928 resultados para QUIC UDP TCP HTTP reti protocolli google
Resumo:
In 2008, a collaborative partnership between Google and academia launched the Google Online Marketing Challenge (hereinafter Google Challenge), perhaps the world’s largest in-class competition for higher education students. In just two years, almost 20,000 students from 58 countries participated in the Google Challenge. The Challenge gives undergraduate and graduate students hands-on experience with the world’s fastest growing advertising mechanism, search engine advertising. Funded by Google, students develop an advertising campaign for a small to medium sized enterprise and manage the campaign over three consecutive weeks using the Google AdWords platform. This article explores the Challenge as an innovative pedagogical tool for marketing educators. Based on the experiences of three instructors in Australia, Canada and the United States, this case study discusses the opportunities and challenges of integrating this dynamic problem-based learning approach into the classroom.
Resumo:
The network scenario is that of an infrastructure IEEE 802.11 WLAN with a single AP with which several stations (STAs) are associated. The AP has a finite size buffer for storing packets. In this scenario, we consider TCP controlled upload and download file transfers between the STAs and a server on the wireline LAN (e.g., 100 Mbps Ethernet) to which the AP is connected. In such a situation, it is known (see, for example, (3), [9]) that because of packet loss due to finite buffers at the Ap, upload file transfers obtain larger throughputs than download transfers. We provide an analytical model for estimating the upload and download throughputs as a function of the buffer size at the AP. We provide models for the undelayed and delayed ACK cases for a TCP that performs loss recovery only by timeout, and also for TCP Reno.
Resumo:
The increasing rate of pregnancies in teenagers and the high incident of the infections of sexual transmission (HIV/ AIDS, for example), these are health related issues (and especially the sexual and reproductive health), which have received great attention on the part of investigators and of the public opinion in general. Recently, there has been evidenced that teenagers carry out very easily risk sexual behaviors, and those who have not presented the above mentioned behaviors also show high levels of intention to carry out them. There is the hypothesis that besides cognitive variables such as attitudes, subjective norms, perceived behavioral control and intention, the personality of the young persons is an aspect that plays an important paper in their sexual and reproductive health. Significant correlations were found between the variales of the TPB and the personality traits; the results suggest that the direction of these correlations is associated with the specific type of behavior or situation that is assessed. Keywords: personality, theory of planned behavior, adolescents, reproductive sexuality.
Resumo:
Bringing a social interaction approach to children’s geographies to investigate how children accomplish place in everyday lives, we draw on ethnomethodological and conversation analytic approaches that recognize children’s competence to manipulate their social and digital worlds. An investigation of preschool-aged children engaged with Google Earth™ shows how they both claimed and displayed technological understandings and practices such as maneuvering the mouse and screen, and referenced place through relationships with local landmarks and familiar settings such as their school. At times, the children’s competing agendas required orientation to each other’s ideas, and shared negotiation to come to resolution. A focus on children’s use of digital technologies as they make meaning of the world around them makes possible new understandings of place within the geographies of childhood and education.
Resumo:
The ever expanding growth of the wireless access to the Internet in recent years has led to the proliferation of wireless and mobile devices to connect to the Internet. This has created the possibility of mobile devices equipped with multiple radio interfaces to connect to the Internet using any of several wireless access network technologies such as GPRS, WLAN and WiMAX in order to get the connectivity best suited for the application. These access networks are highly heterogeneous and they vary widely in their characteristics such as bandwidth, propagation delay and geographical coverage. The mechanism by which a mobile device switches between these access networks during an ongoing connection is referred to as vertical handoff and it often results in an abrupt and significant change in the access link characteristics. The most common Internet applications such as Web browsing and e-mail make use of the Transmission Control Protocol (TCP) as their transport protocol and the behaviour of TCP depends on the end-to-end path characteristics such as bandwidth and round-trip time (RTT). As the wireless access link is most likely the bottleneck of a TCP end-to-end path, the abrupt changes in the link characteristics due to a vertical handoff may affect TCP behaviour adversely degrading the performance of the application. The focus of this thesis is to study the effect of a vertical handoff on TCP behaviour and to propose algorithms that improve the handoff behaviour of TCP using cross-layer information about the changes in the access link characteristics. We begin this study by identifying the various problems of TCP due to a vertical handoff based on extensive simulation experiments. We use this study as a basis to develop cross-layer assisted TCP algorithms in handoff scenarios involving GPRS and WLAN access networks. We then extend the scope of the study by developing cross-layer assisted TCP algorithms in a broader context applicable to a wide range of bandwidth and delay changes during a handoff. And finally, the algorithms developed here are shown to be easily extendable to the multiple-TCP flow scenario. We evaluate the proposed algorithms by comparison with standard TCP (TCP SACK) and show that the proposed algorithms are effective in improving TCP behavior in vertical handoff involving a wide range of bandwidth and delay of the access networks. Our algorithms are easy to implement in real systems and they involve modifications to the TCP sender algorithm only. The proposed algorithms are conservative in nature and they do not adversely affect the performance of TCP in the absence of cross-layer information.
