Search results for "Local area network"

showing 10 items of 47 documents

A User-Balanced System for IP Telephony in WLANs

2008

Wireless IP telephony is becoming very popular between the users of large wireless local area networks (WLANs). This increment has been mainly caused because it allows cost savings. Although, large WLANs use to provide high availability and redundancy, WLANs lack on the available throughput when there are many IP telephony users. In this paper we present a system that reallocates IP telephony devices when the system detects that an AP is overloaded. The algorithm and the frames used for our proposal are described. Measurements taken show how the bandwidth consumed is transferred from an access point to another when our proposal is running. Finally, we show the time needed to re-associate re…

Voice over IPComputer sciencebusiness.industryHigh availabilityServerComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (computing)Local area networkWirelessThroughputTelephonybusinessComputer network2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
researchProduct

A CAPWAP Architecture for Automatic Frequency Planning in WLAN

2007

Recently, the impressive success of the IEEE 802.11 WLAN technology has dramatically changed the role of the wireless connectivity provisioning. Born as a wireless extension of small office or home networks, todays the WLANs are getting more and more popular as a large, even metropolitan, area networks. The deployment of large-scale WLANs has some critical issues, because of the lack of coordinated management functionalities among the network nodes. In this paper we briefly describe the CAPWAP architectural solution, for centralizing some control and maintenance functionalities in large scale WLAN, by guaranteeing the interoperability between network nodes provided by different vendors. We …

Network administratorWi-Fi arrayComputer sciencebusiness.industryWireless networkSettore ING-INF/03 - TelecomunicazioniNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedPhysical layerLocal area networkWireless WANProvisioningCAPWAPMetropolitan areaWireless lanWirelessAutomatic frequency Control operations Critical issues Home networks IEEE 802.11 WLAN International symposiumbusinessHeterogeneous networkMunicipal wireless networkComputer network
researchProduct

On the accuracy of some common modeling assumptions for EDCA analysis

2005

Several models have been discussed in literature in order to evaluate the performance of the EDCA differentiation mechanisms. Despite of the exponential back off rules, usually the EDCA protocol has been modeled as a persistent slotted access protocol, and summarized into a set of access probabilities. These models often show a very different complexity and accuracy, according to the basis assumptions. In this paper, we propose a new modeling approach for EDCA, in which the medium access is described in terms of backoff counter comparisons, contention by contention, and no restrictive hypothesis is considered. Through our model, we verify the applicability of the most common protocol simpli…

backoff algorithmWireless local area networks (WLAN)Throughput
researchProduct

Multiservice Optical Fibre Local Area Networks For Data Transmission And Telemetry In The Electric Power Industry

1986

The paper contains a review of a few of experimental optical fibre multiservice and multibranch local area networks /LANs/. Systems accomplish transmission, distribution and processing of analog or digital signals from numerous sources or measurement terminals. The authors put stress also on the possibility of combining transmission properties of fiber optic networks with fibre optic sensors. Several construction problems and chosen properties of multiport /multiterminal/ optical buses /networks/ have been considered. All examination systems of optical fibre LANs are discussed in respect of application them as telemetric, transmission, telesignaling and telecontrol systems for the power ele…

EngineeringOptical fiberbusiness.industryLocal area networklaw.inventionTransmission (telecommunications)lawTelemetryElectronic engineeringFiber optic splitterElectric powerElectric power industrybusinessData transmissionSPIE Proceedings
researchProduct

A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments

2007

A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …

Exploitbusiness.industryComputer scienceLocal area networkNetwork interfaceIntrusion detection systemMan-in-the-middle attackComputer securitycomputer.software_genreTask (computing)Packet analyzerAddress Resolution ProtocolbusinesscomputerComputer networkThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
researchProduct

An evaluation of switched ethernet and linux traffic control for real-time transmission

