Search results for "throughput"

showing 10 items of 483 documents

Out-of-Band Signaling Scheme for High Speed Wireless LANs

2007

In recent years, the physical layer data rate provided by 802.11 Wireless LANs has dramatically increased thanks to significant advances in the modulation and coding techniques employed. However, previous studies show that the 802.11 MAC operation, namely the distributed coordination function (DCF), represents a limiting factor: the throughput efficiency drops as the channel bit rate increases, and a throughput upper limit does indeed exist when the channel bit rate goes to infinite high. These findings indicate that the performance of the DCF protocol will not be efficiently improved by merely increasing the channel bit rate. This paper shows that the DCF performance may significantly bene…

Computer scienceComputer network performanceWireless LANThroughputDistributed coordination functionBackward compatibilityIEEE 802.11Packet switchingWireless lanWireless LAN Throughput Bit rate Physical layer Modulation coding Access protocols Content management Signal design Media Access Protocol Performance analysisElectrical and Electronic EngineeringIEEE 802.11Settore ING-INF/03 - Telecomunicazionibusiness.industryApplied MathematicsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerCode rateComputer Science ApplicationsComputer network performance; IEEE 802.11; Wireless LANBurst switchingModulationOut-of-band managementbusinessCommunication channelComputer networkIEEE Transactions on Wireless Communications
researchProduct

A Kalman Filter Approach for Distinguishing Channel and Collision Errors in IEEE 802.11 Networks

2008

In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel waste due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the network congestion level. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feasibility…

Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingPhysical layerchannel estimationThroughputKalman filterNetwork allocation vectorNetwork congestionExtended Kalman filterWLANIEEE 802.11ModulationRobustness (computer science)PHYWireless lanComputer Science::Networking and Internet ArchitectureCommunication channel
researchProduct

Efficient and Accurate OTU Clustering with GPU-Based Sequence Alignment and Dynamic Dendrogram Cutting.

2015

De novo clustering is a popular technique to perform taxonomic profiling of a microbial community by grouping 16S rRNA amplicon reads into operational taxonomic units (OTUs). In this work, we introduce a new dendrogram-based OTU clustering pipeline called CRiSPy. The key idea used in CRiSPy to improve clustering accuracy is the application of an anomaly detection technique to obtain a dynamic distance cutoff instead of using the de facto value of 97 percent sequence similarity as in most existing OTU clustering pipelines. This technique works by detecting an abrupt change in the merging heights of a dendrogram. To produce the output dendrograms, CRiSPy employs the OTU hierarchical clusterin…

Computer scienceCorrelation clusteringSingle-linkage clusteringMolecular Sequence DataMachine learningcomputer.software_genrePattern Recognition AutomatedCURE data clustering algorithmRNA Ribosomal 16SGeneticsComputer GraphicsCluster analysisBase Sequencebusiness.industryApplied MathematicsDendrogramHigh-Throughput Nucleotide SequencingPattern recognitionSignal Processing Computer-AssistedEquipment DesignHierarchical clusteringEquipment Failure AnalysisRNA BacterialCanopy clustering algorithmArtificial intelligenceHierarchical clustering of networksbusinesscomputerSequence AlignmentAlgorithmsBiotechnologyIEEE/ACM transactions on computational biology and bioinformatics
researchProduct

A Clustering Approach for Improving Network Performance in Heterogeneous Systems

2000

A lot of research has focused on solving the problem of computation-aware task scheduling on heterogeneous systems. In this paper, we propose a clustering algorithm that, given a network topology, provides a network partition adapted to the communication requirements of the applications running on the machine. Also, we propose a criterion to measure the quality of each one of the possible mappings of processes to processors based on that network partition. Evaluation results show that these proposals can greatly improve network performance, providing a basis of a communication-aware scheduling technique.

Computer scienceDistributed computingNetwork partitionNetwork performanceThroughputNetwork topologyCluster analysisNetwork simulationScheduling (computing)
researchProduct

Remarks on IEEE 802.11 DCF performance analysis

2005

This letter presents a new approach to evaluate the throughput/delay performance of the 802.11 distributed coordination function (DCF). Our approach relies on elementary conditional probability arguments rather than bidimensional Markov chains (as proposed in previous models) and can be easily extended to account for backoff operation more general than DCF's one.

