The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Licensed-Assisted Access Long-Term Evolution (LAA- LTE) framework can offload excessive data stream to the unlicensed spectrum. Devices from different operators will compete for the same band and have to endure a more complex and congested channel conditions. Therefore a rapid and efficient access mechanism should be introduced in the LAA framework. Based on the Type B LBT channel access scheme, this...
Millimeter wave (mmWave) communication has been a promising technology of future fifth generation (5G) cellular networks. Due to the tremendous propagation loss of mmWave communication, device-to-device (D2D) communications are widely used over directional mmWave networks to improve the network throughput. In this paper, a new time resource sharing scheme is proposed based on Stackelberg game for...
Passive optical network (PON) deployment requires significant capital and operational costs for operators to provide high network capacity and significant geographic coverage. Network sharing is desirable for operators to reduce the investment needed to deploy and operate PON networks. In this paper, we introduce a bandwidth resource sharing framework for XG-PONs among multiple operators. In this...
In this paper, we study a wireless-powered cooperative relaying system which consists of a source node (SN), a relay node (RN) and a destination node (DN). The RN has no embedded power supply, thus it needs to harvest energy from the radio signal transmitted by a power beacon (PB) which is responsible for charging the RN before forwarding the information to the DN. In addition, we assume that the...
In this paper, we investigate energy cooperation among sustainable cooperative relay nodes, which adopt decode- and-forward (DF) relaying. The relay nodes work on either information decoding (ID) mode or energy harvesting (EH) mode when receiving the signal from the source. Due to different harvested energy at the relay nodes, effective energy cooperation can benefit the energy efficiency, but suffer...
With the increasing demand for higher performance wireless local area networks (WLANs), channel bonding was first proposed in the IEEE 802.11n protocol to offer a higher data rate by combining two 20 MHz channels into one 40 MHz channel. Although much has been understood about channel bonding management, hardly any of these innovations have made it into today's IEEE 802.11 WLANs in a distributed manner...
A high performance table-based architecture implementation for CRC (cyclic redundancy check) algorithms is proposed. The architecture is designed based on a highly parallel CRC algorithm. The algorithm first divides a given message with any length into bytes. Then it performs CRC computation using lookup tables among the divided bytes in parallel. At last, the results are XORed to obtain the CRC value...
In this paper, we investigate the random access for an energy harvesting secondary user (SU) in a cognitive radio system, in which the SU harvests energy from radio frequency (RF) radiation of the primary user (PU). With multipacket reception channel model, the SU can increase its throughput through not only utilizing the idle periods of the PU, but also opportunistically sharing the PU spectrum with...
Device-to-device (D2D) communication is known as a promising way to cope with the growing mobile video traffic, which may suffer from the short duration caused by the limited energy supply. In this paper, we propose a practical D2D cooperation framework based on distributed optimization to extend the video transmission duration. In the multi-path multi-hop D2D communication scenario, we effectively...
The network resource competition of today' data enters is extremely intense between long-lived elephant flows and latency-sensitive mice flows. Achieving both goals of high throughput and low latency respectively for the two types of flows requires compromise, which recent research has not successfully solved mainly due to the transfer of elephant and mice flows on shared links without any differentiation...
Previous work on 802.1 1x (Wi-Fi) power control have focused almost exclusively on the mitigation of interference from data frames. Since Wi-Fi wireless access points are increasingly ubiquitous, it is now common for an 802.1 1x client to be able to receive signals from more than 10 APs simultaneously in a modern urban operating environment. At such high densities, we found that the interference from...
The increase of antennas can greatly improve the performance of MIMO systems, in the meanwhile, the precise channel state information is difficult to obtain since the channel matrix of massive MIMO is much more complex than the traditional one. In this paper, we propose a limited feedback strategy named hybrid limited feedback with selective eigenvalue information (HLFSEI), which jointly considers...
In this paper, we propose an adaptive differential phase control codebook for limited feedback system in slowly time varying channels. In limited feedback system, channel state information is quantized with a given codebook. The spherical cap can be considered as the coverage of a given codebook where the overall channel space is multi-dimensional sphere. By changing the spherical cap radius properly...
Modular multiplication is the most crucial component in RSA cryptosystem. In this paper, we present a new modular multiplication architecture using the Strassen multiplication algorithm and Montgomery reduction. The architecture is different from the interleaved version of Montgomery multiplication traditionally used in RSA design. By selecting different bases of 16 or 24 bits, it could perform 8,192-bit...
This paper considers the problem of adjacent channel interference between two different operators using different duplexing methods. Focusing on the interference between two co-located base stations, which existing guard-band based methods still cannot solve efficiently, we propose a scheme that adjusts the downlink power of the aggressor system to maximize the downlink transmission capacity while...
In this paper, we investigate the TCP throughput performance enhancement for cognitive radio networks (CRNs) through lower-layer configurations. There is an interaction between TCP and the lower-layer operations. The TCP sending rate at the transport layer determines the packet arrival rate of the lower-layer buffer, and meanwhile it is influenced by the average round trip time and packet loss rate,...
Performance isolation is a key requirement for application-level multi-tenant sharing hosting environments. It requires knowledge of the resource consumption of the various tenants. It is of great importance not only to be aware of the resource consumption of a tenant's given kind of transaction mix, but also to be able to be aware of the resource consumption of a given transaction type. However,...
This paper investigates the resource allocation problem in a relay-aided cognitive radio (CR) system under the orthogonal frequency division multiplexing (OFDM) transmission. Different from the conventional CR resource allocation problem, the relay node here is capable of performing subcarrier permutation over two hops such that the signal received over a particular subcarrier is forwarded on a different...
Decentralized channel state information is utilized to design a multichannel access algorithm for uplink transmission with power adaptation. The base station does not coordinate the transmissions of mobile users and hence users employ random access transmission. The situation is modeled as a non-cooperative game, where mobile users attempt to maximize its individual throughput gain with the least...
It is well known that the pervasive IEEE 802.11 MAC is intrinsically unfair [1, 3]. In particular, in the topology shown in Fig. 1(a), when links AB and CD both carry backlogged transmissions, the packets from sender A experience persistent collisions at node B while sender C enjoys collision-free transmission to D. Node A can transmit successfully only if it is able to “insert” its packets into the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.