Résumé Motivation

نویسنده

  • Paola Bermolen
چکیده

Heterogeneity, at service and technology level, is one of the main characteristics of todays networks. The ever increasing offer of new services has changed not only the amount of traffic in the network but also its structure. As a result, traditional techniques for traffic prediction and classification are becoming obsolete. In the first part of the thesis, we address these two problems by means of advanced statistical tools. We analyze the problem of online prediction of the load on a link based only on past measurements and without assuming any particular model. Concerning traffic classification, and motivated by the widespread use of P2P systems, we focus on the identification of P2P applications, considering more precisely the case of P2P television (P2P-TV). For both cases, our framework makes use of Support Vector Machines (SVM). The algorithms we propose provide very accurate results, they are robust and their computational cost is extremely low. These properties make our solutions specially adapted to an online application. As traffic is increasingly heterogeneous, so are the access technologies. In particular, wireless is destined to be the access technology of choice. In this context, self-organized systems such as Mobile Ah-doc Networks (MANETs), are of particular importance. The design of an efficient and fair multiple access (MAC) mechanism is then crucial. In the second part of the thesis, we address two different problems related to MAC mechanisms in MANETs (in particular, we concentrate on CSMA since it is the most widely deployed mechanism). Firstly, given the absence of a mathematical model of consensus, an analysis of the existing models, with special emphasis on their correlation with the real protocol, is presented. Some weakness are identified and possible solutions are proposed. The use of stochastic geometry tools allows us to obtain analytical results where other techniques cannot. Secondly, we address the problem of lack of QoS in CSMA and we propose two different mechanisms that guarantee a minimum rate for each accepted transmission. Both take the interference level into account to decide on the set of connections which can access the shared channel at any given time. The main difference between them is the possibility or not of adjusting the transmission power of the nodes. The main aim of our study is to identify which of the proposed mechanisms outperforms CSMA best depending on the scenario. 5 pa st el -0 00 05 85 3, v er si on 1 8 M ar 2 01 0

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Directeur De These

................................................................................................................... 8 Résumé ................................................................................................................... 10 Introduction........................................................................................................... 12 Motivation of research ..........

متن کامل

Silent Communication: whispered speech-to-clear speech conversion. (Communication silencieuse: conversion de la parole chuchotée en parole claire)

................................................................................................................... 8 Résumé ................................................................................................................... 10 Introduction........................................................................................................... 12 Motivation of research ..........

متن کامل

Jurdjevic-Quinn Conditions and Discontinuous Bounded Damping Control

RÉSUMÉ. Sous les hypothèses requises, on étudie une version discontinue des lois de contrôle dites “amortissantes” ou encore “de Jurdjevic-Quinn”. On présente un résultat de stabilisation pratique lorsque la borne sur les contrôles est suffisamment petite. La motivation est d’estimer sa croissance du temps qu’il faut pour atteindre un voisinage donné de la cible quand la susdites borne tend ver...

متن کامل

Typing Secure Information Flow: Declassification and Mobility

xvii Résumé (in French) xix Synthèse (in French) xxi Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Typage du flux d’information sûr . . . . . . . . . . . . . . . . . . xxi Problèmes abordés . . . . . . . . . . . . . . . . . . . . . . . . . . xxii Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiv Contenu de la thèse . . . . . . . . . ...

متن کامل

Design Methodology for High-performance Circuits Based on Automatic Optimization Methods

........................................................................................................................... v Acknowledgements ........................................................................................................ vii Glossary ........................................................................................................................... ix List of F...

متن کامل

User Motivation to Explore Enterprise System Features: An Exploratory Study of Its Organizational Antecedents and Consequences

To attain the strategic goal of deriving competitive advantage from Enterprise System (ES) adoption, organizations rely on users’ exploration of the system features and eventually integrating the system application tightly with job tasks. Research on how to align users’ interest with the organization’s strategic goal and enhance user motivation to explore ES features is of great significance bu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010