962 resultados para RWMA QOS TCP ritrasmissione OMNET INET AccessPoint MAC


Relevância:

20.00% 20.00%

Publicador:

Resumo:

OBJETIVO: Avaliar a importância da interação entre a integrina Mac-1 dos leucócitos (a Mb 2) e a glicoproteína (GP) Iba das plaquetas para o recrutamento de leucócitos após a lesão vascular e o efeito da neutralização da interação Mac-1-GPIba sobre a proliferação celular e a hiperplasia neointimal desencadeadas por lesão vascular. MÉTODOS: Um peptídeo denominado M2 ou anticorpo anti-M2 foi desenvolvido para bloquear a interação Mac-1-GPIba . Esse peptídeo foi injetado e comparado com anticorpo-controle em camundongos C57B1/6J submetidos a lesão vascular da artéria femoral com corda-guia. Um, cinco ou 28 dias após a lesão vascular, as artérias femorais foram retiradas para a realização de morfometria e imuno-histoquímica. RESULTADOS: O bloqueio da interação Mac-1-GPIba promoveu uma redução estatisticamente significativa do número de leucócitos na camada média no primeiro dia após a lesão vascular (controle: 7,9±5,0% do total de células versus anti-M2: 2,0±1,6%, p=0,021), bem como determinou uma diminuição estatisticamente significativa do acúmulo de leucócitos na neoíntima em cinco e 28 dias (controle: 42,3±12,9% versus anti-M2: 24,6±10,8%, p=0,047 e controle: 7,9±3,0% versus anti-M2: 3,3±1,3%, p=0,012; respectivamente). A proliferação celular na camada média do vaso em cinco dias pós-lesão foi reduzida com o bloqueio da interação Mac-1-GPIba (controle: 5,0±2,9% do total de células versus anti-M2: 1,8±0,5%; p=0,043), assim como houve diminuição significativa da proliferação celular na camada íntima do vaso em 28 dias (controle: 3,8±1,7% versus anti-M2: 2,0±1,2%; p=0,047). O bloqueio da interação Mac-1-GPIba também determinou uma redução estatisticamente significativa do espessamento intimal em 28 dias pós-lesão (controle: 10.395±3.549 µm² versus anti-M2: 4.561±4.915 µm²; p=0,012). CONCLUSÃO: O recrutamento de leucócitos após a lesão vascular é dependente da interação Mac-1-GPIba e a neutralização dessa interação inibe a proliferação celular e a formação neointimal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

