Search results for "Computer network"
showing 10 items of 1634 documents
Multicast polling and efficient voip connections in ieee 802.16 networks
2007
IEEE 802.16 standard defines the wireless broadband access network technology called WiMAX which introduces several interesting advantages including its the support for quality of service (QoS) at the MAC layer. Its several features, such as multicast polling support the base station (BS) to provide the QoS guarantees for subscriber stations (SSs). The specification, however, does not define very exactly how this optional multicast polling technique should be used. We propose a way to use this feature on the base stations and also suggest an addition to the specification, to serve several different delay requirements. To test the proposed solution and the performance of the multicast pollin…
Multicast delivery of file download services in 3G mobile networks with MBMS
2008
This article investigates the efficient transmission of file download services to several users simultaneously in 3G mobile networks with HSDPA (High-Speed Downlink Packet Access) and MBMS (Multimedia Broadcast Multicast Services). HSDPA supports high speed point-to-point (p-t-p) transmissions (up to several Mb/s), whereas with MBMS the same content can be transmitted with a point-to-multipoint (p-t-m) connection to multiple users in a unidirectional fashion. Multicast delivery can be implemented through only p-t-p transmissions with HSDPA, a single p-t-m transmission with MBMS, or using both jointly in a hybrid approach by employing HSDPA for error repair of the MBMS p-t-m transmission. We…
Estimation techniques to measure subjective quality on live video streaming in Cloud Mobile Media services
2018
Abstract The adoption of smart phones, the increased access to mobile broadband networks and the availability of public cloud infrastructures are aligning to the next generation of truly ubiquitous multimedia services, known as Cloud Mobile Media (CMM) services offering mobile video. Nevertheless, due to an inherit higher and variable end to end delay mainly as a result of the virtualization process, new challenges appear. One challenge is given by live video streaming applications when trying to keep a good Quality of Experience of the delivered video, measured in terms of a subjective video quality metric, named Mean Opinion Score (MOS). Our goal is to estimate and predict this subjective…
Multimedia application to support distance learning and other social interactions in real-time
2000
Supporting social interactions, in distance learning situations for example, with modern technology is very difficult. Generally Internet, networked PC, document handling and communication services and applications are not designed from a multiple user perspective but to support a one-person-one-device (or tool) interaction. This approach creates problems for supporting awareness of, and communication with other people while simultaneously working on documents. Such simultaneous activities have been identified as essential by CSCW and CHI studies, where users are reported to move promiscuously between media and devices, and combine applications and media intuitively, while maintaining aware…
Applying a web-based training to foster self-regulated learning — Effects of an intervention for large numbers of participants
2016
Trainings on self-regulated learning (SRL) have been shown to be effective in improving both competence of self-regulated learning and objective measures of performance. However, human trainers can reach only a limited number of people at a time. Web-based trainings (WBT) could improve efficiency, as they can be distributed to potentially unlimited numbers of participants. We developed a WBT based on the process model of SRL by Schmitz and Wiese (2006) and tested it with 211 university students in a randomized control evaluation study including additional process analyses of learning diaries. Results showed that the training had significant effects on SRL knowledge, SRL behavior measured by…
Scalable Virtual Network Video-Optimizer for Adaptive Real-Time Video Transmission in 5G Networks
2020
The increasing popularity of video applications and ever-growing high-quality video transmissions (e.g., 4K resolutions), has encouraged other sectors to explore the growth of opportunities. In the case of health sector, mobile Health services are becoming increasingly relevant in real-time emergency video communication scenarios where a remote medical experts’ support is paramount to a successful and early disease diagnosis. To minimize the negative effects that could affect critical services in a heavily loaded network, it is essential for 5G video providers to deploy highly scalable and priorizable in-network video optimization schemes to meet the expectations of a large quantity of vide…
Clustering-Based Algorithm for Connectivity Maintenance in Vehicular Ad-Hoc Networks
2014
International audience; Among recent advances in wireless communication technologies' field, Vehicular Ad-hoc Networks (VANETs) have drawn the attention of both academic and industry researchers due to their potential applications including driving safety, entertainment, emergency applications, and content sharing. VANET networks are characterized by their high mobile topology changes. Clustering is one of the control schemes used to make this global topology less dynamic. It allows the formation of dynamic virtual backbone used to organize the medium access, to support quality of service and to simplify routing. Mainly, nodes are organized into clusters with at least one cluster head (CH) …
A secret sharing scheme for anonymous DNS queries
2013
Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…
Effect of size and deformation on polarizabilities of carbon nanotubes from atomic increments
2004
The interacting induced-dipole polarization model implemented in program POLAR is used for the calculation of the polarizability α. The method is tested with single-wall carbon nanotubes (SWNTs) as a function of radius and elliptical deformation. This work gives a partial success with the application of POLAR when compared with reference calculations performed with program PAPID. α follows a simple law. PAPID differentiates more effectively than POLAR among SWNTs with increasing radial deformation, a can be modified reversibly by external radial deformation. Different effective αeff are calculated for the atoms at the highest and lowest curvature sites. The difference between POLAR and PAPI…
LaCoDa: Layered connected topology for massive data centers
2017
One of the fundamental challenges of existing data centers is to design a network that interconnects massive number of servers, and therefore providing an efficient and fault-tolerant routing service to upper-layer applications. Several solutions have been proposed (e.g. FatTree, DCell and BCube), however they either scale too fast (i.e., double exponentially) or too slow. This paper proposes a new data center topology, called LaCoDa, that combines the advantages of previous topologies while avoiding their limitations. LaCoDa uses a small node degree that matches physical restriction for servers, and it also interconnects a large number of servers while reducing the wiring complexity and wi…