Search results for " computing"

showing 10 items of 2075 documents

Measurement and Modeling of the Origins of Starvation of Congestion-Controlled Flows in Wireless Mesh Networks

2009

Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over CSMA-based multihop wireless networks. Despite these advances, however, no prior work identified severe throughput imbalances in the basic scenario of mesh networks, in which a one-hop flow contends with a two-hop flow for gateway access. In this paper, we demonstrate via real network measurements, testbed experiments, and an analytical model that starvation exists in such a scenario; i.e., the one-hop flow receives most of the bandwidth, while the two-hop flow starves. Our analytical model yields a solution consisting of a simple contention window policy that can be implemented vi…

Wireless mesh networkComputer Networks and CommunicationsWireless networkComputer sciencebusiness.industryDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMesh networkingTestbedThroughputComputer Science ApplicationsIEEE 802.11Default gatewayWireless lanBandwidth (computing)Electrical and Electronic EngineeringbusinessSoftwareComputer networkIEEE/ACM Transactions on Networking
researchProduct

Supporting a Pseudo-TDMA Access Scheme in Mesh Wireless Networks

2013

Wireless mesh networks appear a promising solution for pro- viding ubiquitous low-cost wireless access, but cannot rely on simple CSMA access protocols because of the critical inefficiencies that arise in topologies with hidden nodes. To overcome these limitations, some important protocol extensions based on synchronization and reservation mechanisms have been ratified. In this paper we show that an alternative approach to the standardiza- tion of new features and signaling messages for mesh networks can be the utilization of programmable nodes able to execute different MAC protocols programmed on the fly. Signaling messages are used only for disseminating the new protocol among the nodes. …

Wireless mesh networkHidden node problembusiness.industryComputer scienceWireless networkSettore ING-INF/03 - TelecomunicazioniDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOrder One Network ProtocolShared meshKey distribution in wireless sensor networkswireless mesh networks synchronization pseudo-TDMA random accessbusinessComputer networkIEEE 802.11sWireless distribution system
researchProduct

An automatic cooperative retransmission MAC protocol in Wireless Local Area Networks

2009

Existing solutions for cooperation in wireless networks either require simultaneous transmission of source and relay nodes or impose major modifications to original MAC protocols. In this paper, a new efficient retransmission MAC protocol is proposed for IEEE 802.11 based cooperation communications, with minimum modifications to the DCF scheme. Throughput and access delay performance of the proposed protocols is analyzed in error-prone and highly temporally correlated channels. Numerical results show that significant benefits can be achieved with our cooperative protocol, compared with the legacy schemes.

Wireless networkComputer sciencebusiness.industryRetransmissionDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLocal area networkThroughputlaw.inventionIEEE 802.11Transmission (telecommunications)RelaylawWirelessbusinessComputer network2009 European Wireless Conference
researchProduct

Making WiFi work in multi-hop topologies: Automatic negotiation and allocation of airtime

2015

We propose a solution for mitigating the performance impairments of CSMA/CA protocols in multi-hop topologies based on the dynamic adaptation of the contention process experienced by nodes in a wireless network. A distributed protocol is used to negotiate the channel airtime for a node as a function of the traffic requirements of its neighbourhood, taking into account bandwidth reserved for the control operations. A mechanism is provided for a node to tune its contention window depending on its allocated airtime. Different from previous schemes, a node's contention window is fixed in size unless the traffic requirements of its neighbourhood change. The scheme is implemented on legacy commer…

Wireless networkbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniDistributed computingmedia_common.quotation_subjectComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedCrewNeighbourhood (graph theory)TestbedNegotiation protocolNetwork topologyHop (networking)NegotiationMulti-hop WIFIComputer Networks and CommunicationControl and Systems EngineeringbusinessComputer networkmedia_common
researchProduct

Power consumption analysis for mobile stations in hybrid relay-assisted wireless networks

2010

While Internet access using mobile or wireless technologies has become ubiquitous these days, the energy consumption aspect of such connections has not been studied in-depth yet. In this paper, a hybrid wireless network, which consists of a cellular component and a relay-assisted ad hoc component, is studied focusing on energy consumption by mobile stations with respect to the amount of data communicated and achieved battery lifetime. Four alternative paths are considered, including both pure cellular and hybrid ad hoc/cellular links for uplink and downlink traffic. The effects of each alternative connection on energy consumption of the involved mobile stations are analyzed in terms of the …

