The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traffic aggregation in large-scale and multi-hopping wireless sensor networks (WSN) can generate a high load on some intermediate nodes that are close to the access point (sink) due to packet relaying, especially in complex in-door environment. This can result in over-burdened sensor nodes exhausting their batteries resulting in more frequent need replacement. This paper studies the characteristics...
Wireless Mesh Network is mainly used to obtain Internet access, so most of the traffic converges to gateways. Due to the nature characteristic of WMN traffic model, gateways unavoidably become the bottleneck of the whole network. An anycast-based gateway selection model was proposed in this paper to solve the gateway selection problem. In this model, all the gateway nodes were abstracted as an anycast...
This paper presents an Equivalent-Figure-of-Merit (EFOM) for designing and evaluating a wireless system towards low power and high performance. Relevant factors like delay, minimum latency, overhead length of a package, package length, data rate, bit-error-rate (BER), pre-receiving time of the receiver, average duty cycle and electronics performance factor are synthesized within a unique model. Comparing...
Network-assisted diversity multiple access (NDMA) was recently developed to resolve collision and achieve high throughput. The blind NDMA method using independent component analysis (ICA), named ICA-NDMA, has been shown to overcome the difficulties of synchronization and orthogonal identification codes required by the training-based NDMA protocols. In this paper, we propose a novel blind collision...
In view of the functions and requirements of the encrypted traffic adaptive wireless image sensor network based on 6LoWPAN, this paper presents a new scheme of IPV6 header compression which improves the compression ratio of the IPv6 header. Then a modified S-MAC protocol is presented for traffic adaptation and its performance is tested with NS2. The simulation results show that the energy efficiency,...
The efficiency of power saving mechanism on wireless communications will influence the time the mobile stations (MSs) can operate. Due to the characteristics of centralized control in WiMAX system, the sleeping period of each subscriber is dominated by a base station (BS) based on their service types, traffic loads, and expected sleeping periods. The power saving mechanism uses an exponential backoff...
In this paper, we introduce an extension of Stream Control transmission Protocol (SCTP) aiming for improving the efficiency of delay-sensitive transmission of multimedia data such MPEG-4 traffic. Briefly, our SCTP extension exploits one-way delay between SCTP endpoints, which allows the SCTP extension to retransmit lost packets selectively depending on whether the lost packets would still arrive before...
In recent years, voice over Internet Protocol (VoIP) has gained much attention in wireless local area networks (WLANs). Although IEEE 802.11e has been standardized to provide voice traffic with quality of service (QoS) support, the voice quality will still be severely degraded with a large amount of best-effort traffic generated by distributed coordination function (DCF) or enhanced distributed channel...
In this paper, cross-layer combining of an adaptive modulation-coding (AMC) scheme at the physical layer and the use of automatic repeat request (ARQ) retransmissions at the medium access control (MAC) layer is integrated into the design of scheduling for multi-user wireless networks. A class of scheduling algorithms capable of jointly collecting retransmission diversity and multi-user diversity are...
Security association established by authentication schemes enables wireless networks resilient from external attacks. However, an enhanced security guarantee will influence network performance more or less. In this paper, we observe the detailed actions of a security association in the procedure of establishment and shift, in a wireless mesh network (WMN), i.e. a typical multi-hop network. To investigate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.