Search results for "Computer network"
showing 10 items of 1634 documents
Energy efficiency and CO2 emissions of port container terminal equipment: Evidence from the Port of Valencia
2019
Abstract Energy efficiency has emerged as a key point in port industry because of different factors such as the adoption of stronger environmental regulations and the increasing pressure of the local community on the surrounding ports. As gathering operational data from port terminals can be difficult due to privacy, studies on emissions and energy efficiency of these terminals are scarce. The following research provides key information about the real energy consumption and CO2 emissions of one of the most relevant container terminals in the Mediterranean area, located in Valencia, Spain. The results show that yard terminal tractors and rubber tyred gantry cranes (RTGs) are the main emissio…
Indexing Method for Transitive Relationships of Product Information
2008
To successfully use a relational database management system (RDBMS) as a repository for product information, the RDBMS must efficiently process and properly answer ontological queries. The key to processing the ontological queries is whether the various semantic relationships among the concepts of the product ontology are likewise well-processed. In particular, the transitive relationships (e.g., is-a, component-of relationships) such as ancestors-descendents, parents-children, and taxonomy of products must be processed successfully. We propose an efficient index using a numbering scheme (labeling scheme) to process queries over transitive relationships. (This paper is an extended version o…
Reliability of Data Transmission of UAVs
2018
Drones have been recently an interesting subject of research due to their roles in accomplishing missions. Flying in a formation fleet, they form a cooperative communication system in order to improve the efficiency of the mission. For this reason, the reliability of the communication is essential to guarantee the overall performance of the fleet although the link conditions, the external factors and the hardware failures of a drone. The drones capture several images or videos of the geographical area of the mission and send them to other drones in the fleet or to the Ground Station Control (GSC). The importance is to ensure that all the data transmitted is received. In this article, we aim…
Performance evaluation of the MPE-iFEC Sliding RS Encoding for DVB-H streaming services
2008
This article studies the performance of the Sliding RS Encoding (SRSE) in the transmission of streaming services in DVB-H (Digital Video Broadcasting - Transmission System for Handheld Terminals) networks. The SRSE forms part of a set of specifications called MPE-iFEC which has been recently defined in the DVB-SH (Digital Video Broadcasting - Satellite Services to Handheld Devices) standard and is fully compatible with the link layer of DVB-H. MPE-iFEC is capable of encoding information related to different datagram bursts in a jointly manner in order to counteract the long signal blockages expected in satellite reception. This is what is usually referred to as Multi-Burst Encoding (MBE) an…
A novel teletraffic-based power saving scheme for cellular networks with microcells
2011
As the number of network components increases to meet the explosion of mobile devices, power conservation has become an important strategy for network operators. In this paper, we propose a novel teletraffic-based approach to save power consumption of a three-cell microcellular network. When the traffic load in the middle cell is lower than certain threshold, the cell can be switched-off and its users will be covered by increasing the transmission power of one sector antenna in each of the two neighboring cells. Numerical results demonstrate that at a moderate cost of increased antenna transmission power of the two sectors, significant amount of network power can be saved for the whole netw…
Real-time transmission over Switched Ethernet using a contracts based framework
2009
Switched Ethernet is being used for real time transmissions in industrial automation more and and more. Most modern industrial switches are equipped with mechanisms to deal with time predictability. However, real-time transmission not only requires these mechanisms, but also the proper policies for managing network resources. This paper proposes the use of contracts. A contract is a set of transmission specifications which are negotiated between the applications and the run-time support. They define the application workload and the required performance guarantees. We implement contracts for real-time streaming as an extension of FRESCOR (Framework for Real-time Embedded Systems based on COn…
Enabling Backoff and Eliminating Redundant Idle Period for Medium Access in LTE-U
2017
To address the burgeoning demand for mobile data, 3GPP is actively studying the capability of operating LTE in the unlicensed band, referred to as LTE-U. One of the main challenges of this approach is to maintain better coexistence between WiFi and LTE-U devices. To enable the coexistence, the listen before talk (LBT) principle has been adopted for LTE-U medium access with two flavors of mechanisms, i.e., load based equipment (LBE) and frame based equipment (FBE) access. In this paper, we consider the FBE mechanism and enhance its performance by introducing a backoff procedure for LTE devices. We investigate the original FBE mechanism defined by 3GPP and the enhanced FBE (E- FBE) mechanism fr…
Preamble Sampling MAC Protocol for Low Power Wireless Sensor Networks with IEEE 802.15.4 Transceivers
2006
In this paper a preamble sampling MAC protocol for low power wireless sensor networks is proposed. The article describes the implementation of the protocol using network nodes equipped with the Chipcon CC2420 802.15.4 transceiver. The power consumption of the transceiver has been measured and the MAC protocol has been adapted to the transceiver properties. The results show the trade-off between power consumption and transmission delay for this algorithm during the communication process.
Non-regular network performance comparison between HSDPA and LTE
2010
In this paper we study and benchmark the performance of 3rd Generation Partnership Project (3GPP) High Speed Downlink Packet Access (HSDPA) and 3GPP Long Term Evolution (LTE) Downlink with constant bit rate type traffic. In addition a non-regular simulation scenario is considered using realistic propagation data and base station positions related to Tokyo city downtown area. HSDPA was introduced in 3GPP Release 5 and in further releases the technology has been improved with e.g. receive and transmit diversity technologies and support for higher order modulation schemes. LTE was introduced in 3GPP Release 8 with completely new physical layer and improved Radio Resource Management (RRM) funct…
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol
2015
Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…