Search results for "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"

showing 10 items of 449 documents

Learning From Errors: Detecting Cross-Technology Interference in WiFi Networks

2018

In this paper, we show that inter-technology interference can be recognized using commodity WiFi devices by monitoring the statistics of receiver errors. Indeed, while for WiFi standard frames the error probability varies during the frame reception in different frame fields (PHY, MAC headers, and payloads) protected with heterogeneous coding, errors may appear randomly at any point during the time the demodulator is trying to receive an exogenous interfering signal. We thus detect and identify cross-technology interference on off-the-shelf WiFi cards by monitoring the sequence of receiver errors (bad PLCP, bad FCS, invalid headers, etc.) and propose two methods to recognize the source of in…

MonitoringComputer Networks and CommunicationsComputer scienceReal-time computingheterogeneous network050801 communication & media studies02 engineering and technologySpectrum managementZigBee0508 media and communicationsArtificial IntelligencePHY0202 electrical engineering electronic engineering information engineeringLong Term EvolutionDemodulationWireless fidelityHidden Markov modelsHidden Markov modelCross technology interferenceArtificial neural networkSettore ING-INF/03 - Telecomunicazioni05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKScoexistenceunlicensed bands020206 networking & telecommunicationsThroughputLearning from errorsHardware and ArchitectureInterferenceCoding (social sciences)
researchProduct

Enabling Retransmissions for Achieving Reliable Multicast Communications in WSNs

2016

To ensure end-to-end reliable multicast or broadcast transmissions in IEEE 802.15.4 based wireless sensor networks WSNs) is a challenging task since no retransmission and acknowledgment mechanisms are defined in such WSNs. In this paper, we propose three retransmission enabled multicast transmission schemes in order to achieve reliable packet transmissions in such networks. Different from the legacy CSMA/CA principle, these schemes allow a sending or forwarding node to retransmit a packet if necessary and enable implicit or/and explicit acknowledgment for multicast services. Simulations are performed in order to assess the performance of these schemes in terms of number of retransmissions, …

Multicast transmissionProtocol Independent MulticastMulticastbusiness.industryNetwork packetComputer scienceDistributed computingRetransmissionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsData_CODINGANDINFORMATIONTHEORY02 engineering and technologyEnergy consumptionKey distribution in wireless sensor networksSource-specific multicastPacket lossReliable multicast0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingXcastbusinessWireless sensor networkPragmatic General MulticastComputer network2016 IEEE 83rd Vehicular Technology Conference (VTC Spring)
researchProduct

Priority-oriented multicast transmission schemes for heterogeneous traffic in WSNs

2016

To ensure quality of service (QoS) for heterogeneous traffic in IEEE 802.15.4 based wireless sensor networks (WSNs) is a challenging task since no traffic prioritization mechanism is defined in such WSNs. In this paper, we propose two priority-oriented multicast transmission schemes to provide QoS for heterogeneous traffic in WSNs. Contrary to the legacy CSMA/CA and FIFO principles, these schemes differentiate self-generated or received traffic and give priority to delay-sensitive traffic with respect to channel access and packet scheduling. Simulations are performed in order to assess the performance of these schemes in terms of end-to-end delay, energy consumption, packet delivery ratio, …

Multicast transmissionbusiness.industryNetwork packetFIFO (computing and electronics)Computer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studies020206 networking & telecommunications02 engineering and technologyEnergy consumptionTask (computing)0508 media and communications0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkCommunication channel2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
researchProduct

Evaluation and improvement of collective flooding in WSNs with various link correlations

2015

One of the main challenges confronted by wireless sensor networks (WSNs) is to reduce energy consumption of nodes for the purpose of network lifetime extension. In the literature, many backbone based protocols such as connected dominating set (CDS) and broadcast or multicast based protocols are employed in order to improve network performance in terms of metrics like energy consumption, number of transmissions and dissemination delay. In this paper, we evaluate the performance of a recently proposed transmission protocol known as collective flooding (CF), which is based on link correlation, under various link correlation conditions. Through simulations and analyses we demonstrate that altho…

MulticastComputer sciencebusiness.industryDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy consumptionNetwork topologyConnected dominating setFlooding (computer networking)Key distribution in wireless sensor networksNetwork performancebusinessWireless sensor networkComputer network2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
researchProduct

Multicast TV over WLAN in a University Campus Network

2009

One of the multimedia services offered by the campus network of the Polytechnic University of Valencia is TV over IP. This service works well in the devices connected directly to the wired network but we have detected some problems when the receivers access to the campus network through wireless IEEE 802.11, especially when devices roam across the Campus. In this paper we propose and evaluate a server-based solution to minimize the packet loss and reduce the lack of service when the mobile devices roam from an Access Point to another Access Point in the wireless network. This solution uses a location system to modify the behaviour of standard multicasting protocols in order to get a near-se…