Wireless networkbusiness.industryComputer scienceWireless ad hoc networkMobile stationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingCellular networkMobile ad hoc networkEnergy consumptionMobile telephonybusinessComputer networkIEEE 5th International Symposium on Wireless Pervasive Computing 2010
researchProduct

On building an infrastructure for mobile and wireless systems

2002

Over the last few years, there have been at least two dramatic changes in the way computers are used. The first has its origin in the fact that computers have become more and more connected to each other. The second was triggered by the increasing miniaturization and affordability of hardware components and power supplies, together with the development of wireless communication paths. These two trends combined have allowed the development of powerful, yet comparatively low-priced, portable computers. In spite of these changes, little attention has been given to reaching a common consensus and to the development of a strong infrastructure in this area.

Wireless site surveyComputer sciencebusiness.industryDistributed computingWirelessWireless WANWireless systemsTelecommunicationsbusinessSoftwareMunicipal wireless networkInformation SystemsACM SIGMOD Record
researchProduct

Mobile information systems - executives' view

1997

The concepts of travelling executive and executives' mobile information system are first defined in this paper. The main findings are in the form of collected data and opinions concluded from our personal discussions with 49 executives in the United Kingdom, France, Italy and Finland concerning the nature of the work of executives and the usage of information technology (IT) to support their work today. The near future expectations of the executives are also analysed, especially concerning the mobile use of IT services in order to construct executives' holistic view of mobile computing. The use of IT services was found to be very widespread. Big differences were found: some of the executive…

Work (electrical)Computer Networks and Communicationsbusiness.industryOrder (business)Mobile information systemsCultural diversityMobile computingInformation technologyPublic relationsbusinessConstruct (philosophy)SoftwareInformation SystemsInformation Systems Journal
researchProduct

Experiments in Non-Coherent Post-editing

2017

Market pressure on translation productivity joined with technological innovation is likely to fragment and decontextualise translation jobs even more than is cur-rently the case. Many different translators increasingly work on one document at different places, collaboratively working in the cloud. This paper investigates the effect of decontextualised source texts on behaviour by comparing post-editing of sequentially ordered sentences with shuffled sentences from two different texts. The findings suggest that there is little or no effect of the decontextualised source texts on behaviour.

Work (electrical)Fragment (logic)business.industryComputer scienceNon coherentCloud computingArtificial intelligencebusinesscomputer.software_genrecomputerProductivityNatural language processingProceedings of the Workshop on Human-Informed Translation and Interpreting Technology
researchProduct

Protection concepts from optical radiation used in places of danger from explosion of gases, vapour or cloud of particles

2005

Use of optical systems in hazardous locations can result in ignition of surrounding explosive atmosphere. The conducted research work allowed to propose three protection concepts. The primary protection concept - inherently safe optical radiation - consists in use of optical radiation with power, energy or irradiance incapable of causing ignition of surrounding explosive atmosphere. However, the arbitrary determination of values of these parameters is considered as excessively rigorous. The work presents the proposed protection concepts in relation to zone classification. The author describes his own method to determine safe values based on probability mathematics that can be used not only …

Work (thermodynamics)Explosive materialbusiness.industryCloud computingRadiationPower (physics)law.inventionIgnition systemOpticsHazardous wastelawOptical radiationAerospace engineeringbusinessMathematicsSPIE Proceedings
researchProduct

Generating and Instantiating Abstract Workflows with QoS User Requirements

2017

The growing availability of services accessible through the network makes it possible to build complex applications resulting from their composition that are usually characterized also by non-functional properties, known as Quality of Service (QoS). To exploit the full potential of service technology, automatic QoS-based composition of services is crucial. In this work a framework for automatic service composition is presented that relies on planning and service negotiation techniques for addressing both functional and non-functional requirements. The proposed approach allows for dynamic service composition and QoS attributes, and it can be applied when services are provided in the contest …

WorkflowComputer scienceQuality of serviceDistributed computingService-Oriented ComputingAutomatic Service CompositionUser requirements documentMulti-Agent Negotiation
researchProduct