Search results for "Network packet"

showing 10 items of 160 documents

Analysis of VoIP over HSDPA Performance with Discontinuous Reception Cycles

2009

The aim of this paper is to evaluate how Discontinuous Reception (DRX) cycles and related timers take effect to Voice over IP (VoIP) performance when High Speed Downlink Packet Access (HSDPA) networks are in question. DRX cycles limit the scheduling freedom of users and increase battery saving opportunities in the User Equipment (UE) by allowing it to turn its receiver circuitry off for some periods of time. Prior work has concentrated mainly on optimizing the usage of radio resources when small bit rate delay critical services, like VoIP, are considered. However, the battery life of small handheld devices might become a limiting factor in providing satisfactory user experience. Thus, this …

Voice over IPbusiness.industryNetwork packetComputer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingScheduling (computing)User equipmentDiscontinuous receptionTimerRadio resource managementbusinessComputer network2009 Sixth International Conference on Information Technology: New Generations
researchProduct

MAClets: Active MAC Protocols over hard-coded devices

2012

We introduce MAClets, software programs uploaded and executed on-demand over wireless cards, and devised to change the card's real-time medium access control operation. MAClets permit seamless reconfiguration of the MAC stack, so as to adapt it to mutated context and spectrum conditions and perform tailored performance optimizations hardly accountable by an once-for-all protocol stack design. Following traditional active networking principles, MAClets can be directly conveyed within data packets and executed on hard-coded devices acting as virtual MAC machines. Indeed, rather than executing a pre-defined protocol, we envision a new architecture for wireless cards based on a protocol interpr…

WLAN 802.11business.industryComputer scienceNetwork packetSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork virtualizationControl reconfigurationAccess controlProtocol stackSoftware portabilityprogrammable MACEmbedded systemcognitive radiobusinessProtocol (object-oriented programming)reconfigurabilityActive networkingComputer network
researchProduct

Hydro-Acoustic Target Detection

2014

This chapter presents an example of utilization of the discrete–time wavelet packets, which are described in Sect. 9.1, to classification of acoustic signals and detection of a target. The methodology based on wavelet packets is applied to a problem of detection of a boat of a certain type when other background noises are present. The solution is obtained via analysis of boat’s hydro-acoustic signature against an existing database of recorded and processed hydro-acoustic signals. The signals are characterized by the distribution of their energies among blocks of wavelet packet coefficients.

WaveletComputer scienceNetwork packetbusiness.industryFeature vectorPattern recognitionArtificial intelligenceFalse alarmLinear discriminant analysisbusinessGeneralLiterature_MISCELLANEOUSSignature (logic)Wavelet packet decomposition
researchProduct

Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic

2018

Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…

Web serverbusiness.industryComputer scienceNetwork packetDenial-of-service attackIntrusion detection systemEncryptioncomputer.software_genreApplication layerData stream clusteringbusinesscomputerVirtual networkComputer network
researchProduct

An Efficient Retransmission Strategy for Data Gathering in Wireless Sensor Networks

2006

This paper introduces a new strategy for data gathering in wireless sensor networks that takes into account the need for both energy saving and for a reasonable tradeoff between robustness and efficiency. The proposed algorithm implements an efficient strategy for retransmission of lost packets by discovering alternative routes and making clever use of multiple paths when necessary; in order to do that we use duplicate and order insensitive aggregation functions, and by taking advantage of some intrinsic characteristics of the wireless sensor networks, we exploit implicit acknowledgment of reception and smart caching of the data.

Wi-Fi arrayComputer sciencebusiness.industryWireless networkNetwork packetRetransmissionDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSKey distribution in wireless sensor networksRobustness (computer science)Mobile wireless sensor networkbusinessWireless sensor networkComputer network2005 IEEE Conference on Emerging Technologies and Factory Automation
researchProduct

Priority Enabled Grant-Free Access With Dynamic Slot Allocation for Heterogeneous mMTC Traffic in 5G NR Networks