Computer scienceMarkov processThroughputDistributed coordination functionCarrier-sense multiple accesssymbols.namesakeIEEE 802.11Wireless lanComputer Science::Networking and Internet ArchitectureElectrical and Electronic EngineeringThroughput (business)IEEE 802.11Markov chainSettore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science ApplicationsComputer Science::PerformanceModeling and SimulationMultiple access controlPerformance evaluationsymbolsIEEE 802.11; Multiple access control; Performance evaluationbusinessAlgorithmComputer networkIEEE Communications Letters
researchProduct

FPGA/LST-SW Encryption Module Implementation for Satellite Remote Sensing Secure Systems

2020

The need for security of data transmitted from satellites to the ground has increased. Therefore, the need for secure onboard systems is in great demand, particularly in satellite remote sensing missions. This paper describes an approach for a secure Field Programmable Gate Arrays (FPGA) implementation of the Land Surface Temperature Split Window (LST-SW) algorithm, with objective to meat real-time requirements, area optimization and achieved higher Throughput goals to be sufficient for a secure remote sensing satellite applications and missions. The system is designed using VHDL (VHSIC Hardware Description Language) in a Highlevel design method. The experimental results demonstrate that th…

Computer scienceRemote sensing (archaeology)business.industrySatellite remote sensingVHDLClock ratebusinessEncryptionField-programmable gate arraycomputerThroughput (business)Computer hardwarecomputer.programming_language2020 Fourth International Conference On Intelligent Computing in Data Sciences (ICDS)
researchProduct

The role of the Access Point in Wi-Fi networks with selfish nodes

2009

In Wi-Fi networks, mobile nodes compete for accessing the shared channel by means of a random access protocol called Distributed Coordination Function (DCF), which is long term fair. But recent drivers allow users to configure protocol parameters differently from their standard values in order to break the protocol fairness and obtain a larger share of the available bandwidth at the expense of other users. This motivates a game theoretical analysis of DCF. Previous studies have already modeled access to a shared wireless channel in terms of non-cooperative games among the nodes, but they have mainly considered ad hoc mode operation. In this paper we consider the role of the Access Point (AP…

Computer scienceWireless ad hoc networkBidirectional trafficDistributed computingmedia_common.quotation_subjectMechanism designThroughputDistributed coordination functionNash equilibriumWi-fi networks[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEE 802.11Settore ING-INF/04 - Automaticaselfish nodesSelfishnessmedia_commonIEEE 802.11business.industrySettore ING-INF/03 - TelecomunicazioniNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWLAN; selfish nodesWLANbusinessRandom accessComputer network
researchProduct

An adaptive cooperative MAC mechanism in multi-hop wireless networks

2010

In this paper, we propose a novel adaptive cooperative MAC mechanism that is specifically designed for two-hop cooperative communications where source and destination cannot hear each other directly. The proposed scheme employs an efficient adaptive relay selection algorithm such that the number of relay nodes is optimized for each cooperative transmission to maximize cooperation benefits and effectively avoid potential collisions with other transmissions. In order to determine the optimal number of relays we apply a training sequence in Hello message exchange, which provides us with a channel status indicator combining both bit-level and flow-level information. Numerical results show that …

Computer scienceWireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputCooperative diversitylaw.inventionHop (networking)RelaylawComputer Science::Networking and Internet ArchitecturebusinessComputer Science::Information TheoryCommunication channelComputer networkThe IEEE symposium on Computers and Communications
researchProduct

A contention-based multiple access protocol in cooperative wireless networks

2010

Cooperative communication has emerged as a promising technique to enhance system performance in wireless networks. This paper proposes a contention-based cooperative multiple medium access control protocol by means of multiple retransmissions of the same packet from different relay nodes. The proposed scheme exploits cooperative communication capability not only from time diversity derived from multiple temporal transmissions but also spatial diversity derived from distributed multiple relays. A Markov chain is introduced to analyze the throughput performance of the proposed cooperative scheme. The performance evaluation of the protocol is validated and compared with non-cooperative ARQ pro…

Computer scienceWireless networkbusiness.industryNetwork packetDistributed computingAutomatic repeat requestComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputAntenna diversityTime diversitylaw.inventionCooperative diversityRelaylawComputer Science::Networking and Internet ArchitectureChannel access methodbusinessComputer Science::Information TheoryCommunication channelComputer networkProceedings of the 6th International Wireless Communications and Mobile Computing Conference
researchProduct

An embedded datalogger with a fast acquisition rate for in-vehicle testing and monitoring

2011

A very compact and high performance datalogger for automotive in-vehicle testing is here described. The small logger dimensions and the availability of a CAN interface allows to easily implement multiple and distributed acquisition schemes, very challenging with traditional instrumentation. High acquisition rate, up to 100 Ksps/ch, and low cost was obtained through a very accurate hardware and software design.

Computer sciencebusiness.industryAutomotive industryData Acquisition In-Vehicle testingAutomotive electronicsSettore ING-INF/01 - ElettronicaCAN busMicrocodeEmbedded systemData loggerSoftware designInstrumentation (computer programming)businessThroughput (business)Automotive electronics controller area networks data loggers embedded systems
researchProduct