Search results for "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"

showing 10 items of 449 documents

Enable concurrent transmissions with beamforming for broadband wireless access in CSMA/CA-based WLANs

2014

In CSMA/CA based wireless local networks, two stations are not allowed to transmit at the same time due to interference generated to each other, resulting in degraded throughput. Concurrent transmission, which enables simultaneous transmission of two or more stations under certain conditions, is able to overcome this problem, leading to enhanced channel utilization efficiency. Different from earlier work on this topic which focuses on omni-direction concurrent transmission, we introduce in this paper beamforming into a co-channel concurrent transmission scheme and investigate the benefits of concurrency with beamforming. The circumstances for concurrent transmission and frame scheduling are…

BeamformingWireless broadbandbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWirelessThroughputData_CODINGANDINFORMATIONTHEORYbusinessCarrier sense multiple access with collision avoidanceComputer networkCommunication channelScheduling (computing)2014 IEEE Globecom Workshops (GC Wkshps)
researchProduct

Stochastic Collaborative Beamforming in Wireless Sensor Networks

2018

Wireless Sensor Networks (WSNs) are composed of spatially distributed autonomous sensor devices, named motes. These devices are constituted by a microcontroller, sensors, and they have the ability to communicate in the ISM frequency band using the IEEE 802.15.4 standard. They have their own power supply, AA or AAA batteries, processing unit, sensors and wireless communications. Usually, the motes exchange packets using a multihop routing, and the maximum communication distance emitter-receiver is around 100m. At least one mote acts as a gateway, and the data gathered by the sensors of each mote have to be sent to this mote that is named sink or Base Station (BS). In a WSN the BS is within t…

Beamformingbusiness.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologySynchronizationBase station0203 mechanical engineeringTransmission (telecommunications)Default gateway0202 electrical engineering electronic engineering information engineeringWirelessComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinessWireless sensor networkComputer networkProceedings of the Euro American Conference on Telematics and Information Systems
researchProduct

Digital Resilience to Normal Accidents in High-Reliability Organizations

2021

Digital technologies play a dual role on organizational resilience. On one side, digital systems introduce new technological risks. On the other side, digital systems increase the performances in response to hazardous accidents. Normal Accident Theory (NAT) and High-Reliability Organization (HRO) provide useful ground to explain the dynamics of digital resilience. However, the two theories have been either used as alternatives or with one theory dominating the other. We posit that to fully understand digital resilience we need to integrate NAT and HRO concepts instead of using them in isolation. We conduct a bibliometric analysis to identify major themes and application domains characterizi…

Bibliometric analysisKnowledge managementbusiness.industryComputer scienceReliability (computer networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCrisis managementCrisis managementDigital resilienceReliabilityDigital resilience Reliability Accident Crisis management Complex socio-technical systemDual roleComplex socio-technical systemAccidentIsolation (database systems)businessResilience (network)
researchProduct

Regular versus as-needed budesonide and formoterol combination treatment for moderate asthma: A non-inferiority, randomised, double-blind clinical tr…

2015

Summary Background Treatment guidelines for patients with moderate persistent asthma recommend regular therapy with a combination of an inhaled corticosteroid and a longacting β 2 agonist plus as-needed rapid-acting bronchodilators. We investigated whether symptom-driven budesonide and formoterol combination therapy administered as needed would be as effective as regular treatment with this combination plus as-needed symptom-driven terbutaline for patients with moderate asthma. Methods In this non-inferiority randomised clinical trial, we recruited adult patients (18–65 years of age) with stable moderate persistent asthma, according to 2006 Global Initiative for Asthma guidelines. Patients …

BudesonideMalePediatricsKaplan-Meier Estimatelaw.inventionRandomized controlled triallawMedicineOutpatient clinicBudesonide Formoterol Fumarate Drug CombinationAnti-Asthmatic AgentsTreatment Failureeducation.field_of_studyasthma; clinical trialMedicine (all)clinical trialMiddle AgedCombined Modality TherapyBronchodilator AgentsFemalemedicine.drugHumanAdultPulmonary and Respiratory Medicinemedicine.medical_specialtyAdolescentTerbutalinePopulationSettore MED/10 - Malattie Dell'Apparato RespiratorioPlaceboDrug Administration ScheduleNOYoung AdultDouble-Blind MethodAdministration InhalationTerbutalineinhaled corticosteroids LABA asthma clinical trialHumansAnti-Asthmatic AgenteducationBronchodilator AgentPulmonary and Respiratory Medicine; Medicine (all)AsthmaAgedPulmonary and Respiratory Medicine RCT asthmabusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSmedicine.diseaseAsthmarespiratory tract diseasesFormoterolbusiness
researchProduct

Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections

2007

Despite recent research efforts, wireless ad hoc networking technology remains especially prone to security attacks. In this work our contribution focuses on determining the optimal trade-off between traffic dispersion and TCP performance to reduce the chances of successful eavesdropping, while maintaining acceptable levels of throughput. For our experiments we propose a multipath-enhanced version of DSR, and we compare Tahoe, Reno and Sack TCP variants. Results show that multipath traffic dispersion impact on TCP throughput is bounded to a maximum of 25-35%, and that there is only a minimal dependence on the number of routes used, the number of consecutive packets sent on each route, the r…

CUBIC TCPTCP Friendly Rate ControlTCP WestwoodTCP Westwood plusTCP VegasTCP accelerationComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSZeta-TCPbusinessTCP global synchronizationComputer networkThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
researchProduct

Adaptive Low Priority Packet Marking for Better TCP Performance

2003

This paper proposes a packet marking scheme for TCP traffic. Unlike previous literature work, in our scheme the majority of TCP packets are transmitted as high priority. The role of a low priority packet appears that of a probe, whose goal is to early discover network congestion conditions. Low priority packets are marked according to an adaptive marking algorithm. Numerical results show that our scheme provides improved throughput/delay performance.

CUBIC TCPTCP VegasTCP accelerationbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingTCP tuningTCP global synchronizationTCP Westwood plusTCP Friendly Rate ControlZeta-TCPbusinessComputer network
researchProduct

TCP Performance in Mobile Ad hoc Networks

2013

International audience; In this paper, we present a survey of TCP (Transmission Control Protocol) protocol for better performance in the MANET (Mobile Ad Hoc Network). After a short presentation of the main features of TCP, we give the most important problems from which TCP suffer in MANET. We present after that some approaches proposed in the literature in order to improve its performance. Our paper contains also a performance evaluation of TCP NewReno and TCP Vegas transport protocols under AODV and DSR routing protocols. The simulations are conducted under varying conditions of number of TCP connections, number of nodes and mobility.

CUBIC TCPTCP accelerationComputer scienceTCP tuning050801 communication & media studies02 engineering and technologyTCP Friendly Rate ControlTCP Westwood[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0508 media and communications0202 electrical engineering electronic engineering information engineeringZeta-TCPMobile Ad hoc NetworksProblems of TCP in MANETTCP Protocolbusiness.industry05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSImproving of TCP in MANET020206 networking & telecommunicationsINGENIERIA TELEMATICATCP VegasTCP global synchronizationPerformance evaluationTCP NewRenoCompound TCPbusinessComputer network
researchProduct

Model and optimal Call Admission Policy in Cellular Mobile Networks

2000

For current cellular networks, two important Quality of Service (QoS) measures are the fractions of new and handoff calls that are blocked due to unavailability of channels. Based on these QoS measures, we propose a queuing network model with impatient users for handoff and new calls in cellular mobile networks. The number of simultaneous calls, that can be supported, is modeled by C identical servers with exponentially distributed session duration for each one of them. Priority is given to handoffs over new calls. We use for that a Guard Channel policy that reserves a set of CH channels for handoff calls, new calls being served at their arrival if there are more than CH available channels.…

Channel allocation schemesComputer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYHandoverServerCellular networkSession (computer science)UnavailabilitybusinessQueueComputer network
researchProduct

Wireless MAC processors: programming MAC protocols on commodity hardware

2012

Programmable wireless platforms aim at responding to the quest for wireless access flexibility and adaptability. This paper introduces the notion of wireless MAC processors. Instead of implementing a specific MAC protocol stack, Wireless MAC processors do support a set of Medium Access Control “commands” which can be run-time composed (programmed) through software-defined state machines, thus providing the desired MAC protocol operation. We clearly distinguish from related work in this area as, unlike other works which rely on dedicated DSPs or programmable hardware platforms, we experimentally prove the feasibility of the wireless MAC processor concept over ultra-cheap commodity WLAN hardw…

Chipsetbusiness.industryFirmwareComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReconfigurabilityNetwork interfacecomputer.software_genreWLAN 802.11 reconfigurabilityProtocol stackCognitive radioprogrammable MACEmbedded systemWireless lancognitive radio overlay software modules running on the host computer.WirelessbusinesscomputerWireless distribution systemComputer network
researchProduct

VoiP performance analysis in IEEE802.16 networks

2012

WiMAX, as known as IEEE standard 802.16, is a wide range broadband wireless access network which has a significant good support for the quality of service. According to IEEE standard 802.16e WiMAX has support also for mobility. One of the key advantages of the WiMAX network is the possibility to assign QoS parameters as connection based. A good example of traffic type having strict QoS demands is VoIP. VoIP will probably be a killer application in the future's broadband wireless networks because of its cost efficiency compared to circuit switched networks. In this paper, we analyze by extensive simulations how QoS is applied per connection, especially for the VoIP connection.

Circuit switchingVoice over IPCost efficiencyWireless broadbandbusiness.industryComputer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSKey (cryptography)Mobile communications over IPbusinessWiMAXComputer networkProceedings of the 10th ACM international symposium on Mobility management and wireless access
researchProduct