Search results for "throughput"

showing 10 items of 483 documents

Guaranteed access mode for downlink traffic over IEEE 802.11 WLANs

2011

IEEE 802.11 networks present an unfairness problem between the downlink and uplink traffic, using the default settings of the Enhanced Distributed Channel Access (EDCA). In order to reduce this unfairness, the Access Point (AP) can adapt the standard parameters, but this is not enough. In this paper, we propose simple and efficient solutions, which are implemented at the AP, thus they are standard compatible and no modifications to the current hardware and protocol stacks are needed. These solutions aim at providing guaranteed access to the downlink traffic when the AP perceives the unfairness problem. Our simulation results show a reduction in the unfairness and an enhancement in network p…

Reduction (complexity)IEEE 802.11SIMPLE (military communications protocol)business.industryComputer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSFrame (networking)Telecommunications linkNetwork performanceThroughputbusinessComputer network2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011)
researchProduct

Large scale preparation of human MHC class II+ integrin beta(1)+ Tregs.

2010

Abstract The human CD4 + CD25 + FoxP3 + regulatory T cell population (Tregs) contains both MHC class II + and MHC class II − cells. MHC class II + Tregs belong to the integrin α 4 β 1 + subpopulation and exclusively execute contact-dependent suppressive activity. Here we present a method optimized for isolation of these MHC class II expressing Tregs from large leukaphereses products using magnetic microbeads that achieves a reproducible purity of more than 90% and enables the use of this small-sized Treg population in pre-clinical application and basic research.

Regulatory T cellImmunologyPopulationIntegrinchemical and pharmacologic phenomenaIntegrin alpha4beta1T-Lymphocytes RegulatoryT-Lymphocyte SubsetsmedicineImmune ToleranceImmunology and AllergyHumansIL-2 receptorLeukapheresiseducationCells CulturedMHC class IIeducation.field_of_studybiologyImmunomagnetic SeparationHistocompatibility Antigens Class IIInterleukin-2 Receptor alpha SubunitFOXP3hemic and immune systemsForkhead Transcription FactorsT lymphocyteMHC restrictionFlow CytometryCell biologyHigh-Throughput Screening Assaysmedicine.anatomical_structureImmunologyCD4 Antigensbiology.proteinJournal of immunological methods
researchProduct

Performance assessment of institutional photovoltaic based energy system for operating as a micro-grid

2020

Abstract A building integrated photovoltaic (PV) system with energy storage within an institution may need appropriate coordination among distributed energy sources (DERs). It is required to have an appropriate energy management strategy to improve system performance as well as to operate it as a micro-grid during the grid outage condition. In this paper, TERI’s (India) Retreat Facility’s energy system has been used, and its performance with a distributed generator has been assessed with operational strategies for fulfilling the institutional load demand in coordination with the PV, grid and battery storage; and with possibility of operating it as a micro-grid during the grid outage period …

Renewable Energy Sustainability and the Environmentbusiness.industryComputer scienceEnergy management020209 energyPhotovoltaic systemEnergy Engineering and Power Technology02 engineering and technologyMaximizationGridEnergy storageReliability engineering020401 chemical engineeringDistributed generation0202 electrical engineering electronic engineering information engineeringElectricity0204 chemical engineeringbusinessThroughput (business)Sustainable Energy Technologies and Assessments
researchProduct

Introducing a new method for efficient visualization of complex shape 3D ultrasonic phased-array C-scans

2017

Automated robotic inspection systems allow the collection of large data volumes, compared to existing inspection systems. To maximize the throughput associated with the non-destructive evaluation phase, it is crucial that the reconstructed inspection data sets are generated and examined rapidly without a loss of detail. Data analysis often becomes the bottleneck of automated inspections. Therefore, new data visualization tools, suitable to screen the NDT information obtained through robotic systems, are urgently required. This paper presents a new approach, for the generation of three-dimensional ultrasonic C-scans of large and complex parts, suitable for application to high data throughput…

Robot kinematicsbusiness.industryComputer sciencePhased arrayTK020207 software engineering02 engineering and technologyRoboticsPhased ArraysVisualizationData visualizationAutomated X-ray inspection020204 information systemsNondestructive testing0202 electrical engineering electronic engineering information engineeringComputer visionUltrasonic sensorArtificial intelligenceAutomated SystemsbusinessThroughput (business)Surface reconstructionC-ScansData Visualisation
researchProduct

Packet management techniques for measurement based end-to-end admission control in IP networks

2000

End-to-end Measurement Based connection Admission Control (EMBAC) mechanisms have been proposed to support real-time flows quality of service requirements over a Differentiated Services Internet architecture. The EMBAC basic idea is to decentralize the admission control decision, by requiring each individual user to probe the network path during flow setup, and by basing the accept/reject decision on the probing traffic statistics measured at the destination. In conformance with the differentiated services framework, routers are oblivious to individual flows and only need to serve data packets with a higher priority than probing traffic. In this paper, we build upon the observation that som…

