Search results for " computing"
showing 10 items of 2075 documents
Measurement and Modeling of the Origins of Starvation of Congestion-Controlled Flows in Wireless Mesh Networks
2009
Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over CSMA-based multihop wireless networks. Despite these advances, however, no prior work identified severe throughput imbalances in the basic scenario of mesh networks, in which a one-hop flow contends with a two-hop flow for gateway access. In this paper, we demonstrate via real network measurements, testbed experiments, and an analytical model that starvation exists in such a scenario; i.e., the one-hop flow receives most of the bandwidth, while the two-hop flow starves. Our analytical model yields a solution consisting of a simple contention window policy that can be implemented vi…
Supporting a Pseudo-TDMA Access Scheme in Mesh Wireless Networks
2013
Wireless mesh networks appear a promising solution for pro- viding ubiquitous low-cost wireless access, but cannot rely on simple CSMA access protocols because of the critical inefficiencies that arise in topologies with hidden nodes. To overcome these limitations, some important protocol extensions based on synchronization and reservation mechanisms have been ratified. In this paper we show that an alternative approach to the standardiza- tion of new features and signaling messages for mesh networks can be the utilization of programmable nodes able to execute different MAC protocols programmed on the fly. Signaling messages are used only for disseminating the new protocol among the nodes. …
An automatic cooperative retransmission MAC protocol in Wireless Local Area Networks
2009
Existing solutions for cooperation in wireless networks either require simultaneous transmission of source and relay nodes or impose major modifications to original MAC protocols. In this paper, a new efficient retransmission MAC protocol is proposed for IEEE 802.11 based cooperation communications, with minimum modifications to the DCF scheme. Throughput and access delay performance of the proposed protocols is analyzed in error-prone and highly temporally correlated channels. Numerical results show that significant benefits can be achieved with our cooperative protocol, compared with the legacy schemes.
Making WiFi work in multi-hop topologies: Automatic negotiation and allocation of airtime
2015
We propose a solution for mitigating the performance impairments of CSMA/CA protocols in multi-hop topologies based on the dynamic adaptation of the contention process experienced by nodes in a wireless network. A distributed protocol is used to negotiate the channel airtime for a node as a function of the traffic requirements of its neighbourhood, taking into account bandwidth reserved for the control operations. A mechanism is provided for a node to tune its contention window depending on its allocated airtime. Different from previous schemes, a node's contention window is fixed in size unless the traffic requirements of its neighbourhood change. The scheme is implemented on legacy commer…
Power consumption analysis for mobile stations in hybrid relay-assisted wireless networks
2010
While Internet access using mobile or wireless technologies has become ubiquitous these days, the energy consumption aspect of such connections has not been studied in-depth yet. In this paper, a hybrid wireless network, which consists of a cellular component and a relay-assisted ad hoc component, is studied focusing on energy consumption by mobile stations with respect to the amount of data communicated and achieved battery lifetime. Four alternative paths are considered, including both pure cellular and hybrid ad hoc/cellular links for uplink and downlink traffic. The effects of each alternative connection on energy consumption of the involved mobile stations are analyzed in terms of the …
On building an infrastructure for mobile and wireless systems
2002
Over the last few years, there have been at least two dramatic changes in the way computers are used. The first has its origin in the fact that computers have become more and more connected to each other. The second was triggered by the increasing miniaturization and affordability of hardware components and power supplies, together with the development of wireless communication paths. These two trends combined have allowed the development of powerful, yet comparatively low-priced, portable computers. In spite of these changes, little attention has been given to reaching a common consensus and to the development of a strong infrastructure in this area.
Mobile information systems - executives' view
1997
The concepts of travelling executive and executives' mobile information system are first defined in this paper. The main findings are in the form of collected data and opinions concluded from our personal discussions with 49 executives in the United Kingdom, France, Italy and Finland concerning the nature of the work of executives and the usage of information technology (IT) to support their work today. The near future expectations of the executives are also analysed, especially concerning the mobile use of IT services in order to construct executives' holistic view of mobile computing. The use of IT services was found to be very widespread. Big differences were found: some of the executive…
Experiments in Non-Coherent Post-editing
2017
Market pressure on translation productivity joined with technological innovation is likely to fragment and decontextualise translation jobs even more than is cur-rently the case. Many different translators increasingly work on one document at different places, collaboratively working in the cloud. This paper investigates the effect of decontextualised source texts on behaviour by comparing post-editing of sequentially ordered sentences with shuffled sentences from two different texts. The findings suggest that there is little or no effect of the decontextualised source texts on behaviour.
Protection concepts from optical radiation used in places of danger from explosion of gases, vapour or cloud of particles
2005
Use of optical systems in hazardous locations can result in ignition of surrounding explosive atmosphere. The conducted research work allowed to propose three protection concepts. The primary protection concept - inherently safe optical radiation - consists in use of optical radiation with power, energy or irradiance incapable of causing ignition of surrounding explosive atmosphere. However, the arbitrary determination of values of these parameters is considered as excessively rigorous. The work presents the proposed protection concepts in relation to zone classification. The author describes his own method to determine safe values based on probability mathematics that can be used not only …
Generating and Instantiating Abstract Workflows with QoS User Requirements
2017
The growing availability of services accessible through the network makes it possible to build complex applications resulting from their composition that are usually characterized also by non-functional properties, known as Quality of Service (QoS). To exploit the full potential of service technology, automatic QoS-based composition of services is crucial. In this work a framework for automatic service composition is presented that relies on planning and service negotiation techniques for addressing both functional and non-functional requirements. The proposed approach allows for dynamic service composition and QoS attributes, and it can be applied when services are provided in the contest …