Information theory

Network throughput

Network throughput (or just throughput, when in context) refers to the rate of message delivery over a communication channel, such as Ethernet or packet radio, in a communication network. The data that these messages contain may be delivered over physical or logical links, or through network nodes. Throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets per second (p/s or pps) or data packets per time slot. The system throughput or aggregate throughput is the sum of the data rates that are delivered to all terminals in a network. Throughput is essentially synonymous to digital bandwidth consumption; it can be determined numerically by applying the queueing theory, where the load in packets per time unit is denoted as the arrival rate (λ), and the drop in packets per unit time is denoted as the departure rate (μ). The throughput of a communication system may be affected by various factors, including the limitations of the underlying analog physical medium, available processing power of the system components, end-user behavior, etc. When taking various protocol overheads into account, the useful rate of the data transfer can be significantly lower than the maximum achievable throughput; the useful part is usually referred to as goodput. (Wikipedia).

Video thumbnail

the Internet (part 2)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

Computer Literacy - (unit 4) - the internet - 1 of 4

Forth unit of a series for newbie computer users. See http://proglit.com/computer-skills/ for additional information and material.

From playlist Computer Literacy - (unit 4) - the internet

Video thumbnail

Computer Literacy - (unit 4) - the internet - 2 of 4

Forth unit of a series for newbie computer users. See http://proglit.com/computer-skills/ for additional information and material.

From playlist Computer Literacy - (unit 4) - the internet

Video thumbnail

the Internet (part 1)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

Networks: What is a LAN?

We're busy people who learn to code, then practice by building projects for nonprofits. Learn Full-stack JavaScript, build a portfolio, and get great references with our open source community. Join our community at https://freecodecamp.com Follow us on twitter: https://twitter.com/freecod

From playlist Networks

Video thumbnail

Star Network - Intro to Algorithms

This video is part of an online course, Intro to Algorithms. Check out the course here: https://www.udacity.com/course/cs215.

From playlist Introduction to Algorithms

Video thumbnail

Network Security, Part 1 : Basic Encryption Techniques

Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.

From playlist Network Security

Video thumbnail

18. MAC protocols

MIT 6.02 Introduction to EECS II: Digital Communication Systems, Fall 2012 View the complete course: http://ocw.mit.edu/6-02F12 Instructor: Hari Balakrishnan This lecture focuses on shared media networks and shared communications channels. Measures for optimization such as utilization, fa

From playlist MIT 6.02 Introduction to EECS II: Digital Communication Systems, Fall 2012

Video thumbnail

Lec 8 | MIT 6.033 Computer System Engineering, Spring 2005

Performance View the complete course at: http://ocw.mit.edu/6-033S05 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu

From playlist MIT 6.033 Computer System Engineering, Spring 2005

Video thumbnail

23C3: How to squeeze more performance out of your wifi

Speaker: Achim Friedland Cross-layer optimization strategies for long-range IEEE 802.11e based radio (mesh) networks Most of today's long-range wireless mesh or point-to-point links suffer from a high overhead during channel access, frequent link failtures and the lack of taking a real

From playlist 23C3: Who can you trust

Video thumbnail

Increasing AI productivity and efficiency (sponsored by Habana Labs) - Eitan Medina

Eitan Medina details transformational advances made possible with AI processors designed from the ground up to address AI-specific computing requirements, chief among them increasing AI throughput speeds while lowering power consumption. This new class of AI processing brings significantly

From playlist The O'Reilly Artificial Intelligence Conference 2019, Beijing, China

Video thumbnail

CERIAS Security: Exploiting Opportunistic Scheduling in Cellular Data Networks 4/5

Clip 4/5 Speaker: Hao Chen · Assistant Professor · University of California, Davis Third Generation (3G) cellular networks utilize time-varying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to efficiently utilize spectrum un

From playlist The CERIAS Security Seminars 2008

Video thumbnail

CERIAS Security: Exploiting Opportunistic Scheduling in Cellular Data Networks 1/5

Clip 1/5 Speaker: Hao Chen · Assistant Professor · University of California, Davis Third Generation (3G) cellular networks utilize time-varying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to efficiently utilize spectrum un

From playlist The CERIAS Security Seminars 2008

Video thumbnail

GRCon20 - Data Streaming from SDR to Servers for Cognitive Radar and EW

Presented by Abhay Samant and David Asplund at GNU Radio Conference 2020 https://gnuradio.org/grcon20 GPUs are becoming increasingly popular as the compute platform for digital signal processing algorithms in cognitive radar and EW applications. Traditionally, it has been challenging to c

From playlist GRCon 2020

Video thumbnail

22. Sliding window analysis, Little's law

MIT 6.02 Introduction to EECS II: Digital Communication Systems, Fall 2012 View the complete course: http://ocw.mit.edu/6-02F12 Instructor: Hari Balakrishnan This lecture continues with an analysis of sliding window protocol and how it handles packet loss. Little's Law is introduced to re

From playlist MIT 6.02 Introduction to EECS II: Digital Communication Systems, Fall 2012

Video thumbnail

21. Reliable transport

MIT 6.02 Introduction to EECS II: Digital Communication Systems, Fall 2012 View the complete course: http://ocw.mit.edu/6-02F12 Instructor: Hari Balakrishnan This lecture covers implementation of TCP and providing reliable data transfer. The stop-and-wait and sliding window protocols are

From playlist MIT 6.02 Introduction to EECS II: Digital Communication Systems, Fall 2012

Video thumbnail

Yafeng Yin: "Rhythmic Traffic Management and Control in Fully Automated Vehicle Environment"

Mathematical Challenges and Opportunities for Autonomous Vehicles 2020 Workshop III: Large Scale Autonomy: Connectivity and Mobility Networks "Rhythmic Traffic Management and Control in Fully Automated Vehicle Environment" Yafeng Yin - University of Michigan Abstract: In this talk, we pr

From playlist Mathematical Challenges and Opportunities for Autonomous Vehicles 2020

Related pages

Fair queuing | Capacitance | Point-to-multipoint communication | American wire gauge | Channel capacity | Communication channel | Queueing theory | Traffic generation model | Signal-to-noise ratio | Byte | Infinity | Binary multiplier | Decimal prefix | Fast Fourier transform