MulticastComputer sciencebusiness.industryWireless networkcomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSIPTVInternet protocol suiteCampus networkPacket lossNetwork access pointRoamingbusinessTelecommunicationscomputerComputer network2009 Fifth International Conference on Networking and Services
researchProduct

Quality of Service Multicasting over Differentiated Services Networks

2003

This paper proposes a solution to support real-time multicast traffic with Quality of Service (QoS) constraints over Differentiated Services (DiffServ) IP networks. Our solution allows multicast users to dynamically join and leave the multicast tree. Moreover, it allows a multicast user which has negotiated a best-effort session to upgrade to a QoS-enabled session. Our solution is backward compatible with the Protocol Independent Multicast (PIM) scheme. It combines two ideas. First, resource availability along a new QoS path is verified via a probe-based approach. Second, QoS is maintained by marking replicated packets with a special DSCP value, before forwarding them on the QoS path.

MulticastProtocol Independent MulticastComputer scienceInter-domainbusiness.industrycomputer.internet_protocolNetwork packetDistributed computingQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDistance Vector Multicast Routing ProtocolAdmission controlSource-specific multicastDifferentiated servicesInternet Group Management ProtocolReliable multicastMulticast addressIP multicastXcastbusinesscomputerPragmatic General MulticastComputer network
researchProduct

Multicast polling and efficient voip connections in ieee 802.16 networks

2007

IEEE 802.16 standard defines the wireless broadband access network technology called WiMAX which introduces several interesting advantages including its the support for quality of service (QoS) at the MAC layer. Its several features, such as multicast polling support the base station (BS) to provide the QoS guarantees for subscriber stations (SSs). The specification, however, does not define very exactly how this optional multicast polling technique should be used. We propose a way to use this feature on the base stations and also suggest an addition to the specification, to serve several different delay requirements. To test the proposed solution and the performance of the multicast pollin…

MulticastProtocol Independent Multicastcomputer.internet_protocolComputer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSource-specific multicastIP multicastXcastPollingbusinesscomputerPragmatic General MulticastComputer networkProceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
researchProduct

Multicast delivery of file download services in 3G mobile networks with MBMS

2008

This article investigates the efficient transmission of file download services to several users simultaneously in 3G mobile networks with HSDPA (High-Speed Downlink Packet Access) and MBMS (Multimedia Broadcast Multicast Services). HSDPA supports high speed point-to-point (p-t-p) transmissions (up to several Mb/s), whereas with MBMS the same content can be transmitted with a point-to-multipoint (p-t-m) connection to multiple users in a unidirectional fashion. Multicast delivery can be implemented through only p-t-p transmissions with HSDPA, a single p-t-m transmission with MBMS, or using both jointly in a hybrid approach by employing HSDPA for error repair of the MBMS p-t-m transmission. We…

Multicastbusiness.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYMultimedia Broadcast Multicast ServiceTransmitter power outputTransmission (telecommunications)Telecommunications linkTransmission timebusinessEnergy (signal processing)Computer network2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting
researchProduct

Clustering-Based Algorithm for Connectivity Maintenance in Vehicular Ad-Hoc Networks

2014

International audience; Among recent advances in wireless communication technologies' field, Vehicular Ad-hoc Networks (VANETs) have drawn the attention of both academic and industry researchers due to their potential applications including driving safety, entertainment, emergency applications, and content sharing. VANET networks are characterized by their high mobile topology changes. Clustering is one of the control schemes used to make this global topology less dynamic. It allows the formation of dynamic virtual backbone used to organize the medium access, to support quality of service and to simplify routing. Mainly, nodes are organized into clusters with at least one cluster head (CH) …

NS2Vehicular ad hoc networkAdaptive quality of service multi-hop routingbusiness.industryComputer scienceWireless ad hoc networkVehicular ad-hoc networksQuality of serviceNode (networking)Distributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAd hoc wireless distribution serviceconnectivity maintenance[SPI]Engineering Sciences [physics]Optimized Link State Routing ProtocolbusinessCluster analysisComputingMilieux_MISCELLANEOUSComputer networkcluster stabilityclustering
researchProduct

A secret sharing scheme for anonymous DNS queries

2013

Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…

Name serverInformation privacyComputer scienceRound-robin DNSecret sharing schemeOverlay networkServersServernsupdateISPDNS spoofingPeer-to-peer computingDNS hijackingdomain name systemInternetdata privacyender anonymitybusiness.industrySettore ING-INF/03 - TelecomunicazioniDomain Name Systemquery processinguser privacyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSmultiple nodeIP networkInternet service provideranonymous DNS queryPrivacyecurity of dataCryptographybusinessComputer networkDSN serverRadiation detector
researchProduct