RouterComputer Networks and CommunicationsNetwork packetbusiness.industryComputer scienceQuality of serviceThroughputAdmission controlNetwork congestionDifferentiated servicesEnd-to-end principlebusinessInformation SystemsComputer network
researchProduct

MAC strategies for single rendezvous multi-hop cognitive radio networks

2009

This paper presents two MAC strategies for multi-hop cognitive radio networks in single radio multi-channel cases. Both strategies use one of the idle multiple channels for communication among secondary users, and the network will leave the current channel and jump to another channel as a group if any primary user appears. The first strategy is based on a pre-defined pattern that will always tune to the next available channel when primary user emerges. The second one is based on the concept of connected dominating set in which a backbone is formed in the network in order to keep the continuity of the communication. The strategies are evaluated in both homogeneous and heterogeneous channels …

Routing protocolCognitive radiobusiness.industryComputer scienceDistributed computingRendezvousThroughputbusinessConnected dominating setComputer Science::Information TheoryComputer networkHop (networking)Communication channel2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications
researchProduct

Assignment of Roles and Channels for a Multichannel MAC in Wireless Mesh Networks

2009

International audience; A multichannel MAC improves throughput in wireless mesh networks by multiplexing transmissions over orthogonal channels. In this paper, we propose an efficient way for constructing the wireless mesh structure associated with Molecular MAC, a multichannel MAC layer designed for efficient packet forwarding. Molecular MAC outperforms other classical approaches, but requires a specific structure for efficient operation. First, we propose a centralized protocol that provides an upper bound for constructing such a molecular structure through a MILP (Mixed Integer Linear Programming) formulation that maximizes network capacity. Then, we present two distributed self-stabiliz…

Routing protocolComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Mesh networkingThroughput0102 computer and information sciences02 engineering and technology01 natural sciencesMultiplexinglaw.invention[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]law0202 electrical engineering electronic engineering information engineeringComputer Science::Networking and Internet ArchitectureComputer Science::Information TheorySpanning treeWireless mesh network[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryRadio Link ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwarding020206 networking & telecommunications010201 computation theory & mathematicsbusinessCommunication channelComputer network
researchProduct

A mini-slot-based cooperative MAC protocol for wireless mesh networks

2010

This paper proposes a TDMA-based medium access control protocol with cooperative communications enabled in wireless mesh networks. The proposed scheme is based on a multi-hop scenario which is extended from the conventional one-hop triangle cooperative transmission scenario. Benefiting from the elaborate mini-slot design, channel resources are fairly and efficiently allocated to each router so that no handshake is needed prior to every packet transmission. By giving priority for channel access to cooperative transmission performed by an optimal helper which is determined based on the received SNR, higher successful transmission rate can be achieved. Numerical results demonstrate that the pr…

Routing protocolRouterChannel allocation schemesWireless mesh networkbusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessThroughputData_CODINGANDINFORMATIONTHEORYComputer Science::PerformanceTransmission (telecommunications)Computer Science::Networking and Internet ArchitectureWirelessbusinessComputer networkCommunication channel2010 IEEE Globecom Workshops
researchProduct

Performance Analysis in Spatially Correlated IEEE 802.11 Networks

2012

Wireless mesh networks are difficult to be characterized, especially under multi-hop traffic streams. The problem is that the local view of the channel and the correlation between the buffers of consecutive nodes in a stream path make complicated the identification of the contention level perceived by each station along the time. Such a figure is used in the models based on the so called decoupling assumption for evaluating the final scheduling of simultaneous channel access grants. In this paper we propose a simplified mesh network model focused on capturing the correlation due to the network topology and traffic routes rather than the access protocol state at each node. To this purpose, w…

Routing protocolWireless mesh networkbusiness.industryWireless networkComputer scienceSettore ING-INF/03 - TelecomunicazioniDistributed computingMesh networkingThroughputNetwork topologyScheduling (computing)IEEE 802.11Wireless lanComputer Science::Networking and Internet ArchitecturebusinessSpatial Correlated Wireless Network Performance EvaluationNetwork modelComputer network
researchProduct

Throughput and energy efficiency comparison of one-hop, two-hop, virtual relay and cooperative retransmission schemes

2010

Two main types of approaches exist for implementing cooperative communications at the MAC layer: virtual-hop relay and cooperative retransmission. While the virtual-hop relay schemes employ relay nodes to forward packets when higher end-to-end throughput can be achieved compared with the direct transmission, the cooperative retransmission schemes use relays to retransmit data only after the direct transmission fails. However, the performance of the these different approaches has not been compared in the literature, especially when energy efficiency is considered. In order to find out the best transmission scheme, this paper evaluates and compares the performance of the one-hop direct transm…

Routing protocolbusiness.industryNetwork packetWireless networkComputer scienceRetransmissionDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputData_CODINGANDINFORMATIONTHEORYlaw.inventionComputer Science::PerformanceRelaylawComputer Science::Networking and Internet ArchitectureFadingbusinessComputer Science::Information TheoryComputer networkEfficient energy use2010 European Wireless Conference (EW)
researchProduct