14 research outputs found

    Détection des événements de congestion de TCP

    Get PDF
    Ces derniĂšres annĂ©es ont vu un intĂ©rĂȘt croissant pour l'Ă©tude de la mesure des flots TCP. Plusieurs mĂ©thodes ont Ă©tĂ© proposĂ©es afin d'estimer de façon prĂ©cise et rapide le taux de perte des paquets. Toutefois, et Ă  notre meilleure connaissance, l'estimation et l'identification des Ă©vĂ©nements de congestion TCP ne sont actuellement pas adressĂ©es. Suite Ă  la standardisation de TFRC (TCP Friendly Rate Control), nous assistons Ă  un intĂ©rĂȘt croissant pour les protocoles de transport utilisant un contrĂŽle de congestion de type rate-based. Aussi, ce type de contrĂŽle de congestion repose sur la mĂȘme base mĂ©trologique que celle de TCP. Dans ce contexte, la dĂ©termination prĂ©cise des Ă©vĂ©nements de congestion (CE) est un Ă©lĂ©ment clĂ©. En effet, ces derniers donnent une information essentielle pour le calcul d'un dĂ©bit d'Ă©mission qui soit Ă©quivalent Ă  celui de TCP dans les mĂȘmes conditions. L'objet de cet article est de mieux identifier les CE de TCP afin de fournir une rĂ©fĂ©rence prĂ©cise Ă  ces nouveaux protocoles. Nous vĂ©rifions dans cette Ă©tude que TCP n'identifie pas de maniĂšre efficace les CE du rĂ©seau et proposons une mĂ©thode capable de mieux les dĂ©terminer. Cette dĂ©tection est effectuĂ©e passivement Ă  partir de la capture temps rĂ©el des paquets d'un flot TCP

    Transport congestion events detection (TCED): towards decorrelating congestion detection from TCP

    Get PDF
    TCP (Transmission Control Protocol) uses a loss-based algorithm to estimate whether the network is congested or not. The main difficulty for this algorithm is to distinguish spurious from real network congestion events. Other research studies have proposed to enhance the reliability of this congestion estimation by modifying the internal TCP algorithm. In this paper, we propose an original congestion event algorithm implemented independently of the TCP source code. Basically, we propose a modular architecture to implement a congestion event detection algorithm to cope with the increasing complexity of the TCP code and we use it to understand why some spurious congestion events might not be detected in some complex cases. We show that our proposal is able to increase the reliability of TCP NewReno congestion detection algorithm that might help to the design of detection criterion independent of the TCP code. We find out that solutions based only on RTT (Round-Trip Time) estimation are not accurate enough to cover all existing cases. Furthermore, we evaluate our algorithm with and without network reordering where other inaccuracies, not previously identified, occur

    Win-win opportunities combining high yields with high multi-taxa biodiversity in tropical agroforestry

    Full text link
    Resolving ecological-economic trade-offs between biodiversity and yields is a key challenge when addressing the biodiversity crisis in tropical agricultural landscapes. Here, we focused on the relation between seven different taxa (trees, herbaceous plants, birds, amphibians, reptiles, butterflies, and ants) and yields in vanilla agroforests in Madagascar. Agroforests established in forests supported overall 23% fewer species and 47% fewer endemic species than old-growth forests, and 14% fewer endemic species than forest fragments. In contrast, agroforests established on fallows had overall 12% more species and 38% more endemic species than fallows. While yields increased with vanilla vine density and length, non-yield related variables largely determined biodiversity. Nonetheless, trade-offs existed between yields and butterflies as well as reptiles. Vanilla yields were generally unrelated to richness of trees, herbaceous plants, birds, amphibians, reptiles, and ants, opening up possibilities for conservation outside of protected areas and restoring degraded land to benefit farmers and biodiversity alike

    Seaside Risk Detection from Mesh Connected Consumer Devices

    No full text
    International audienceno abstrac

    ContrÎle de trafic pour service privilégié sur réseaux sans fil

    No full text
    Conçus Ă  l'origine comme une extension des rĂ©seaux locaux maires, les rĂ©seaux locauxsans fil ont ouvert la voie Ă  de nouveaux usages liĂ©s Ă  l'ubiquitĂ©. Les caractĂ©ristiques ducanal radio ainsi que la mobilitĂ© des terminaux compliquent la problĂ©matique de la qualitĂ©de service (QoS : QuaĂźity of Service] de ces nouveaux rĂ©seaux. Cette thĂšse s'intĂ©resseau support de la diffĂ©renciation de service sur les rĂ©seaux IEEE 802.11 ad hoc. Elle commence par l'Ă©tude du support de la diffĂ©renciation de service sur un rĂ©seau monosaut. Le principe consiste Ă  contrĂŽler la demande au niveau IP sur la base de TĂ©tĂąt du rĂ©seau. Deux moyens de mise en Ɠuvre sont Ă©tudiĂ©s : dĂ©termination de l'Ă©tat du rĂ©seau par Ă©changede signalisation et estimation de l'Ă©tat du rĂ©seau par mesure locale. Ensuite, une solution au problĂšme de l'inĂ©quitĂ© d'accĂšs sur rĂ©seau ad hoc est proposĂ©e. En effet, sur certaines configurations, l'accĂšs au canal ne dĂ©pend plus uniquement de la charge mais aussi de la localisation relative des nƓuds et la resynchronisation des instants de dĂ©marrage de la procĂ©dured'accĂšs de 802.11 DGF. Enfin, pour simplifier le contrĂŽle des ressources et rĂ©duire lesinterfĂ©rences co-canaux, une organisation hiĂ©rarchique du rĂ©seau est proposĂ©e. A cettefin, nous proposons une modĂ©lisation pour la localisation des cellules et un algorithme de rĂ©partition des frĂ©quences aux cellules.Designed as an extention to wired local area networks, wireless local area networks lead to new potentials such as ubiquity. Wireless channels characteristics as well as mobility of terminais complexify thĂ© support of QuaĂźity of Service in thĂšse networks. This disser tation concentrĂątes on thĂ© support of service differentiation in IEEE 802.11-based ad hoc networks. It begins wifch thĂ© study of thĂ© support of service differentiation in a single hop network. The idea consists in controlling thĂ© traffic at thĂ© IP level according to thĂ© net work state. Two types of implementation are studied: computation of thĂ© network state by means of message exchange and estimation of thĂ© network state by local measurements. Then, a solution to channel acccss unfairness issues is proposed. Indeed, under certain con figurations, channel access does not dĂ©pend solely on thĂ© traffic load but also on thĂ© relative position of thĂ© nodes. The proposed solution consists in thĂ© propagation of thĂ© receiving state of nodes and in thĂ© synchronization of thĂ© beginning of 802.11 access opĂ©ration. Fi-nally, in ordcr to simphfy resources management and to reduce co-channel interfĂ©rences, a hierarchical organization of thĂ© network is proposed. It is based on a topology control or clustcring sclieme and a, channel assignaient mechanism.SAINT DENIS/REUNION-Droit Lettre (974112101) / SudocSudocFranceReunionFRR