QoS, MANET, Ad-hoc networks, Simulation, wireless communication

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In IP networks, most of packets, that have been dropped, are recovered after the expiration of retransmission timeouts. These can result in unnecessary retransmissions and needless reduction of congestion window. An inappropriate retransmission timeout has a huge impact on TCP performance. In this paper we have proved that CSMA/CA mechanism can cause TCP retransmissions due to CSMA/CA effects. For this we have observed three wireless connections that use CSMA/CA: with good link quality, poor link quality and in presence of cross traffic. The measurements have been performed using real devices. Through tracking of each transmitted packet it is possible to analyze the relation between one-way delay and packet loss probability and the cumulative distribution of distances between peaks of OWDs. The distribution of OWDs and the distances between peaks of OWDs are the most important parameters of tuning TCP retransmission timeout on CSMA/CA networks. A new perspective through investigating the dynamical relation between one-way delay and packet loss ratio depending on the link quality to enhance the TCP performance has been provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Em continuação as pesquisas que vimos realizando nos Embiídeos é feito um estudo comparado das peças bucais entre machos e fêmeas de Embolyntha batesi. A cabeça é prognata recoberta por diminutas cerdas. É a região mais resistente do inseto, devido proteger, além de outros órgãos, principalmente, o sistema nervoso. Varia de tamanho nos dois sexos com os índices (comprimento : largura) na fêmea de 1,06 e nos machos de 1,36; a cabeça da fêmea é achatada, enquanto que a dos machos é alongada. Quase tôdas as suturas são visíveis nos sexos, com excessão de algumas, como é o caso da coronal e post-frontal dos machos. De tôdas as suturas, a temporal é a mais interessante, limita a região do vertex com as genas, ao mesmo tempo que origina um sulco profundo, que penetra na cápsula craniana fazendo parte do esqueleto interno da cabeça, e sendo responsável pelo aspecto diferente das mesmas. A sutura temporal, na região ventral, separa as genas das subgenas. A sutura hipostomal, em ambos os sexos, é muito acentuada, e na sua parte mais interna, vêm se inserir os ramos posteriores do tentório, e, ainda lateralmente, as maxilas. O tentório é primitivo, tendo um corpo central, de forma quadrangular e, de cada ângulo parte um ramo; dois anteriores, menores, que se dirigem para a região dorsal onde se bifurcam, indo ter próximo á base das antenas e mandíbulas, e dois ramos posteriores que seguem a direção ventral, indo ter á região hipostomal. As antenas são filiformes, variando o número de segmentos. Os olhos dos machos são reniformes, salientes e grandes, enquanto que os das fêmeas são pequenos, ovais e achatados. O número de omatídeos de macho é 34, e, na fêmea é 41, em uma determinada área. O clípeo quase não se diferencia da fronte, porém encontra-se dividido em anti-clípeo e post-clípeo. A sutura do clípeo-labro é bem acentuada, deixando transparecer, após a diafanização do material, um espessamento da cutícula na sua região mais interna, destinada a implantação dos músculos que movimentam o labro. Na parte ventral o labro apresenta sensilas, que variam quanto a forma, tamanho e estrutura nos dois sexos. As mandíbulas apresentam-se muito diferentes devida sua função, isto é, trituradora nas fêmeas e preensora nos machos. Pela simples morfologia das mandíbulas podemos identificar o sexo nos Embiídeos. Em ambos temos dentes incisivos e molares, porém mais acentuados nas fêmeas. Nos machos a região interna da mandíbula tem a forma côncava, com cutícula...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Estudi realitzat a partir d’una estada al laboratori LSR (Logiciels, Systèmes, Réseaux) – IMAG a Grenoble, França, entre els mesos de setembre del 2005 i febrer del 2006. El grup de recerca Drakkar d’aquest laboratori va desenvolupar un nou mecanisme d’accés al medi per a xarxes d’àrea local sense fils (WLAN) anomenat Idle Sense. S’ha avaluat aquest mecanisme en entorns cel·lulars i s’ha comparat del seu comportament amb l’estàndard IEEE 802.11 DCF mitjançant la implementació en un simulador. En els entorns cel·lulars es troben condicions de transmissió molt allunyades de les ideals, i de les analitzades fins al moment, que consisteixen en escenaris formats per una única cel·la aïllada. Per aquest motiu, primer s’ha estudiat els mecanismes d’accés al medi d’Idle Sense en una cel·la i en condicions de transmissió adverses. Després, s’ha estudiat en entorns multicel·lulars, on les comunicacions entre estacions es veuen influenciades pel problema de solapament de cel·les i per les interferències provocades per les transmissions d’estacions d’altres cel·les. També s’ha comparat els resultats obtinguts amb el comportament d’IEEE 802.11 DCF i d’altres propostes de millora: Asymptotically Optimal Backoff (AOB) i Slow Decrease. Finalment, s’ha realitzat una modificació sobre Idle Sense, que s’ha anomenat Weighted Idle Sense, que resulta més adecuat per a treballar en xarxes d’àrea local sense fils en mode infraestructura.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aquest projecte es basa en l'estudi de l'oferiment de qualitat de servei en xarxes wireless i satel·litals. Per això l'estudi de les tècniques de cross-layer i del IEEE 802.11e ha sigut el punt clau per al desenvolupament teòric d’aquest estudi. Usant el simulador de xarxes network simulator, a la part de simulacions es plantegen tres situacions: l'estudi de la xarxa satel·lital, l'estudi del mètode d'accés HCCA i la interconnexió de la xarxa satel·lital amb la wireless. Encara que aquest últim punt, incomplet en aquest projecte, ha de ser la continuació per a futures investigacions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bicotylophora trachinoti (Mac Callum, 1921) from Trachinotus carolinus L.; Pseudanthocotyloides heterocotyle (Van Beneden, 1871) from Cetengraulis edentulus (Cuvier), and Decapterus punctatus (Cuvier), new host records; Pseudomazocraes selene Hargis, 1957 from Selene vomer (L.) and Caranx latus Agassiz, new host record, are reported for the first time in Brazil from the coast of Rio de Janeiro State. The marine fishes Diplectrum sp. and Pomatomus saltatrix (L.) are respectively new host records for Pseudotagia cupida (Hargis, 1956) and Macrovalvitrema sinaloense Caballero & Bravo Hollis, 1955. Measurements, original figures and photos in scanning electron microscopy of B. trachinoti are presented. The egg with filaments is reffered for the first time in the genus Pseudanthocotyloides.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In order to successfully deploy multicast services in QoS-aware networks, pricing architectures must take into account the particular characteristics of multicast sessions. With this objective, we propose a charging scheme for QoS multicast services, assuming that the unicast cost of each interconnecting link is determined and that such cost is expressed in terms of quality of service (QoS) parameters. Our scheme allows determining the cost distribution of a multicast session along a cost distribution tree (CDT), and basing such distribution in those pre-existing unicast cost functions. The paper discusses in detail the main characteristics of the problem in a realistic interdomain scenario and how the proposed scheme would contribute to its solution