Resumo:
The TCP protocol is used by most Internet applications today, including the recent mobile wireless terminals that use TCP for their World-Wide Web, E-mail and other traffic. The recent wireless network technologies, such as GPRS, are known to cause delay spikes in packet transfer. This causes unnecessary TCP retransmission timeouts. This dissertation proposes a mechanism, Forward RTO-Recovery (F-RTO) for detecting the unnecessary TCP retransmission timeouts and thus allow TCP to take appropriate follow-up actions. We analyze a Linux F-RTO implementation in various network scenarios and investigate different alternatives to the basic algorithm. The second part of this dissertation is focused on quickly adapting the TCP's transmission rate when the underlying link characteristics change suddenly. This can happen, for example, due to vertical hand-offs between GPRS and WLAN wireless technologies. We investigate the Quick-Start algorithm that, in collaboration with the network routers, aims to quickly probe the available bandwidth on a network path, and allow TCP's congestion control algorithms to use that information. By extensive simulations we study the different router algorithms and parameters for Quick-Start, and discuss the challenges Quick-Start faces in the current Internet. We also study the performance of Quick-Start when applied to vertical hand-offs between different wireless link technologies.
Resumo:
With the proliferation of wireless and mobile devices equipped with multiple radio interfaces to connect to the Internet, vertical handoff involving different wireless access technologies will enable users to get the best of connectivity and service quality during the lifetime of a TCP connection. A vertical handoff may introduce an abrupt, significant change in the access link characteristics and as a result the end-to-end path characteristics such as the bandwidth and the round-trip time (RTT) of a TCP connection may change considerably. TCP may take several RTTs to adapt to these changes in path characteristics and during this interval there may be packet losses and / or inefficient utilization of the available bandwidth. In this thesis we study the behaviour and performance of TCP in the presence of a vertical handoff. We identify the different handoff scenarios that adversely affect TCP performance. We propose several enhancements to the TCP sender algorithm that are specific to the different handoff scenarios to adapt TCP better to a vertical handoff. Our algorithms are conservative in nature and make use of cross-layer information obtained from the lower layers regarding the characteristics of the access links involved in a handoff. We evaluate the proposed algorithms by extensive simulation of the various handoff scenarios involving access links with a wide range of bandwidth and delay. We show that the proposed algorithms are effective in improving the TCP behaviour in various handoff scenarios and do not adversely affect the performance of TCP in the absence of cross-layer information.
Resumo:
For many, particularly in the Anglophone world and Western Europe, it may be obvious that Google has a monopoly over online search and advertising and that this is an undesirable state of affairs, due to Google's ability to mediate information flows online. The baffling question may be why governments and regulators are doing little to nothing about this situation, given the increasingly pivotal importance of the internet and free flowing communications in our lives. However, the law concerning monopolies, namely antitrust or competition law, works in what may be seen as a less intuitive way by the general public. Monopolies themselves are not illegal. Conduct that is unlawful, i.e. abuses of that market power, is defined by a complex set of rules and revolves principally around economic harm suffered due to anticompetitive behavior. However the effect of information monopolies over search, such as Google’s, is more than just economic, yet competition law does not address this. Furthermore, Google’s collection and analysis of user data and its portfolio of related services make it difficult for others to compete. Such a situation may also explain why Google’s established search rivals, Bing and Yahoo, have not managed to provide services that are as effective or popular as Google’s own (on this issue see also the texts by Dirk Lewandowski and Astrid Mager in this reader). Users, however, are not entirely powerless. Google's business model rests, at least partially, on them – especially the data collected about them. If they stop using Google, then Google is nothing.
Resumo:
Resumo:
Angiosperms represent a huge diversity in floral structures. Thus, they provide an attractive target for comparative developmental genetics studies. Research on flower development has focused on few main model plants, and studies on these species have revealed the importance of transcription factors, such as MADS-box and TCP genes, for regulating the floral form. The MADS-box genes determine floral organ identities, whereas the TCP genes are known to regulate flower shape and the number of floral organs. In this study, I have concentrated on these two gene families and their role in regulating flower development in Gerbera hybrida, a species belonging to the large sunflower family (Asteraceae). The Gerbera inflorescence is comprised of hundreds of tightly clustered flowers that differ in their size, shape and function according to their position in the inflorescence. The presence of distinct flower types tells Gerbera apart from the common model species that bear only single kinds of flowers in their inflorescences. The marginally located ray flowers have large bilaterally symmetrical petals and non-functional stamens. The centrally located disc flowers are smaller, have less pronounced bilateral symmetry and carry functional stamens. Early stages of flower development were studied in Gerbera to understand the differentiation of flower types better. After morphological analysis, we compared gene expression between ray and disc flowers to reveal transcriptional differences in flower types. Interestingly, MADS-box genes showed differential expression, suggesting that they might take part in defining flower types by forming flower-type-specific regulatory complexes. Functional analysis of a CYCLOIDEA-like TCP gene GhCYC2 provided evidence that TCP transcription factors are involved in flower type differentiation in Gerbera. The expression of GhCYC2 is ray-flower-specific at early stages of development and activated only later in disc flowers. Overexpression of GhCYC2 in transgenic Gerbera-lines causes disc flowers to obtain ray-flower-like characters, such as elongated petals and disrupted stamen development. The expression pattern and transgenic phenotypes further suggest that GhCYC2 may shape ray flowers by promoting organ fusion. Cooperation of GhCYC2 with other Gerbera CYC-like TCP genes is most likely needed for proper flower type specification, and by this means for shaping the elaborate inflorescence structure. Gerbera flower development was also approached by characterizing B class MADS-box genes, which in the main model plants are known regulators of petal and stamen identity. The four Gerbera B class genes were phylogenetically grouped into three clades; GGLO1 into the PI/GLO clade, GDEF2 and GDEF3 into the euAP3 clade and GDEF1 into the TM6 clade. Putative orthologs for GDEF2 and GDEF3 were identified in other Asteraceae species, which suggests that they appeared through an Asteraceae-specific duplication. Functional analyses indicated that GGLO1 and GDEF2 perform conventional B-function as they determine petal and stamen identities. Our studies on GDEF1 represent the first functional analysis of a TM6-like gene outside the Solanaceae lineage and provide further evidence for the role of TM6 clade members in specifying stamen development. Overall, the Gerbera B class genes showed both commonalities and diversifications with the conventional B-function described in the main model plants.