    Equité pour réseau ad hoc Wi-fi

    No full text
    National audienceLa norme IEEE 802.11 est devenue un standard de la technologie sans fil. Cependant, son utilisation dans les rĂ©seaux ad hoc pose des problĂšmes de performance et en particulier, en terme d’équitĂ© d’accĂšs. Cet article prĂ©sente une mĂ©thode d’accĂšs Ă©quitable (FWM : Fair Wireless MAC) qui est une extension de l’applicabilitĂ© de la mĂ©thode d’accĂšs de 802.11 aux rĂ©seaux ad hoc. Pour cela, un mĂ©canisme de type tonalitĂ© d’occupation est couplĂ© Ă  la dĂ©tection de la porteuse afin de synchroniser les Ă©tats des noeuds adjacents Ă  une communication. En Ă©tendant la connaissance du voisinage des noeuds, la rĂ©solution des contentions de 802.11 peut de nouveau s’appliquer efficacement. L’inĂ©quitĂ© due Ă  la transmission sans fil est Ă©galement traitĂ©e par FWM. La solution proposĂ©e est tirĂ©e de l’analyse des causes d’inĂ©quitĂ© de 802.11 dans un rĂ©seau ad hoc. FWM sera comparĂ© aux solutions de type tonalitĂ© d’occupation. L’apprĂ©ciation de la solution proposĂ©e est faite avec le simulateur NS-2 sur des situations prĂ©sentant des phĂ©nomĂšnes d’inĂ©quitĂ©

    Enhancing Disaster Management by Taking Advantage of General Public Mobile Devices: Trends and Possible Scenarios

    No full text
    International audienceWhen a crisis occurs, particular infrastructures that are specific to the emergency situation are deployed in order to support rescue operations. Indeed, the normally used ones may have suffered from the disaster resulting in an altered service or may not be available at all. This process concerns physical (logistics) as well as immaterial (information) items delivery. Nowadays, a special emphasize has been put on the latter as it has been proven ([CAM 12], [TAN 09] and [LEF 14]) that it is a major requirement to ensure that the former is realized properly and more generally to address the crisis. Generally, required information aims at answering to the following basic questions: What (happened)? When (did it happened)? Where (is the disaster located)? And possibly How (can it be reached)? That is why research and development works have been led to create technologies that can manage information acquisition and delivery in harsh environments: specific communication networks, rugged equipment, solar-powered devices, etc. Those means are dedicated to risk and emergency experts who are specially trained to evolve under difficult circumstances and the tools they rely on are designed to cope with this context

    Using general public connected devices for disasters victims location

    No full text
    International audienceInformation Technologies (IT) have largely contributed to improve disaster management by providing new means to acquire, process and broadcast information to the various actors. However, most of the work was targeted toward the risk experts: decision makers, rescue teams, firemen, etc. Nowadays, a new parallel trend seems to emerge: it consists in taking into account signal from consumer devices like cell phones (basic ones to smartphones), tablets, computers or other devices but light networks equipment (routers, WiFi access points) too. More particularly, our goal is to rely on the wave activity generated by those equipments, which are generally personal, to detect where victims are more likely to be located after a disaster, typically a seism. To reach this aim, we present the feasibility of mixing two approaches to acquire data by measuring their radio activity

    Hierarchical Area-Based Address Autoconfiguration Protocol for Self-organized Networks

    No full text
    International audienceNode autoconfiguration is one of the main issues in self-organized networks. One class of approaches relies on hierarchical organization of nodes. This kind of structuration aims to deal with scalability issues, especially for wireless networks. But building and maintaining a hierarchy is generally expensive for these resource-limited networks. We propose a low-cost distributed, hierarchical, location-based address au-toconfiguration protocol. Each node infers its address from those of its one-hop neighbors and from its relative position to them. In this way we obtain a globally-consistent organization resulting from local interactions only. This reduces the latency and the overhead generated during address configuration. Moreover this scheme is the first step towards the design of a scalable routing protocol taking advantages of the proposed hierarchical addressing
    corecore