2021

Although grant-based mechanisms have been a predominant approach for wireless access for years, the additional latency required for initial handshake message exchange and the extra control overhead for packet transmissions have stimulated the emergence of grant-free (GF) transmission. GF access provides a promising mechanism for carrying low and moderate traffic with small data and fits especially well for massive machine type communications (mMTC) applications. Despite a surge of interest in GF access, how to handle heterogeneous mMTC traffic based on GF mechanisms has not been investigated in depth. In this paper, we propose a priority enabled GF access scheme which performs dynamic slot …

business.industryComputer scienceNetwork packet05 social sciencesMarkov process050801 communication & media studies020206 networking & telecommunications02 engineering and technologyDynamic priority schedulingsymbols.namesake0508 media and communicationsSubframeTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringsymbolsOverhead (computing)WirelessElectrical and Electronic EngineeringbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GComputer networkIEEE Transactions on Communications
researchProduct

DTMC modeling for performance evaluation of DW-MAC in wireless sensor networks

2016

Synchronized duty cycling (DC) aligns sensor nodes to wake up at the same time in order to reduce idle listening for medium access control (MAC) in wireless sensor networks (WSNs). Demand wakeup MAC (DW-MAC) is a popular synchronous DC MAC protocol which allows nodes to compete and transmit multiple packets in one operational cycle. This multiple packet transmission (MPT) feature makes DW-MAC more energy efficient when comparing with other existing single time competition based protocols such as sensor MAC (S-MAC). In the literature, no analytical model exists to evaluate the performance of DW-MAC. In this paper, we develop two associated discrete time Markov chain (DTMC) models and incorpo…

business.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryReal-time computing020206 networking & telecommunications02 engineering and technologyEnergy consumption01 natural sciencesSynchronization0104 chemical sciencesComputer Science::PerformanceKey distribution in wireless sensor networksComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkMultiple Access with Collision Avoidance for WirelessbusinessWireless sensor networkComputer Science::Information TheoryEfficient energy useComputer network2016 IEEE Wireless Communications and Networking Conference
researchProduct

Bluetooth throughput measures for cardiomyocyte extracellular signal telemetry

2006

In this contribution the suitability of the Bluetooth transmission system is analyzed for its application to the realtime transmission of cardiac signals captured by micro-electrode array sensors. The required data rates for this type of cardiac signals are calculated to be 180 kbps for every single micro- electrode. The mean throughput value varies with the selected packet size: for packet sizes less than 1000 bytes the mean throughput is smaller than 180 kbps while for packet sizes greater than 1000 bytes the mean throughput saturates at around 230 kbps. This mean throughput value is guaranteed for over 80% of the time. Compression algorithms running on the sensor array allow the reductio…

business.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTransmission systemlaw.inventionBluetoothTransmission (telecommunications)Sensor arraylawEmbedded systembusinessThroughput (business)Computer hardwareData transmissionData compression2006 3rd International Symposium on Wireless Communication Systems
researchProduct

A simulation study of load balancing algorithms in cellular packet networks

2001

This paper provides a comparative performance evaluation of various load balancing schemes in cellular packet networks. With respect to traditional schemes, that measure each cell load in terms of number of admitted calls, our schemes use supplementary packet level information, expressed in terms of effective resource consumption of each individual call when retransmission mechanisms are employed. The simulation model adopted is based on a toroidal cellular network topology, to avoid border effects affecting the numerical results.

business.industryComputer scienceNetwork packetDistributed computingRetransmissionCellular networkLoad balancing (computing)Resource consumptionbusinessComputer network
researchProduct

Cooperative Medium Access Control in Wireless Networks: The Two-Hop Case

2009

Cooperative communication has been recently proposed as a powerful means to improve network performance in wireless networks. However, most existing work focuses solely on one-hop source-destination cooperation. In this paper, we propose a novel cooperative MAC mechanism that is specially designed for two-hop cooperation communications where the source node and the destination node cannot hear each other directly. In this case, cooperative communication is operated in a two-hop manner and transmit-diversity is achieved by the reception of the same data packet forwarded through multiple relays towards a single destination. The proposed scheme employs an efficient relay selection algorithm to…

business.industryComputer scienceWireless networkNetwork packetDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAccess controlCooperative diversitylaw.inventionTransmit diversityRelaylawComputer Science::Networking and Internet ArchitectureNetwork performancebusinessSelection algorithmComputer Science::Information TheoryComputer network2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
researchProduct