Resumo:
The network scenario is that of an infrastructure IEEE 802.11 WLAN with a single AP with which several stations (STAs) are associated. The AP has a finite size buffer for storing packets. In this scenario, we consider TCP-controlled upload and download file transfers between the STAs and a server on the wireline LAN (e.g., 100 Mbps Ethernet) to which the AP is connected. In such a situation, it is well known that because of packet losses due to finite buffers at the AP, upload file transfers obtain larger throughputs than download transfers. We provide an analytical model for estimating the upload and download throughputs as a function of the buffer size at the AP. We provide models for the undelayed and delayed ACK cases for a TCP that performs loss recovery only by timeout, and also for TCP Reno. The models are validated incomparison with NS2 simulations.
Resumo:
We compute the throughput obtained by a TCP connection in a UMTS environment. For downloading data at a mobile terminal, the packets of each TCP connection are stored in separate queues at the base station (node B). Also due to fragmentation of the TCP packets into Protocol Data Units (PDU) and link layer retransmissions of PDUs there can be significant delays at the queue of the node B. In such a scenario the existing models of TCP may not be sufficient. Thus, we provide a new approximate TCP model and also obtain new closed-form expressions of mean window size. Using these we obtain the throughput of a TCP connection which matches with simulations quite well.
Resumo:
The legality of the operation of Google’s search engine, and its liability as an Internet intermediary, has been tested in various jurisdictions on various grounds. In Australia, there was an ultimately unsuccessful case against Google under the Australian Consumer Law relating to how it presents results from its search engine. Despite this failed claim, several complex issues were not adequately addressed in the case including whether Google sufficiently distinguishes between the different parts of its search results page, so as not to mislead or deceive consumers. This article seeks to address this question of consumer confusion by drawing on empirical survey evidence of Australian consumers’ understanding of Google’s search results layout. This evidence, the first of its kind in Australia, indicates some level of consumer confusion. The implications for future legal proceedings in against Google in Australia and in other jurisdictions are discussed.
Resumo:
With the increasing adoption of wireless technology, it is reasonable to expect an increase in file demand for supporting both real-time multimedia and high rate reliable data services. Next generation wireless systems employ Orthogonal Frequency Division Multiplexing (OFDM) physical layer owing, to the high data rate transmissions that are possible without increase in bandwidth. Towards improving file performance of these systems, we look at the design of resource allocation algorithms at medium-access layer, and their impact on higher layers. While TCP-based clastic traffic needs reliable transport, UDP-based real-time applications have stringent delay and rate requirements. The MAC algorithms while catering to the heterogeneous service needs of these higher layers, tradeoff between maximizing the system capacity and providing fairness among users. The novelly of this work is the proposal of various channel-aware resource allocation algorithms at the MAC layer. which call result in significant performance gains in an OFDM based wireless system.
Resumo:
Next generation wireless systems employ Orthogonal frequency division multiplexing (OFDM) physical layer owing to the high data rate transmissions that are possible without increase in bandwidth. While TCP performance has been extensively studied for interaction with link layer ARQ, little attention has been given to the interaction of TCP with MAC layer. In this work, we explore cross-layer interactions in an OFDM based wireless system, specifically focusing on channel-aware resource allocation strategies at the MAC layer and its impact on TCP congestion control. Both efficiency and fairness oriented MAC resource allocation strategies were designed for evaluating the performance of TCP. The former schemes try to exploit the channel diversity to maximize the system throughput, while the latter schemes try to provide a fair resource allocation over sufficiently long time duration. From a TCP goodput standpoint, we show that the class of MAC algorithms that incorporate a fairness metric and consider the backlog outperform the channel diversity exploiting schemes.