6 research outputs found

    FROM WIDE- TO SHORT-RANGE COMMUNICATIONS: USING HUMAN INTERACTIONS TO DESIGN NEW MOBILE SYSTEMS AND SERVICES

    Get PDF
    The widespread diffusion of mobile devices has radically changed the way people interact with each other and with object of their daily life. In particular, modern mobile devices are equipped with multiple radio interfaces allowing users to interact at different spatial granularities according to the various radio technology they use. The research community is progressively moving to heterogeneous network solutions which include many different wireless technologies seamlessly integrated to address a wide variety of use cases and requirements. In 5th- Generation (5G) of mobile network we can find multiple network typology such as device-to-device (D2D), vehicular networks, machine-to-machine(M2M), and more, which are integrated in the existing mobile-broadband technology such as LTE and its future evolutions. In this complex and rich scenario, many issues and challenges are still open from a technological, architectural, and mobile services and applications points of view. In this work we provide network solutions, mobile services, and applications consistent with the 5G mobile network vision by using users interactions as a common starting point. We focus on three different spatial granularities, long, medium/short, and micro mediated by cellular network, Wi-Fi, and NFC radio technologies, respectively. We deal with various kinds of issues and challenges according to the distinct spatial granularity we consider. We start with an user centric approach based on the analysis of the characteristics and the peculiarities of each kind of interaction. Following this path, we provide contributions to support the design of new network architectures, and the development of novel mobile services and applications

    Analysis of Error Control and Congestion Control Protocols

    Get PDF
    This thesis presents an analysis of a class of error control and congestion control protocols used in computer networks. We address two kinds of packet errors: (a) independent errors and (b) congestion-dependent errors. Our performance measure is the expected time and the standard deviation of the time to transmit a large message, consisting of N packets. The analysis of error control protocols. Assuming independent packet errors gives an insight on how the error control protocols should really work if buffer overflows are minimal. Some pertinent results on the performance of go-back-n, selective repeat, blast with full retransmission on error (BFRE) and a variant of BFRE, the Optimal BFRE that we propose, are obtained. We then analyze error control protocols in the presence of congestion-dependent errors. We study the selective repeat and go-back-n protocols and find that irrespective of retransmission strategy, the expected time as well as the standard deviation of the time to transmit N packets increases sharply the face of heavy congestion. However, if the congestion level is low, the two retransmission strategies perform similarly. We conclude that congestion control is a far more important issue when errors are caused by congestion. We next study the performance of a queue with dynamically changing input rates that are based on implicit or explicit feedback. This is motivated by recent proposals for adaptive congestion control algorithms where the sender\u27s window size is adjusted based on perceived congestion level of a bottleneck node. We develop a Fokker-Planck approximation for a simplified system; yet it is powerful enough to answer the important questions regarding stability, convergence (or oscillations), fairness and the significant effect that delayed feedback plays on performance. Specifically, we find that, in the absence of feedback delay, a linear increase/exponential decrease rate control algorithm is provably stable and fair. Delayed feedback, however, introduces cyclic behavior. This last result not only concurs with some recent simulation studies, it also expounds quantitatively on the real causes behind them

    Automatic verification of regular protocols in P/T nets

    Get PDF

    Decomposition and protocols in high-level Petri nets

    Get PDF
    corecore