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a new charging scheme for cost distribution along a point-to-multipoint connection when destination nodes are responsible for the cost. The scheme focus on QoS considerations and a complete range of choices is presented. These choices go from a safe scheme for the network operator to a fair scheme to the customer. The in-between cases are also covered. Specific and general problems, like the incidence of users disconnecting dynamically is also discussed. The aim of this scheme is to encourage the users to disperse the resource demand instead of having a large number of direct connections to the source of the data, which would result in a higher than necessary bandwidth use from the source. This would benefit the overall performance of the network. The implementation of this task must balance between the necessity to offer a competitive service and the risk of not recovering such service cost for the network operator. Throughout this paper reference to multicast charging is made without making any reference to any specific category of service. The proposed scheme is also evaluated with the criteria set proposed in the European ATM charging project CANCAN

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a charging scheme for cost distribution along a multicast tree when cost is the responsibility of the receivers. This scheme focuses on QoS considerations and it does not depend on any specific type of service. The scheme has been designed to be used as a bridge between unicast and multicast services, solving the problem of charging multicast services by means of unicast charging and existing QoS routing mechanisms. We also include a numerical comparison and discussions of the case of non-numerical or relative QoS and on the application to some service examples in order to give a better understanding of the proposal

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper a novel methodology aimed at minimizing the probability of network failure and the failure impact (in terms of QoS degradation) while optimizing the resource consumption is introduced. A detailed study of MPLS recovery techniques and their GMPLS extensions are also presented. In this scenario, some features for reducing the failure impact and offering minimum failure probabilities at the same time are also analyzed. Novel two-step routing algorithms using this methodology are proposed. Results show that these methods offer high protection levels with optimal resource consumption

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IP based networks still do not have the required degree of reliability required by new multimedia services, achieving such reliability will be crucial in the success or failure of the new Internet generation. Most of existing schemes for QoS routing do not take into consideration parameters concerning the quality of the protection, such as packet loss or restoration time. In this paper, we define a new paradigm to develop new protection strategies for building reliable MPLS networks, based on what we have called the network protection degree (NPD). This NPD consists of an a priori evaluation, the failure sensibility degree (FSD), which provides the failure probability and an a posteriori evaluation, the failure impact degree (FID), to determine the impact on the network in case of failure. Having mathematical formulated these components, we point out the most relevant components. Experimental results demonstrate the benefits of the utilization of the NPD, when used to enhance some current QoS routing algorithms to offer a certain degree of protection

Relevância:

20.00% 20.00%

Publicador:

Resumo:

TCP flows from applications such as the web or ftp are well supported by a Guaranteed Minimum Throughput Service (GMTS), which provides a minimum network throughput to the flow and, if possible, an extra throughput. We propose a scheme for a GMTS using Admission Control (AC) that is able to provide different minimum throughput to different users and that is suitable for "standard" TCP flows. Moreover, we consider a multidomain scenario where the scheme is used in one of the domains, and we propose some mechanisms for the interconnection with neighbor domains. The whole scheme uses a small set of packet classes in a core-stateless network where each class has a different discarding priority in queues assigned to it. The AC method involves only edge nodes and uses a special probing packet flow (marked as the highest discarding priority class) that is sent continuously from ingress to egress through a path. The available throughput in the path is obtained at the egress using measurements of flow aggregates, and then it is sent back to the ingress. At the ingress each flow is detected using an implicit way and then it is admission controlled. If it is accepted, it receives the GMTS and its packets are marked as the lowest discarding priority classes; otherwise, it receives a best-effort service. The scheme is evaluated through simulation in a simple "bottleneck" topology using different traffic loads consisting of "standard" TCP flows that carry files of varying sizes

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A survey of MPLS protection methods and their utilization in combination with online routing methods is presented in this article. Usually, fault management methods pre-establish backup paths to recover traffic after a failure. In addition, MPLS allows the creation of different backup types, and hence MPLS is a suitable method to support traffic-engineered networks. In this article, an introduction of several label switch path backup types and their pros and cons are pointed out. The creation of an LSP involves a routing phase, which should include QoS aspects. In a similar way, to achieve a reliable network the LSP backups must also be routed by a QoS routing method. When LSP creation requests arrive one by one (a dynamic network scenario), online routing methods are applied. The relationship between MPLS fault management and QoS online routing methods is unavoidable, in particular during the creation of LSP backups. Both aspects are discussed in this article. Several ideas on how these actual technologies could be applied together are presented and compared