Search results for "internet"

showing 10 items of 2589 documents

A measurement-based study on the correlations of inter-domain Internet application flows

2014

Internet traffic characterization has a profound impact on network engineering and traffic identification. Existing studies are often carried out on a per-flow basis, focusing on the properties of individual flows. In this paper, we study the interaction of Internet traffic flows and network features from a complex network perspective, focusing on six types of applications: P2P file sharing, P2P stream, HTTP, instant messaging, online games and abnormal traffic. With large-volume traffic flow records collected through proprietary line-speed hardware-based monitors, we construct flow graphs of these different application types. Based on the flow graphs, we calculate the correlation coefficie…

Computer Networks and Communicationsbusiness.industryInter-domainComputer scienceAssortativityNetwork engineeringInternet trafficComplex networkTraffic flowcomputer.software_genreFile sharingThe InternetData miningbusinesscomputerTraffic generation modelComputer networkComputer Networks
researchProduct

Performance of frame transmissions and event-triggered sleeping in duty-cycled WSNs with error-prone wireless links

2018

Abstract Two types of packet transmission schemes are prevalent in duty-cycled wireless sensor networks, i.e., single packet transmission and aggregated packet transmission which integrates multiple packets in one frame. While most existing models are developed based on an error-free channel assumption, this paper evaluates the performance of both transmission schemes under error-prone channel conditions. We develop a four-dimensional discrete-time Markov chain model to investigate the impact of channel impairments on the performance of frame transmissions. Together with tracking the number of packets in the queue, number of retransmissions and number of active nodes, the fourth dimension o…

Computer Networks and Communicationsbusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryFrame (networking)020206 networking & telecommunicationsThroughput02 engineering and technologyEnergy consumption01 natural sciences0104 chemical sciencesTransmission (telecommunications)Packet lossComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringWirelessNetwork performancebusinessQueueWireless sensor networkComputer networkEfficient energy useCommunication channelComputer Networks
researchProduct

User behaviours after critical mobile application incidents: the relationship with situational context

2015

Users occasionally have critical incidents with information systems IS. A critical IS incident is an IS product or service experience that a user considers to be unusually positive or negative. Critical IS incidents are highly influential in terms of users' overall perceptions and customer relationships; thus, they are crucial for IS product and service providers. Therefore, it is important to study user behaviours after such incidents. Within IS, the relationships between the situational context and user behaviours after critical incidents have not been addressed at all. Prior studies on general mobile use as a related research area have recognized the influence of the situational context,…

Computer Networks and Communicationsbusiness.industrymedia_common.quotation_subject05 social sciencesInternet privacyWord of mouthAdvertisingContext (language use)02 engineering and technologyService provider020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation system050211 marketingContinuanceSituational ethicsPsychologybusinessFunction (engineering)SoftwareMobile serviceInformation Systemsmedia_commonInformation Systems Journal
researchProduct

Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches

2010

With the popularity of the IEEE 802.11 standards, many analytical saturation throughput studies for the distributed coordination function (DCF) have been reported. In this paper, we outline a number of issues and criticalities raised by previously proposed models. In particular, a careful look at backoff counter decrement rules allows us to conclude that, under saturation conditions, the slot immediately following a successful transmission can be accessed only by the station (STA) that has successfully transmitted in the previous channel access. Moreover, due to the specific acknowledgment (ACK) timeout setting adopted in the standard, the slot immediately following a collision cannot be ac…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceAerospace EngineeringThroughputDistributed coordination functionIEEE 802.11Wireless lanWireless Application ProtocolElectrical and Electronic Engineeringbusiness.industrySettore ING-INF/03 - Telecomunicazioni802.11 Performance analysisWiFiPerformance analysisComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCode ratemedium access protocolsAutomotive EngineeringbusinessTimeoutcomputerWireless sensor network802.11Computer networkCommunication channel
researchProduct

An efficient distributed algorithm for generating and updating multicast trees

2006

As group applications are becoming widespread, efficient network utilization becomes a growing concern. Multicast transmission represents a necessary lower network service for the wide diffusion of new multimedia network applications. Multicast transmission may use network resources more efficiently than multiple point-to-point messages; however, creating optimal multicast trees (Steiner Tree Problem in networks) is prohibitively expensive. This paper proposes a distributed algorithm for the heuristic solution of the Steiner Tree Problem, allowing the construction of effective distribution trees using a coordination protocol among the network nodes. Furthermore, we propose a novel distribut…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceDistributed computingNetwork ontology.Distance Vector Multicast Routing ProtocolMultimedia Broadcast Multicast ServiceSteiner tree problemTheoretical Computer Sciencesymbols.namesakeArtificial IntelligenceConvergence (routing)Multicast addressXcastCommunication complexityPragmatic General MulticastIntelligent systemSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMulticast transmissionProtocol Independent MulticastMulticastInter-domainbusiness.industryNode (networking)Programmable networkComputer Graphics and Computer-Aided DesignSource-specific multicastHardware and ArchitectureDistributed algorithmNetwork serviceReliable multicastsymbolsSituation calculuIP multicastbusinesscomputerSoftwareComputer networkParallel Computing
researchProduct

