Search results for "Local area network"

showing 10 items of 47 documents

Efficiency analysis of burst transmissions with block ACK in contention-based 802.11e WLANs

2005

The channel utilization efficiency of the standard 802.11 networks is severely compromised when high data transmission rates are employed, since physical layer headers and control frames are transmitted at low rate, thus wasting more channel time, proportionally. The extensions defined in the emerging 802.11e for quality-of-service (QoS) provisioning include some new mechanisms developed in order to improve the efficiency. Those include data transmission bursting (referred to as TXOP operation) and acknowledgment aggregation (referred to as block ACK). These two features allow it to offer new data transmission services, in which the data delivery and acknowledgment unit is not a single fram…

Computer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingPhysical layerWireless local area networks (WLAN)ThroughputThroughputbackoff algorithmIntelligent NetworkWireless lanIEEE 802.11e-2005businessData transmissionCommunication channelBlock (data storage)Computer network
researchProduct

Remote programming of network robots within the UJI Industrial Robotics Telelaboratory: FPGA vision and SNRP network protocol

2009

This paper presents the UJI Industrial Robotics Telelaboratory, which lets Ph.D. and Master’s degree students perform robotics and computer vision tele-experiments. By using this system, students are able to program experiments remotely via the Web, in order to combine the use of a field-programmable gate array (FPGA) to provide real-time vision processing, a conveyor belt, and a Motoman industrial manipulator. This paper introduces the novel SNRP protocol (i.e., Simple Network Robot Protocol), which permits the integration of network robots and sensors within an e-learning platform in a simple and reliable manner. As long as the students are able to interact remotely with a real robotic sc…

EngineeringMachine visionDistributed systemsRobots industrialsRobots IndustrialVisió per ordinador -- Aplicacions industrialsElectrical and Electronic EngineeringProtocol (object-oriented programming)e-learningNetwork architectureTeleroboticsbusiness.industryLocal area networkRoboticsarray (FPGA) visionInternet in educationEnsenyament virtualmultirobot programmingControl and Systems Engineeringhigh-performance field-programmable gateEmbedded systemRobotComputer visioninternetArtificial intelligencebusinessCommunications protocol:Informàtica::Robòtica [Àrees temàtiques de la UPC]industrial robotics telelaboratory
researchProduct

Adding Real-Time Networking and QoS Capabilities to RTLinux-GPL

2006

This paper presents an architecture to build distributed embedded real-time systems in the RTLinux-GPL platform. The architecture (built in a layered fashion) has being built around open source projects ranging from Ethernet drivers to a CORBA environment. The paper focuses on those layers that give support for QoS and real-time networking over Ethernet networks. The main ideas are: to accomplish deterministic access times by using a TDMA protocol over Ethernet and to multiplex different types of traffic in that real-time network, providing different service types (QoS) to each type of traffic without jeopardizing the a priori guarantee of the system's real-time properties. Traffic types in…

EthernetSynchronous EthernetTraffic classificationNetwork schedulerDifferentiated servicesComputer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLocal area networkInternet trafficbusinessComputer network2005 IEEE Conference on Emerging Technologies and Factory Automation
researchProduct

Security Challenges of IoT-Based Smart Home Appliances

2018

The Internet of Things, IoT, and the related security challenges are reaching homes in the form of smart appliances. If the appliances are compromised, they can be used in botnet attacks against Internet services and potentially cause harm to people and property through the local network, for example, by heating up too much or allowing unauthorized access. The aim of this study was to see how secure these devices are against remote and network attacks. Several devices were tested with attacks coming from the same Wi-Fi network to gain various levels of control of the devices. Their security against a Man-in-the-Middle attack was also studied to see differences in the susceptibility to conne…

Computer sciencebusiness.industryBotnetLocal area network020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreEvil twinHarmHome automation020204 information systems0202 electrical engineering electronic engineering information engineeringCode injectionThe InternetbusinesscomputerVulnerability (computing)
researchProduct

Streaming for vehicular users via elastic proxy buffer management

2004

In this article we refer to the market of vehicular networks, where groups of customers located in the same public vehicle (e.g., a train or bus) connect to a terrestrial network through a wireless/satellite backbone link. Elastic buffering is a proxy management technique devised to decouple the multimedia information retrieval rate on the network backbone from the playout streaming rate at the user terminal. It has been shown in the past that the application of elastic buffering mechanisms in terrestrial networks brings significant advantages in terms of network effectiveness. We show that elastic buffering is an extremely effective means to reduce, or even eliminate, streaming service out…

