Search results for "Distributed"

showing 10 items of 1260 documents

Rethinking the IEEE 802.11e EDCA Performance Modeling Methodology

2010

Analytical modeling of the 802.11e enhanced distributed channel access (EDCA) mechanism is today a fairly mature research area, considering the very large number of papers that have appeared in the literature. However, most work in this area models the EDCA operation through per-slot statistics, namely probability of transmission and collisions referred to "slots." In so doing, they still share a methodology originally proposed for the 802.11 Distributed Coordination Function (DCF), although they do extend it by considering differentiated transmission/ collision probabilities over different slots.We aim to show that it is possible to devise 802.11e models that do not rely on per-slot statis…

IEEE 802medium access protocolSettore ING-INF/03 - TelecomunicazioniComputer Networks and Communicationsbusiness.industryComputer scienceWiFiDistributed computingQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSQoSThroughputDistributed coordination functionComputer Science ApplicationsTransmission (telecommunications)Wireless lanElectrical and Electronic EngineeringbusinessThroughput (business)SoftwareComputer networkCommunication channelIEEE/ACM Transactions on Networking
researchProduct

Assessing the effectiveness of IEEE 802.11e in multi-hop mobile network environments

2004

The IEEE 802.11e technology is receiving much interest due to the promising enhancements it offers to wireless local area networks in terms of QoS support. Until now, research has focused on single hop, access point based environments, which are the most common. We review the enhancements proposed in the last IEEE 802.11e draft (version 8.0). We analyze the performance of the IEEE 802.11e protocol on ad-hoc networks (multi-hop) in terms of throughput and end-to-end delay. We also measure the effectiveness for static and fully dynamic networks with a variable number of source stations. Finally, we analyze the performance of IEEE 802.11e when legacy IEEE 802.11 stations (no IEEE 802.11e suppo…

IEEE 802.11uIEEE 802IEEE 802.11w-2009business.industryComputer scienceInter-Access Point ProtocolDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSIEEE 802.11b-1999IEEE 802.1XbusinessIEEE 802.11sComputer networkIEEE 802.11r-2008
researchProduct

Capacity and Energy-Consumption Optimization for the Cluster-Tree Topology in IEEE 802.15.4

2011

International audience; 802.15.4 proposes to use a cluster-tree hierar- chy to organize the transmissions in Wireless Sensor Networks. In this letter, we propose a framework to analyze formally the capacity and the energy consumption of this structure. We derive a Mixed Integer Linear Programming (MILP) formulation to obtain a topology compliant with the standard. This formulation provides the optimal solution for the network capacity: this con- stitutes an upper bound for any distributed algorithms permitting to construct a cluster-tree. This framework can also be used to evaluate the capacity and to compare quantitatively different cluster-tree algorithms.

IEEE 802.15.4Mathematical optimizationLinear programming[INFO.INFO-RO] Computer Science [cs]/Operations Research [cs.RO]Computer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Topology (electrical circuits)02 engineering and technologyTopologyNetwork topologyChannel capacity[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringInteger programmingIEEE 802.15[ INFO.INFO-RO ] Computer Science [cs]/Operations Research [cs.RO]MILP[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]capacity020206 networking & telecommunicationsEnergy consumption[INFO.INFO-RO]Computer Science [cs]/Operations Research [cs.RO]020202 computer hardware & architectureComputer Science ApplicationsDistributed algorithmModeling and Simulationcluster-treeWireless sensor network
researchProduct

Numerical simulation of unsteady MHD flows and applications

2009

International audience; We present a robust numerical method for solving the compressible Ideal Magneto-Hydrodynamic equations. It is based on the Residual Distribution (RD) algorithms already successfully tested in many problems. We adapted the scheme to the multi-dimensional unsteady MHD model. The constraint ∇ · B = 0 is enforced by the use a Generalized Lagrange Multiplier (GLM) technique. First, we present this complete system and the keys to get its eigensystem, as we may need it in the algorithm. Next, we introduce the numerical scheme built in order to get a compressible, unsteady and implicit solver which has good shock-capturing properties and is second-order accurate at the conve…

Ideal (set theory)Computer simulationComputer scienceNumerical analysisGeneral Physics and AstronomySolver01 natural sciences010305 fluids & plasmasConstraint (information theory)symbols.namesakeLagrange multiplier0103 physical sciencesCompressibilitysymbols[INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Applied mathematicsElectrical and Electronic EngineeringMagnetohydrodynamics[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]010306 general physics
researchProduct

