Search results for "Computer network"

showing 10 items of 1634 documents

Towards a Dual-mode Adaptive MAC Protocol (DMA-MAC) for Feedback-based Networked Control Systems

2014

Abstract Automated control systems play an important part in many industrial domains and the medium used for communication between devices in these systems is in transition from wired to wireless for cost reasons. Control systems have strict requirements on delay, throughput, and reliability, that vary with time during operation. Addressing these requirements requires predictable and robust protocols to be employed, and they must be adaptive to the varying states of the controlled process. In this article, we propose a dual-mode adaptive medium access control protocol that caters for two main operation modes in control systems: the steady mode operation, and the transient mode operation. We…

Wireless Sensor Actuator NetworksAutomatic controlbusiness.industryComputer scienceReliability (computer networking)Real-time computingThroughputAccess controlEnergy consumptionIndustrial control systemAutomationIndustrial Application.Process ControlAutomationEmbedded systemControl systemGeneral Earth and Planetary SciencesProcess controlbusinessGeneral Environmental ScienceProcedia Computer Science
researchProduct

Supporting scalable video transmission in MANETs through distributed admission control mechanisms

2009

Emerging multimedia applications over mobile devices are becoming very popular, especially over infrastructure wireless networks such as cellular and WLANs. However, providing this kind of services over infrastructureless networks like ad hoc networks presents many additional problems. One of these problems is how to share resources fairly among the users involved. In this article we propose a QoS framework supporting scalable video streaming in mobile ad hoc networks based on distributed admission control and video traffic awareness. Our framework promotes fairness between video flows in terms of resource consumption. It also guarantees a significant reduction of the idle times experienced…

Wireless ad hoc networkComputer scienceWireless networkbusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingMobile ad hoc networkAdmission control:Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors::Serveis telemàtics i de comunicació multimèdia [Àrees temàtiques de la UPC]Video qualityNetwork congestionVídeo -- TransmissióAd hoc networks (Computer networks) -- Access controlbusinessComputer network
researchProduct

Network Reconfiguration Suitability for Scientific Applications

2008

This paper analyzes the communication pattern of several scientific applications and how they can make profit of network reconfiguration in order to adapt network topology to the communication needs so that total execution time is reduced. By using an analysis methodology based on real application executions, we study the variation of the required communication bandwidth with time and also the global interprocedural communication patterns. Results show that required bandwidth between each pair of processes does not significantly fluctuates, leading to a constant use of the links and therefore discouraging dynamic reconfigurations of the network during execution time. Nevertheless, the group…

Wireless ad hoc networkComputer sciencebusiness.industryDistributed computingMessage passingMessage Passing InterfaceSystem on a chipNetwork reconfigurationbusinessNetwork topologyNetwork simulationComputer network2008 37th International Conference on Parallel Processing
researchProduct

Ensuring the QoS requirements in 802.16 scheduling

2006

IEEE 802.16 standard defines the wireless broadband access network technology called WiMAX. WiMAX introduces several interesting advantages, and one of them is the support for QoS at the MAC level. For these purposes, the base station must allocate slots based on some algorithm. We propose a simple, yet efficient, solution for the WiMAX base station that is capable of allocating slots based on the QoS requirements, bandwidth request sizes, and the WiMAX network parameters. To test the proposed solution, we have implemented the WiMAX MAC layer in the NS-2 simulator. Several simulation scenarios are presented that demonstrate how the scheduling solution allocates resources in various cases. S…

Wireless broadband accessBase stationComputer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSbusinessWiMAXComputer networkScheduling (computing)Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
researchProduct

WINSE: WiMAX NS-2 extension

2009

IEEE 802.16 standard defines the wireless broadband technology called WiMAX. When compared to other wireless technologies, it introduces many interesting advantages at PHY, MAC, and QoS layers. Heavy simulations are needed to study IEEE 802.16 performance and propose further enhancements to this standard. Link level simulations are not always sufficient, while system level simulators are not always accurate to capture MAC and transport protocol details. We implemented a 802.16 extension for the NS-2 network simulator. It includes upper PHY modeling, almost all the features of the 802.16 MAC layer, as well as the QoS framework. This article describes the implemented features, simulation meth…

Wireless broadbandIEEE 802.11w-2009Computer sciencebusiness.industryInter-Access Point ProtocolQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLink levelIEEE 802.1XNetwork allocation vectorbusinessWiMAXComputer networkProceedings of the Second International ICST Conference on Simulation Tools and Techniques
researchProduct

Measurement and Modeling of the Origins of Starvation of Congestion-Controlled Flows in Wireless Mesh Networks