Mobile radioService (systems architecture)Computer Networks and CommunicationsComputer scienceDelayed real time servicesMultimedia information retrievalCommunication channels (information theory)Resource sharing algorithmBuffer storageWirelessInformation retrievalWireless telecommunication systemsElectrical and Electronic EngineeringReal time streaming servicesProxy (statistics)Railroad car equipmentVehicular area networksBackbone networkInternetMobile computingVehicular ad hoc networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSatellite communication systemsElastic proxy buffer managementLocal area networksReal time systemsAlgorithms; Buffer storage; Communication channels (information theory); Information retrieval; Internet; Local area networks; Multimedia systems; Railroad car equipment; Real time systems; Satellite communication systems; Satellite links; Wireless telecommunication systems; Delayed real time services; Elastic proxy buffer management; Fast internet for fast train hosts (FIFTH); Real time streaming services; Resource sharing algorithm; Vehicular area networks; Mobile computingComputer Science ApplicationsTerminal (electronics)Fast internet for fast train hosts (FIFTH)businessSatellite linksAlgorithmsMultimedia systemsComputer network
researchProduct

Optimal Operating Point Calculation for Medium Voltage Distribution Systems

2007

The paper deals with the calculation of the optimal working point of a distribution system, equipped with several distributed generators, able to operate also autonomously, i.e. disconnected from the main grid. When connected to the main grid, it appears in general convenient to assign the slack bus role to the bus that represents such a connection. The problem becomes more complex when maximum power transfer constraints through the connection must be taken into account. The adequate slack bus treatment is even more important when the optimal operating condition must refer to the condition subsequent to an intentional or unintentional disconnection from the main grid. The paper presents an …

Electric power distributionOperating pointEngineeringPower flow calculationElectric power distributionbusiness.industrySlack bus treatmentDistributed parameter networksLocal area networksLocal area networkControl engineeringGridMulti-objective optimizationChlorine compoundsMulti-objective optimizationSlack busGenetic algorithmDistributed generationepfl-smartgridsMaximum power transfer theoremDistributed generationDistribution of goodsbusinessComputer networks2007 IEEE Lausanne Power Tech
researchProduct

Towards Improved Healthcare Performance: Examining Technological Possibilities and Patient Satisfaction with Wireless Body Area Networks

2009

Published version of an article from the journal: Journal of Medical Systems. he original publication is available at Springerlink. http://dx.doi.org/10.1007/s10916-009-9291-8 This paper investigates the benefits of using less intrusive wireless technologies for heart monitoring. By replacing well established heart monitoring devices (i.e. Holter) with wireless ECG based Body Area Networks (BAN), improved healthcare performance can be achieved, reflected in (1) high quality ECG recordings during physical activities and (2) increased patient satisfaction. A small scale clinical trial was conducted to compare both technologies and the results illustrate that the wireless ECG monitor was able …

AdultMaleTelemedicineAdolescentComputer scienceRemote patient monitoringmedicine.medical_treatmentmedia_common.quotation_subjecteducationMedicine (miscellaneous)Health InformaticsHealth informaticsYoung AdultPatient satisfactionHealth Information ManagementmedicineHumansWirelessVDP::Medical disciplines: 700::Health sciences: 800::Health service and health administration research: 806ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSQuality (business)cardiovascular diseasesChildAgedmedia_commonbusiness.industryLocal area networkArrhythmias CardiacVDP::Technology: 500::Information and communication technology: 550Middle AgedLocal Area Networksequipment and suppliesTelemedicineRisk analysis (engineering)Patient SatisfactionElectrocardiography AmbulatoryFemaleCardiac monitoringbusinessTelecommunicationsInformation Systems
researchProduct

Dynamic MAC Parameters Configuration for Performance Optimization in 802.11e Networks

2006

Quality of service support in wireless LAN is a theme of current interest. Several solutions have been proposed in literature in order to protect time-sensitive traffic from best-effort traffic. According to the EDCA proposal, which is a completely distributed solution, the service differentiation is provided by giving probabilistically higher number of channel accesses to stations involved in real-time applications. To this purpose, the MAC parameter settings of each contending stations can be tuned dynamically. In this paper, we face the problem of tuning the EDCA MAC parameters in common scenarios in which a given number of low-rate delay-sensitive traffic flows share the channel with so…

backoff algorithmWireless local area networks (WLAN)Throughput
researchProduct

A fault-tolerant protocol for railway control systems

2006

Railway control systems are largely based on data communication and network technologies. With the adoption of Ethernet-IP as the main technology for building end-to-end real-time networks on railway control systems, the requirement to deliver high availability, quality and secure services over Ethernet has become strategic. Critical real-time traffic is generally penalized and the maximum restoration time of 50 msec sometimes is exceeded because of real-time applications hangings, so passengers' safety could be committed. It occurs on more than twenty percent of critical fail tests performed. Our main goal is to minimize restoration time from the application point of view. This article des…

EthernetMulticastComputer sciencebusiness.industryQuality of serviceHigh availabilityControl systemLocal area networkFault toleranceUnicastbusinessComputer network2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.
researchProduct

Remarks on IEEE 802.11 DCF Performance Evaluation, IEEE Communication Letters, Vol. 9, Issue 8, Aug 2005 pp:765 - 767

2005

This letter presents a new approach to evaluate the throughput/delay performance of the 802.11 Distributed Coordination Function (DCF). Our approach relies on elementary conditional probability arguments rather than bidimensional Markov chains (as proposed in previous models), and can be easily extended to account for backoff operation more general than DCF's one

backoff algorithmWireless local area networks (WLAN)Throughput
researchProduct