Search results for "Computer network"
showing 10 items of 1634 documents
Castadiva: A Test-Bed Architecture for Mobile AD HOC Networks
2007
Evaluating and deploying all sorts of protocols and applications designed for wireless ad hoc networks in a real environment is an important and urgent task. Traditionally, all the proposals made rely solely on simulator results. However, as different research groups develop different solutions to solve problems related to these new networks, it becomes more and more important to migrate the proposed solutions to a real environment. In this work we present Castadiva, a test-bed architecture that allows validating software solutions for ad hoc networks using low-cost, of the-shelf devices and open source software. Through a friendly user interface, Castadiva offers the possibility to define …
MP2P Network in Collecting Data from Sensor Networks
2006
Wireless sensor networks provide numerous applications today. At the same time modern wireless short-range communication technologies combined with mobile users create environments for mobile peerto- peer networks. This paper discusses a concept of an application in which an MP2P network is used for collecting sensor network data. This model requires certain places with a high mobile user density in order to function. Simulation results indicate that the model can be used in environments where these requirements are met.
Energy-Efficient Edge Computing Service Provisioning for Vehicular Networks: A Consensus ADMM Approach
2019
In vehicular networks, in-vehicle user equipment (UE) with limited battery capacity can achieve opportunistic energy saving by offloading energy-hungry workloads to vehicular edge computing nodes via vehicle-to-infrastructure links. However, how to determine the optimal portion of workload to be offloaded based on the dynamic states of energy consumption and latency in local computing, data transmission, workload execution and handover, is still an open issue. In this paper, we study the energy-efficient workload offloading problem and propose a low-complexity distributed solution based on consensus alternating direction method of multipliers. By incorporating a set of local variables for e…
An accurate and efficient collaborative intrusion detection framework to secure vehicular networks
2015
Display Omitted We design and implement an accurate and lightweight intrusion detection framework, called AECFV.AECFV aims to protect the vehicular ad hoc networks (VANETs) against the most dangerous attacks that could occurred on this network.AECFV take into account the VANET's characteristics such as high node's mobility and rapid topology change.AECFV exhibits a high detection rate, low false positive rate, faster attack detection, and lower communication overhead. The advancement of wireless communication leads researchers to develop and conceive the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). Security in such network is mandatory due to a vital informa…
The Potsdam Open Source Radio Interferometry Tool (PORT)
2021
The Potsdam Open Source Radio Interferometry Tool (PORT) is the very long baseline interferometry (VLBI) analysis software developed and maintained at the GFZ German Research Centre for Geosciences. Chiefly, PORT is tasked with the timely processing of VLBI sessions and post-processing activities supporting the generation of celestial and terrestrial reference frames. In addition, it serves as a framework for research and development within the GFZ's VLBI working group and is part of the tool set employed in educating young researchers. Starting out from VLBI group delays, PORT estimates station and radio sources positions, as well as Earth orientation parameters, tropospheric parameters, a…
Discovering Homophily in Online Social Networks
2018
During the last ten years, Online Social Networks (OSNs) have increased their popularity by becoming part of the real life of users. Despite their tremendous widespread, OSNs have introduced several privacy issues as a consequence of the nature of the information involved in these services. Indeed, the huge amount of private information produced by users of current OSNs expose the users to a number of risks. The analysis of the users’ similarity in OSNs is attracting the attention of researchers because of its implications on privacy and social marketing. In particular, the homophily between users could be used to reveal important characteristics that users would like to keep hidden, hence …
Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy
2022
FNEGE 3, HCERES A, ABS 2; International audience; The metaverse has the potential to extend the physical world using augmented and virtual reality technologies allowing users to seamlessly interact within real and simulated environments using avatars and holograms. Virtual environments and immersive games (such as, Second Life, Fortnite, Roblox and VRChat) have been described as antecedents of the metaverse and offer some insight to the potential socio-economic impact of a fully functional persistent cross platform metaverse. Separating the hype and “meta…” rebranding from current reality is difficult, as “big tech” paints a picture of the transformative nature of the metaverse and how it w…
A User-Balanced System for IP Telephony in WLANs
2008
Wireless IP telephony is becoming very popular between the users of large wireless local area networks (WLANs). This increment has been mainly caused because it allows cost savings. Although, large WLANs use to provide high availability and redundancy, WLANs lack on the available throughput when there are many IP telephony users. In this paper we present a system that reallocates IP telephony devices when the system detects that an AP is overloaded. The algorithm and the frames used for our proposal are described. Measurements taken show how the bandwidth consumed is transferred from an access point to another when our proposal is running. Finally, we show the time needed to re-associate re…
Dynamic Packet Bundling for VoIP Transmission Over Rel'7 HSUPA with 10ms TTI Length
2007
In this paper, the system level optimization of the voice over IP transmission in the HSUPA system, configured with a 10 ms TTI length, is analyzed. The study considers the release 7 improvements to HSUPA, in terms of the DPCCH gating concept. A dynamic activated MAC layer bundling of two VoIP packets in a single frame is proposed and compared against the single packet per frame transmission by means of quasi-static system level simulations.
Trade-Off between Increased Talk-Time and LTE Performance
2010
The purpose of this paper is to analyze the trade-off conditions between battery saving opportunities and long term evolution network performance. To achieve this goal voice over IP with discontinuous reception is studied. Analysis is conducted with vast amount of different settings, including on duration, inactivity and discontinuous reception cycle timers. The quality of service and battery saving opportunities with discontinuous reception are evaluated with a dynamic system simulator which enables detailed simulation of multiple users and cells with realistic assumptions. This paper indicates high battery saving, i.e., increased talk-time opportunities without compromising the performanc…