2009

Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over CSMA-based multihop wireless networks. Despite these advances, however, no prior work identified severe throughput imbalances in the basic scenario of mesh networks, in which a one-hop flow contends with a two-hop flow for gateway access. In this paper, we demonstrate via real network measurements, testbed experiments, and an analytical model that starvation exists in such a scenario; i.e., the one-hop flow receives most of the bandwidth, while the two-hop flow starves. Our analytical model yields a solution consisting of a simple contention window policy that can be implemented vi…

Wireless mesh networkComputer Networks and CommunicationsWireless networkComputer sciencebusiness.industryDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMesh networkingTestbedThroughputComputer Science ApplicationsIEEE 802.11Default gatewayWireless lanBandwidth (computing)Electrical and Electronic EngineeringbusinessSoftwareComputer networkIEEE/ACM Transactions on Networking
researchProduct

Supporting a Pseudo-TDMA Access Scheme in Mesh Wireless Networks

2013

Wireless mesh networks appear a promising solution for pro- viding ubiquitous low-cost wireless access, but cannot rely on simple CSMA access protocols because of the critical inefficiencies that arise in topologies with hidden nodes. To overcome these limitations, some important protocol extensions based on synchronization and reservation mechanisms have been ratified. In this paper we show that an alternative approach to the standardiza- tion of new features and signaling messages for mesh networks can be the utilization of programmable nodes able to execute different MAC protocols programmed on the fly. Signaling messages are used only for disseminating the new protocol among the nodes. …

Wireless mesh networkHidden node problembusiness.industryComputer scienceWireless networkSettore ING-INF/03 - TelecomunicazioniDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOrder One Network ProtocolShared meshKey distribution in wireless sensor networkswireless mesh networks synchronization pseudo-TDMA random accessbusinessComputer networkIEEE 802.11sWireless distribution system
researchProduct

Testbed implementation of the meta-MAC protocol

2016

The meta-MAC protocol is a systematic and automatic method to dynamically combine any set of existing MAC protocols into a single higher layer MAC protocol. We present a proof-of-concept implementation of the meta-MAC protocol by utilizing a programmable wireless MAC processor (WMP) on top of a commodity wireless card in combination with a host-level software module. The implementation allows us to combine, with certain constraints, a number of protocols each represented as an extended finite state machine. To illustrate the combination principle, we combine protocols of the same type but with varying parameters in a wireless mesh network. Specifically, we combine TDMA protocols with all po…

Wireless mesh networkInter-Access Point ProtocolComputer sciencebusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science (all)020206 networking & telecommunications020302 automobile design & engineeringOrder One Network Protocol02 engineering and technologyWireless LAN controllerWireless Transport Layer Security0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringMedia access controlElectrical and Electronic EngineeringbusinessIEEE 802.11sWireless distribution systemComputer network
researchProduct

A Wireless Mesh Network-based System for Hotspots Deployment and Management

2007

In recent years Wireless Local Area Networks (WLANs) or hotspots, as they are commonly known, have emerged as a promising networking platform to extend network connectivity in public venues, providing local coverage for Internet applications on the move in urban areas and rural environments. Wireless hotspots using 802.11-based technology have popped up in corporate offices, coffeehouses, airports, restaurants and bookstores worldwide. For all their utility and ease of use the 802.11 wireless protocol, known as WiFi, has become the mobile connectivity mechanism of choice for business people, travelers, villagers, and everyone else. Unfortunately, even with the protocol's ease of use and its…

Wireless mesh networkbusiness.industryComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLocal area networkWireless WANCaptive portalWirelessWireless Application ProtocolThe InternetTelecommunicationsbusinesscomputerMunicipal wireless networkComputer networkInternational Conference on Networking and Services (ICNS '07)
researchProduct

An automatic cooperative retransmission MAC protocol in Wireless Local Area Networks

2009

Existing solutions for cooperation in wireless networks either require simultaneous transmission of source and relay nodes or impose major modifications to original MAC protocols. In this paper, a new efficient retransmission MAC protocol is proposed for IEEE 802.11 based cooperation communications, with minimum modifications to the DCF scheme. Throughput and access delay performance of the proposed protocols is analyzed in error-prone and highly temporally correlated channels. Numerical results show that significant benefits can be achieved with our cooperative protocol, compared with the legacy schemes.

Wireless networkComputer sciencebusiness.industryRetransmissionDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLocal area networkThroughputlaw.inventionIEEE 802.11Transmission (telecommunications)RelaylawWirelessbusinessComputer network2009 European Wireless Conference
researchProduct