access modes, namely, 2-way (basic access) and 4-way (RTS/CTS) handshaking. The 4-way handshaking has been introduced in order to combat the hidden terminal phenomenon. It has been also proved that such a mechanism can be beneficial even in the absence of hidden terminals, because of the collision time reduction. We analyze the effectiveness of the RTS/CTS access mode, in current 802.11b and 802.11a networks. Since the rates employed for control frame transmissions can be much lower than the rate employed for data frames, the assumption on the basis of the 4-way handshaking introd…

Hidden node problembusiness.industryComputer scienceReal-time computingFrame (networking)Wireless local area networks (WLAN)Distributed coordination functionThroughputbackoff algorithmHandshakingMedia access controlMultiple Access with Collision Avoidance for WirelessIEEE 802.11e-2005businessCarrier sense multiple access with collision avoidanceComputer networkSixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks
researchProduct

On the Fidelity of IEEE 802.11 commercial cards

2006

The IEEE 802.11 D CF protocol is known to be fair in terms of long-term resource repartition among the contending stations. However, when considering real scenarios, where commercial 802.11 cards interact, very unpredictable as well as sometimes surprising behaviors emerge. Motivation of this paper is to investigate the reasons of the very evident disagreement between the theoretical IEEE 802.11 DCF protocol models and its practical implementations. Inparticular, we try to characterize the card behavior not only in terms of perceived throughput, but also in terms of low-level channel access operations. In fact, the simple throughput analysis does not allow to identify what affecting paramet…

Signal processingCommunication channels (information theory); Internet; Signal processing; Wireless telecommunication systems; Baseband signals; Carrier sense function; MAC layer; Network protocolsComputer scienceMAC layerWireless local area networks (WLAN)backoff algorithmCommunication channels (information theory)IEEE 802.11Wireless telecommunication systemsNetwork protocolsThroughput (business)InternetBaseband signalsChannel allocation schemesSIMPLE (military communications protocol)Settore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerCarrier sense functionThroughputNetwork interface controllerEmbedded systemResource allocationbusinessComputer networkCommunication channel
researchProduct

Image of a Local Area: Measuring and Managing

2018

The image of a local area can be conceived as cumulative beliefs, ideas, opinions, and experiences people have about a place. Image embodies a large number of information, memories, and suggestions that pertain to a specific place, which are processed by human mind by selecting relevant evidence from a big amount of data about a local area. Image conceptualizes the value and/or a certain level of performance that a place expresses and it inspires human behaviors. The image of a local area is perceiveid by people, it is part of knowledge structures related to a place and it is long-lasting and difficult to change. Measuring and managing the image of a local area can support the socioeconomic…

Image of local areaPlace conceptualizationRepresentation of a territoryImpression of a placePlace perception
researchProduct