- Capitalizing On Big Data: Managed Services Help Financial Firms Accelerate Big Data Projects
- Freelance Management Systems: A Guide to Getting Started
- Driving Growth with the Anytime-Anywhere Mobile Workforce
- [eGuide] Designing a Continuous Response Architecture
- Supply Chain in the Cloud: Looking Beyond TCO
January 2008- QoS provision in multi-hop IEEE 802.11 networks is very challenging due to the interference nature of wireless medium and the contention-based behavior among neighboring nodes. In such networks, one of the key questions for QoS support is: given a specific topology and traffic condition, how much bandwidth can be utilized along a path in the network without violating QoS demand of existing traffic? In this paper from IEEE, an analytical model for multi-hop IEEE 802.11 networks is ...
January 2008- To deploy reliable wireless coverage for employees attending offsite conferences and events, Intel IT developed guidelines for working with service providers and then measured the benefits. Offering wireless fidelity (or Wi-Fi, as the 802.11 Wireless LAN (WLAN) standard is referred to) reduces support costs and increases productivity by offering a fast, stable, reliable network that allows attendees to connect virtually anywhere at the event. Designing and managing an enterprise-grade WLAN for an event is a significant ...
January 2008- This paper presents measurements made using an 802.11e wireless testbed. The researchers demonstrate experimentally how the new 802.11e QoS parameters behave in their testbed. They describe the testing methodology used to validate the operation of the 802.11e TXOP, AIFS and CWmin parameters and compare the experimental results to existing analytical models. This paper also discusses a number of practical issues encountered during measurements.
January 2008- This paper deals with the systematic analysis and modeling results of TCP Reno, Vegas and Veno algorithms in the IEEE 802.11b networks link. The dependence of TCP session throughput on random packet losses and lengthy delays emerging as link layer reliable protocols are used, is analyzed. The modeling results demonstrate that if random packet losses are very frequent the TCP Veno algorithm should be used, and if random delay is lengthy the TCP Reno should ...
January 2008- Wireless Local Area Networks (WLANs) using the IEEE 802.11 standard are now in widespread use. As in the wider Internet, the large bulk of traffic on a typical WLAN consists of applications such as web browsing that are carried over the TCP transport protocol. This paper, analyzes the throughput of TCP, as a function of the number of flows, when transmitted over an IEEE 802.11 WLAN. There have been a number of important models developed for ...
January 2008- This research paper from Universitat Basel considers the well known problem of TCP capture in mobile ad hoc networks, which is an unfair distribution of network bandwidth between TCP flows. The conventional way of analysis of TCP performance in wireless networks is to consider multiple flows in a network with perfect connectivity. In the majority of existing approaches that target solution to the TCP capture problem the effect of long range interferences is neglected.
January 2008- Infrastructures are often considered as large-scale projects best attempted by large entities: governments build roads and telecommunications companies provide phones. But historically, rural co-ops built roads, and farmers provided their own phones - although sometimes not very good ones. The paper employs empirical research on three case studies sampled for functional contrast (after Yin, 1994) across the areas of discovery, development, and provision. For network discovery, it analyzes Warchalking and Wi-Fi mapping as a low-tech, cooperative ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services