The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The management of multiple systems such as machine tools, vehicles, aircraft, among others, results in a very intense flow of data between the server and embedded systems, using wired and/or radiofrequency structures, demanding performance and interest in real time systems. The objective of this study is to propose a low cost scalable architecture for embedded applications, using pools of personal...
Smooth rate control schemes are necessary for Internet streaming flows to use available bandwidth. To equally share the Internet bandwidth with existing Transmission Control Protocol (TCP) flows, these new schemes should meet TCP-equivalent criterion, i.e., achieve the same transmission rates as TCP under the same network conditions. However, when the available bandwidth oscillates, many of these...
This paper studies the use of a traffic optimization technique named TCM (Tunneling, Compressing and Multiplexing) to reduce the bandwidth of MMORPGs (Massively Multiplayer Online Role-Playing Games), which employ TCP to provide a soft real-time service. In order to optimize the traffic and to improve bandwidth efficiency, TCM can be applied when the packets of a number of players share the same link,...
This paper proposes two resource discovery mechanisms (the Upgrading and the Re-routing one) in a large-scale Grid system, in which the categorization of resources plays a crucial role. Through a simple matchmaking framework, each resource is identified as being part of a certain category, using its technical specifications (i.e. disk, and memory). Each Virtual Organization (VO) acquires only partial/limited...
Large-scale failures in telecommunication networks make the preservation of the connections inside a community a challenging task, being traditional approaches focused on the preservation of the global connectivity. To achieve this goal, a new concept of community is proposed, which combines not only the topological information of the network but also the traffic-level interaction. Moreover, six novel...
Web server benchmarking has two main purposes, comparing different hardware platforms or server configurations, and testing the scalability of a given system.
The model of a router interface with a buffer limited to a fixed number of packets (regardless their lengths) is discussed. The interface is described as a finite FIFO queuing system with a Markovian Arrival Process (MAP) and semi-Markov (SM) service times. The new analytical results for the loss ratio, the local loss intensity or the total number of losses are developed. All results are suitable...
This paper proposes a new error concealment technique for the motion vectors, which are lost in error propagation. Experimental results demonstrate that the performance of proposed method is better than Decoder Motion-Vector Estimation, and much better than the algorithm obtained by conventional temporal concealment.
Several works in the literature have recently addressed the study of different Networked Virtual Environments (NVE) due to their increasing popularity and widespread use in fields ranging from entertainment to e-Health. Open Wonderland is one of these NVEs which has been the subject of several studies mainly focused on the client side. This paper aims to cover the server-side performance issues to...
The need to monitor and analyse network traffic grows with the deployment of new multimedia services over high speed networks. Predicting the overall capturing performance is crucial to know if the traffic monitoring system will be able to cope with all the traffic packets, or if it needs more processing power. In this paper, we present an analytical model based on a Markov chain to study the efficiency...
Low-Rate Wireless Personal Area Network (LR-WPAN) technologies are more widely applied in industrial applications, posing additional challenges for reliability due to harsh conditions. Efficient and manageable testing methods and tools to support building and maintaining reliable communication are inevitable though currently not so well existing. The goal of our work is to derive a systematic approach...
In this paper, we consider the problem of exploring an unknown environment with a team of robots to detect and disarm mines. The goal is to minimize the overall exploration time and to disarm all mines in a landscape. We present two approaches for the coordination of robots. An indirect communication, stigmergy, inspired to biology is used to help robots to cover the overall area in a minimum time...
Opportunistic networks are challenged wireless networks where most of the time contacts are intermittent and link performance is typically highly variable. In this kind of environment, an end-to-end path between the source and the destination may only exist for a brief period and may change quickly. Long propagation and variable queuing delays might be introduced and conventional routing protocols...
Performance projection of an application for large number of users involves predicting the maximum throughput that the application can achieve and the maximum number of users it can support. Factors affecting the maximum throughput can include both hardware and software resources of each of the servers associated with the application. In a multi-tier environment, the number of resources affecting...
Wireless Sensor Network (WSN) deployment appears like a crucial step for network Quality of Service (QoS). In this context a real conception has to be planed before a deployment on the studied area. Actually researches use a simple and regular Area of Deployment (AoD) representation and do not allow interactive interface for a non programmer. Our approach tries to provide a tool to elaborate a strategy...
Recently, mobile communications need to benefit a good level of Quality of Service (QoS), since communications guarantees are mandatory during active flows. Passive resources are used to ensure service continuity when mobile hosts are moving among different coverage cells. In this work the attention is focused on wireless services in cellular networks, where the hand-over effects need to be mitigated,...
Numerous studies have shown that datacenter networks typically see loads of between 5% – 25% but the energy draw of these networks is equal to operating them at maximum load. In this paper, we propose a novel way to make these networks more energy proportional - that is, the energy draw scales with the network load. We propose the idea of traffic aggregation, in which low traffic from N links is combined...
We consider a path-scheduling problem at a resource constrained node A that transmits two types of flows to a given destination through alternate paths. Type-1 flow is assumed to have a higher priority than type-2 flow thus, it is never rejected upon arrival. Type-2 flow, on the other hand, may be denied admission to the queue. Once accepted to the system, a packet joins queue 1 and is guaranteed...
The IEEE 802.16 standard is one of the most promising broadband wireless access systems. The standard incorporates a QoS architecture that supports both realtime and non-realtime applications. To provide QoS three data schedulers are furnished by the architecture. However, the working of the schedulers are not defined by the standard. Some researchers have attempted to fill this gap by providing different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.