Exploració per tema "Telecommunication--Traffic"
Ara es mostren els items 1-16 de 16
-
A fuzzy-based reliaility for JXTA-overlay P2P platform considering data download speed, peer congestion situation, number of interaction and packet loss parameters
(Institute of Electrical and Electronics Engineers (IEEE), 2016)
Text en actes de congrés
Accés obertIn this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) communications in JXTA-Overlay platform considering as a new parameter the peer congestion situation. In our system, we ... -
Common radio resource management algorithms for multimedia heterogeneous wireless networks
(2011-09)
Article
Accés restringit per política de l'editorialHeterogeneous wireless systems are envisaged as the integration and joint cooperative management of diverse radio access networks and technologies through which network providers can satisfy the wide variety of user/service ... -
Coordinated Computation of Multi-layer Paths via Inter-layer PCE Communication: Standards, Interoperability and Deployment
(2012)
Text en actes de congrés
Accés obertThe Path Computation Element (PCE) is positioned nowadays as one of the solutions that almost every carrier will eventually deploy. The PCE architecture as well as a number of components, including the PCE Communication ... -
Decentralised multi-access MAC protocol for ad-hoc networks
(2003)
Text en actes de congrés
Accés obertIn ad-hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency and, when needed, to guarantee QoS. Traditionally, Medium Access Control (MAC) protocols ... -
Diseño e implementación de un módulo de monitorización de LSPs para redes con soporte MPLS
(Universitat Politècnica de Catalunya, 2011-07-29)
Treball Final de Grau
Accés restringit per decisió de l'autorEn los últimos años la adopción de MPLS se ha incrementado debido a las ventajas y la cantidad de aplicaciones que ofrece. En una red MPLS se asignan etiquetas a los paquetes según entran al dominio y son conmutados en ... -
Diseño e implementación de un servidor de comunicaciones para redes multidisciplinares con acceso seguro a internet, alta disponibilidad y calidad de servicio
(Universitat Politècnica de Catalunya, 2012-09-04)
Projecte/Treball Final de Carrera
Accés obert[ANGLÈS] This project arises from the need to improve the performance of the connection of the student residence in Terrassa with the University network and the Internet. The student residence in Terrassa Campus (RESA) was ... -
Empirical analysis of traffic to establish a flow termination time-out
(Universitat Politècnica de Catalunya, 2012-11)
Projecte/Treball Final de Carrera
Accés obert[ANGLÈS] The inspection of contents of packets flowing on the Internet, also called Deep Packet Inspection (DPI), is the main technology used for traffic classification and anomaly searching due to its reliability and ... -
Evaluación de herramientas de análisis de tráfico
(Universitat Politècnica de Catalunya, 2011-09-08)
Treball Final de Grau
Accés obertEste proyecto se ha realizado en un entorno laboral real, en una empresa que se dedica al sector de las Tecnologías de la Información y la Comunicación (TIC) y que ofrece servicios como Proveedor de Servicios de Internet ... -
Evaluación de técnicas de captura y muestreo de tráfico en redes de ordenadores
(Universitat Politècnica de Catalunya, 2012-12-20)
Treball Final de Grau
Accés obertEn las redes de ordenadores (típicamente redes IP), el análisis de tráfico con fines de administración y control se realiza construyendo un registro de los flujos IP activos. Esta monitorización se realiza en ciertos ... -
Handling Outdated Information in Optical PCE Environments
(2015)
Text en actes de congrés
Accés restringit per política de l'editorialThe rapid emergence of new network scenarios and architectures, such as Data Centers Networks (DCNs), Path Computation Element (PCE), and Software Defined Networking (SDN), has refreshed some on-line routing-related ... -
Lowering traffic without sacrificing performance in networked control systems
(IEEE Press. Institute of Electrical and Electronics Engineers, 2011)
Comunicació de congrés
Accés restringit per política de l'editorialIn Networked Control Systems (NCS), the amount of control data exchanged between sensors, controllers and actuators nodes highly depends on the control performance specifications given to each networked control loop. ... -
La neutralidad de red: gestión de tráfico mediante DPI/DFI
(Universitat Politècnica de Catalunya, 2012-01-12)
Projecte/Treball Final de Carrera
Accés obertEnglish: Net neutrality promotes some principles aimed at maintaining an open Internet, including specially the idea of granting the same treatment to all packets flowing through the network. This approach has been triggered ... -
QoS scheduling in heterogeneous traffic multiuser multiantenna WLAN systems
(2009)
Text en actes de congrés
Accés obertA cross-layer based dynamically tuned queue length scheduler is presented in this paper, for the Downlink of multiuser and multiantenna WLAN systems with heterogeneous traffic requirements. An opportunistic scheduling ... -
Recent advances on the simulation models for ad hoc networks: real traffic and mobility models
(2009-03-01)
Article
Accés restringit per política de l'editorialIn order to provide credible and valid simulation results it is important to built simulation models that accurately represent the environments were ad hoc networks will be deployed. Recent research results have shown that ... -
Statistical Modelling of Channel Occupancy in Trunked PAMR Systems
(Elsevier Science B.V., 1997-06)
Article
Accés restringit per política de l'editorialPublic access mobile radio systems (PAMR) using trunking technology allow more efficient use of the frequency spectrum, as all the users of the system jointly use a common pool of channels. Trunked PAMR systems can operate ... -
Validation of a traffic-based CAC method under general channel holding time
(2009)
Text en actes de congrés
Accés restringit per política de l'editorialWe validate a call admission control (CAC) method for mobile cellular networks under more restrictive conditions than those assumed in its design. The method uses distribution and the first and second moments of the ...