Search results for " protocol"
showing 10 items of 1320 documents
Conceptual graph operations for formal visual reasoning in the medical domain
2014
International audience; Objective - Conceptual graphs (CGs) are used to represent clinical guidelines because they support visual reasoning with a logical background, making them a potentially valuable representation for guidelines.Materials and methods - Conceptual graph formalism has an essential and basic component: a formal vocabulary that drives all of the other mechanisms, notably specialization and projection. The graph's theoretical operations, such as projection, rules, derivation, constraints, probabilities and uncertainty, support diagrammatic reasoning.Results - A conceptual graph's graphical user interface includes a multilingual vocabulary management, some query and decision-m…
One size hardly fits all
2013
This paper casts recent accomplishments in the field of Wireless MAC programmability into the emerging Software Defined Networking perspective. We argue that an abstract (but formal) description of the MAC protocol logic in terms of extensible finite state machines appears a convenient and viable data-plane programming compromise for modeling and deploying realistic MAC protocol logics. Our approach is shown to comply with existing control frameworks, and entails the ability to dynamically change the MAC protocol operation based on context and scenario conditions; in essence, move from the traditional idea of "one-size-fits-all" MAC protocol stack to the innovative paradigm of opportunistic…
WiSHFUL : enabling coordination solutions for managing heterogeneous wireless networks
2017
The paradigm shift toward the Internet of Things results in an increasing number of wireless applications being deployed. Since many of these applications contend for the same physical medium (i.e., the unlicensed ISM bands), there is a clear need for beyond-state-of-the-art solutions that coordinate medium access across heterogeneous wireless networks. Such solutions demand fine-grained control of each device and technology, which currently requires a substantial amount of effort given that the control APIs are different on each hardware platform, technology, and operating system. In this article an open architecture is proposed that overcomes this hurdle by providing unified programming i…
Energy-aware design for wireless mesh networks
2014
International audience; Wireless mesh networks (WMNs) are the next step in the development of the wireless architecture, delivering wireless services for a large variety of users in personal, local, campus, and metropolitan areas. Energy efficiency solutions are becoming more vital for both local access networks and wireless networks and Green IT has attracted a considerable attention. However, the application of green network for wireless mesh networks has seldom been described in the literature. However, WMNs infrastructure devices are always active. Thus, during lower traffic periods the energy consumption is the same as in busy hours, while it would be possible to save a large amount of…
WINSE: WiMAX NS-2 extension
2009
IEEE 802.16 standard defines the wireless broadband technology called WiMAX. When compared to other wireless technologies, it introduces many interesting advantages at PHY, MAC, and QoS layers. Heavy simulations are needed to study IEEE 802.16 performance and propose further enhancements to this standard. Link level simulations are not always sufficient, while system level simulators are not always accurate to capture MAC and transport protocol details. We implemented a 802.16 extension for the NS-2 network simulator. It includes upper PHY modeling, almost all the features of the 802.16 MAC layer, as well as the QoS framework. This article describes the implemented features, simulation meth…
Supporting a Pseudo-TDMA Access Scheme in Mesh Wireless Networks
2013
Wireless mesh networks appear a promising solution for pro- viding ubiquitous low-cost wireless access, but cannot rely on simple CSMA access protocols because of the critical inefficiencies that arise in topologies with hidden nodes. To overcome these limitations, some important protocol extensions based on synchronization and reservation mechanisms have been ratified. In this paper we show that an alternative approach to the standardiza- tion of new features and signaling messages for mesh networks can be the utilization of programmable nodes able to execute different MAC protocols programmed on the fly. Signaling messages are used only for disseminating the new protocol among the nodes. …
Testbed implementation of the meta-MAC protocol
2016
The meta-MAC protocol is a systematic and automatic method to dynamically combine any set of existing MAC protocols into a single higher layer MAC protocol. We present a proof-of-concept implementation of the meta-MAC protocol by utilizing a programmable wireless MAC processor (WMP) on top of a commodity wireless card in combination with a host-level software module. The implementation allows us to combine, with certain constraints, a number of protocols each represented as an extended finite state machine. To illustrate the combination principle, we combine protocols of the same type but with varying parameters in a wireless mesh network. Specifically, we combine TDMA protocols with all po…
A Wireless Mesh Network-based System for Hotspots Deployment and Management
2007
In recent years Wireless Local Area Networks (WLANs) or hotspots, as they are commonly known, have emerged as a promising networking platform to extend network connectivity in public venues, providing local coverage for Internet applications on the move in urban areas and rural environments. Wireless hotspots using 802.11-based technology have popped up in corporate offices, coffeehouses, airports, restaurants and bookstores worldwide. For all their utility and ease of use the 802.11 wireless protocol, known as WiFi, has become the mobile connectivity mechanism of choice for business people, travelers, villagers, and everyone else. Unfortunately, even with the protocol's ease of use and its…
Making WiFi work in multi-hop topologies: Automatic negotiation and allocation of airtime
2015
We propose a solution for mitigating the performance impairments of CSMA/CA protocols in multi-hop topologies based on the dynamic adaptation of the contention process experienced by nodes in a wireless network. A distributed protocol is used to negotiate the channel airtime for a node as a function of the traffic requirements of its neighbourhood, taking into account bandwidth reserved for the control operations. A mechanism is provided for a node to tune its contention window depending on its allocated airtime. Different from previous schemes, a node's contention window is fixed in size unless the traffic requirements of its neighbourhood change. The scheme is implemented on legacy commer…
COVID-19 Pandemic: Prevention and protection measures to be adopted at the workplace
2020
Introduction: SARS-CoV-2, identified in Wuhan, China, for the first time in December 2019, is a new viral strain, which has not been previously identified in humans; it can be transmitted both by air and via direct and indirect contact; however, the most frequent way it spreads is via droplets. Like the other viruses belonging to the same family of coronaviruses, it can cause from mild flu-like symptoms, such as cold, sore throat, cough and fever, to more severe ones such as pneumonia and breathing difficulties, and it can even lead to death. Since no effective specific drug therapy has been found yet, nor any vaccine capable of limiting the spread of this pathogen, it is important for way…