2008

Switched Ethernet networks are spreading to industrial environments more are more. The current trend is using them at all levels of a factory, replacing this way field-buses and other industrial networks. Switched Ethernet lacks the drawback of the non-deterministic collision resolution of coax cabling. However there are still some sources of indeterminism, mostly due to contention problems in message queues at switches and network interfaces. These problems can be dealt with using traffic control mechanisms for packet prioritisation and scheduling. These features have been largely inaccessible in Ethernet for a long time but, nowadays, they are widely available in industrial switches and a…

EthernetComputer sciencebusiness.industryNetwork packetEthernet over PDHComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEthernet flow controlLocal area networkNetwork interfaceSynchronous EthernetEthernet over SDHbusinessATA over EthernetConnection-oriented EthernetComputer networkCarrier Ethernet2008 IEEE International Conference on Emerging Technologies and Factory Automation
researchProduct

Enabling Cognitive-Radio Paradigm on Commercial Off-The-Shelf 802.11 Hardware

2013

Cognitive Radio paradigm (CR) has been recognized as key enabler for next generation wireless networking: the pos- sibility to access the limited radio spectrum in an oppor- tunistic manner allows secondary users to boost their trans- mission performance without interfering with existing pri- mary networks. Full testing and experimenting with this paradigm, however, is still a tough task, given either the i) limited capabilities above the PHY layer of cheap SDR so- lutions, or the ii) heavy investment required for setting up multi-node testbeds powered by FPGAs. In this demo we show how we leveraged our Wireless MAC Processor archi- tecture to tackle the two issues at the same time, providi…

Wireless networkbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerLocal area networkMicroarchitectureCognitive radioEmbedded systemCognitive radio Wireless MAC Processor ControlWirelessbusinessCommercial off-the-shelfCommunication channelComputer network
researchProduct

Transience versus recurrence for scale-free spatial networks

2020

Weight-dependent random connection graphs are a class of local network models that combine scale-free degree distribution, small-world properties and clustering. In this paper we discuss recurrence or transience of these graphs, features that are relevant for the performance of search and information diffusion algorithms on the network.

Class (set theory)Theoretical computer scienceScale (ratio)Computer scienceBoolean model010102 general mathematicsLocal area networkDegree distributionPreferential attachment01 natural sciencesConnection (mathematics)010104 statistics & probability0101 mathematicsCluster analysis
researchProduct

An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards

2006

It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance differences are evident both when the cards contend alone to the channel, and when heterogeneous cards contend together. Since the performance misalignment does not disappear by averaging the environmental factors (such as propagation conditions, laptop models, traffic generators, etc), it is evident that the well known throughput-fairness property of the DCF protocol is not guaranteed in actual networks. In this paper we propose a methodological approach devised to experimentally characterize the IEEE 802.11 commercial …

Inter-Access Point ProtocolComputer sciencebusiness.industryReal-time computingWireless local area networks (WLAN)Network allocation vectorThroughputbackoff algorithmIEEE 802.11Network interface controllerMedia access controlIEEE 802.11e-2005IEEE 802.1XbusinessThroughput (business)Computer network
researchProduct

Tunable antenna system for plug&play satellite avionics: Prototyping and test

2014

In the framework of an ESA program, a new architecture for plug&play compact antenna systems in the X band has been investigated and experimentally verified by many prototypes. The proposed antenna system takes inspiration from the LEGO building toys: the basic component of the new architecture is a 2.7cm-cube complex module that integrates a three-dimensional local network and a programmable mechanism based on the bonding-wire technology to select one among three polarization options. Elemental blocks can be augmented by accessories to shape the beam and may be used in array configuration over boards provided with cluster-level beamforming networks. Measurements have been performed for bot…

BeamformingEngineeringReconfigurable antennaantenna satellitebusiness.industryConformal antennaX bandLocal area networkAvionicsSettore ING-INF/01 - ElettronicaSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)law.inventionlawComponent (UML)Electronic engineeringAntenna (radio)businessThe 8th European Conference on Antennas and Propagation (EuCAP 2014)
researchProduct