Effects of post-filtering in grid-synchronization algorithms under grid faults

2018

Abstract The spread of distributed generation systems has reinforced concerns and requirements on grid-tied power converters. The synchronization with the utility voltage vector is a major concern. In the literature, algorithms based on Phase Locked Loops are extensively presented. In spite of adequate performances under ideal and balanced grid conditions, under grid faults great inaccuracies arise. Shortcomings are overcome by advanced algorithms at the expenses of the complexity and computational cost. In this paper, grid synchronization algorithms are addressed. A solution is proposed by introducing a new post-filter stage in a Decoupled Double Synchronous Reference Frame not affecting, …

Ideal (set theory)PLLbusiness.industryComputer science020209 energy020208 electrical & electronic engineeringEnergy Engineering and Power Technology02 engineering and technologySmart gridConvertersGrid synchronizationPower converterSettore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciGridPower (physics)Phase-locked loopDistributed generationSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessAlgorithmReference frame
researchProduct

Experimental realization of a Persistent Identifier Infrastructure stack for Named Data Networking

2015

The continuation of Persistent Identifier Infrastructures is crucial when next-generation Internet architectures based on Information-Centric Networking (ICN) arise. When moving to ICN, we must ensure the resolution of Persistent Identifiers (PID), such as the billions of Digital Object Identifiers (DOI) used today, to provide continued access to scientific literature and research data. It provides the base for the necessary transformations in the Handle System architecture and protocol for running a PID system on the Named Data Networking (NDN) architecture, which is a recent incarnation of ICN. Furthermore, it examines the PID-specific resolution access patterns, investigates the expected…

IdentifierPersistent identifierInformation-centric networkingbusiness.industryComputer scienceDistributed computingServerDigital Object IdentifierSystems architectureThe InternetbusinessProtocol (object-oriented programming)Computer network2015 IEEE International Conference on Networking, Architecture and Storage (NAS)
researchProduct

The Design of Secure and Efficient P2PSIP Communication Systems

2010

Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information among participating peers without help of the central servers. The concept of self-configuration, self-establishment greatly improves the robustness of the network system compared with the traditional Client/Server based systems. In this paper, we propose a system architecture for constructing efficient and secure P2PSIP communication systems. The proposed approach includes three-layer hierarchical overlay division, peer identifier assignment, cache based efficiency enhancement, proxy…

IdentifierRobustness (computer science)Computer sciencebusiness.industryServerDistributed computingSystems architectureCacheSubjective logicCommunications systembusinessChord (peer-to-peer)Computer network
researchProduct

Dissensus, death and division

2009

The modeling of switching systems describing networks where death and duplication processes occur is described. A dissensus protocol, complementary to consensus protocol, is introduced and the convergence or divergence of the agents' state evolution is studied. We discuss some properties of the topology reached by the network when different rules of duplication and inheritance are implemented.

Impulsive networksHybrid systemsComputer scienceDistributed computingconsnesus problemsSwitching systemsDivision (mathematics)biological modelDivergence (computer science)Consensus protocolsInheritance (object-oriented programming)Settore ING-INF/04 - Automaticaconsnesus problems biological model networksnetworksConvergence (routing)Settore MAT/09 - Ricerca OperativaProtocol (object-oriented programming)Biological models; Consensus protocols; Hybrid systems; Impul-sive networks; Switching systems;Biological models; Consensus protocols; Hybrid systems; Impulsive networks; Switching systemsBiological models2009 American Control Conference
researchProduct

"Table 8" of "Inclusive production of neutral vector mesons in hadronic Z decays"

1995

Average multiplicity per hadronic event. Extrapolation to the full X range.

InclusiveE+ E- --> PHI XHigh Energy Physics::LatticeE+ E- ScatteringHigh Energy Physics::ExperimentComputer Science::Symbolic Computation91.2Nuclear ExperimentComputer Science::Distributed Parallel and Cluster ComputingMULT
researchProduct

"Table 2" of "Inclusive production of neutral vector mesons in hadronic Z decays"

1995

Average multiplicity per hadronic event. Extrapolation to the full X range.

InclusiveHigh Energy Physics::LatticeE+ E- ScatteringHigh Energy Physics::ExperimentComputer Science::Symbolic Computation91.2Nuclear ExperimentE+ E- --> RHO0 XComputer Science::Distributed Parallel and Cluster ComputingMULT
researchProduct