A new Media Access Control layer Quality of Service multicast scheme for IEEE 802.11s based wireless mesh networks

2014

Inderscience Publishers; International audience; We propose a new Media Access Control (MAC) layer enabling Quality of Service (QoS) multicast scheme for IEEE 802.11s networks, where a unicast routing protocol called HWMP (Hybrid Wireless Mesh Protocol) is defined. The HWMP protocol is more adapted for best effort traffic, that's why its usage is not suitable for real time multimedia applications. The goal of our proposed mechanism is to take into account multicast communication under QoS constraints for the IEEE 802.11s mesh networks where no QoS multicasting has been defined. Our multicasting scheme handles QoS guarantee for real time applications. Indeed, our scheme is based on finding t…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Wireless mesh networksDistance Vector Multicast Routing ProtocolQoSHWMP[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Multicast addressIEEE 802.11sXcastMAC layer multicastPragmatic General Multicastreal time multimedia applications.Protocol Independent MulticastMulticast[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMAC routingSource-specific multicastreal time multimedia applicationsIP multicastbusinesscomputerComputer network
researchProduct

Ultra-Low Power Wake-up Radio for 5G IoT

2019

5G Internet of Things (5G IoT), which is currently under development by 3GPP, paves the way for connecting diverse categories of devices to the IoT via cellular networks. For battery-powered low-cost IoT devices, wake-up radio (WuR) appears as an eminent technique for prolonging the lifetime of such devices, thanks to its outstanding energy consumption performance. However, only some small-size battery-powered IoT devices are able to transmit to a cellular IoT base station (BS) directly. In this article, we present W2B-IoT, a prototype implementation of a WuR-based two-tier system, which bridges cellular IoT BS and WuR via a Bluetooth low energy (BLE)-enabled Android smartphone. Such a WuR-…

Computer Networks and Communicationscomputer.internet_protocolComputer sciencebusiness.industryVDP::Technology: 500::Information and communication technology: 550020206 networking & telecommunications02 engineering and technologyEnergy consumptionComputer Science ApplicationsBase station0202 electrical engineering electronic engineering information engineeringCellular networkElectrical and Electronic EngineeringAndroid (operating system)Internet of Thingsbusinesscomputer5GBluetooth Low EnergyComputer network
researchProduct

A Survey and Taxonomy of Urban Traffic Management: Towards Vehicular Networks

2014

Urban Traffic Management (UTM) topics have been tackled since long time, mainly by civil engineers and by city planners. The introduction of new communication technologies - such as cellular systems, satellite positioning systems and inter-vehicle communications - has significantly changed the way researchers deal with UTM issues. In this survey, we provide a review and a classification of how UTM has been addressed in the literature. We start from the recent achievements of "classical" approaches to urban traffic estimation and optimization, including methods based on the analysis of data collected by fixed sensors (e.g., cameras and radars), as well as methods based on information provide…

Computer Science - Networking and Internet ArchitectureNetworking and Internet Architecture (cs.NI)FOS: Computer and information sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
researchProduct

Energy Efficient Resource Allocation and User Scheduling for Collaborative Mobile Clouds with Hybrid Receivers

2014

In this paper, we study the resource allocation and user scheduling algorithm for minimizing the energy cost of data transmission in the context of OFDMA collaborative mobile cloud (CMC) with simultaneous wireless information and power transfer (SWIPT) receivers. The CMC, which consists of several collaborating MTs offers one potential solution for downlink content distribution and for the energy consumption reduction at the terminal side. Meanwhile, as RF signal can carry both information and energy simultaneously, the induced SWIPT has gained much attention for energy efficiency design of mobile nodes. Previous work on the design of CMC system mainly focused on the cloud formulation or en…

Computer Science - Networking and Internet ArchitectureNetworking and Internet Architecture (cs.NI)FOS: Computer and information sciencescollaborative mobile cloudscontent distributiongreen communicationsuser schedulingsubchannel allocationresursointipower allocationuser cooperation
researchProduct

Non-convex Optimization for Resource Allocation in Wireless Device-to-Device Communications

2020

Device-to-device (D2D) communication is considered one of the key frameworks to provide suitable solutions for the exponentially increasing data tra c in mobile telecommunications. In this PhD Thesis, we focus on the resource allocation for underlay D2D communications which often results in a non-convex optimization problem that is computationally demanding. We have also reviewed many of the works on D2D underlay communications and identi ed some of the limitations that were not handled previously, which has motivated our works in this Thesis. Our rst works focus on the joint power allocation and channel assignment problem in the D2D underlay communication scenario for a unicast single-inpu…

Computer Science::Computer Science and Game TheoryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science::MultimediaComputer Science::Networking and Internet ArchitectureVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer Science::Information Theory
researchProduct