The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Applications of sensor networks in healthcare have undergone major changes in recent times. Implanted wireless sensor devices inside the human body to monitor the activities are a reality now. A new field called the Wireless Body Area Networks (WBAN or BAN) has emerged as a hot research area. To fulfill the needs for a common standard and solve the issues in this emerging field, IEEE has proposed...
In future B3G/4G communication systems, the special application of femtocell in the enterprise offices and public places has broad prospect. However, as the femtocell operation under such multi-femtocell environment is significantly different from that of usual residential femtocells, the femtocell configuration and optimization might be much more complex. One key issue is to find how will the femtocell...
Mobile sensor networks are attracting a lot of interests. In these networks, nodes not only have sensing capability but mobility as well. Therefore, a few sensor nodes can a cover larger sensing area by moving around. Additionally, dangerous areas where people cannot access, such as disaster sites or radiation-contaminated areas, can be searched by nodes moving around their sensing positions autonomously...
The provision of NEMO support based on an end-to-end protocol presents manageability challenges that are usually overcome delegating the signaling rights to the MR. In addition, whether the protocol is focused on establishing security associations, how these are rekeyed through a proxy-based process with no security threats should be solved. In this work we focus on the HIP protocol and analyze existing...
Many studies on Internet Service Provider (ISP) interconnection make simplifying assumptions on the implementation of the service provision. Our work explicitly models the ISP service that is provided to users that run peer-to-peer applications and it analyses the behavior of competing ISPs. The ISPs have agreed to peer each other and each ISP has purchased transit service from one Internet Backbone...
On one hand, the convergence of the Internet, Telecommunication and Broadcasting is generating new services over the Internet, and on the other hand, the online experience is getting improved via the introduction of user profile mobility and web session mobility. While different architectural schemes for HTTP session mobility have been proposed and implemented in the academia, the industry has introduced...
In this paper, a novel scheme for MSOT scenario (multi-service on one terminal)using link sharing to guarantee service continuity is proposed. Fuzzy control theory is applied for designing the sharing strategy. The functionalities of mobile terminal for link sharing are modular design considering easy implementation. The performance of the proposed algorithm is analyzed and compared with fixed percentage...
In this paper, we study the problem of discovering multiple resource holders and how to evaluate a node's satisfaction in query incentive networks. Utilizing an acyclic tree, we show that query propagation has a nature of exponential start, polynomial growth, and eventually becoming a constant. We model the query propagation as an extensive game, obtain nodes' greedy behaviors from Nash equilibrium...
With the explosion of broadband penetration and residential gateways, users' interest in offering user generated content and services from their own home has become more and more pronounced. Home Area Networks (HANs) with rich user content are therefore emerging at the “edge” of the telecom and Internet service providers' networks. Home consumer devices such as Home Gateways (HGs) and femto base stations...
This paper presents the Page Rank Routing Algorithm Method (PR-RAM), which is the Ad-hoc wireless networks routing protocol using Page Rank algorithm. Page Rank is the link analysis algorithm used by the Google internet engine that assigns a numerical weighting to each element of World Wide Web (WWW) with the purpose of measuring its relative importance within the WWW. If any web page has a higher...
The purpose of our study is to guarantee the required throughput of high-priority (UDP) flows and to achieve the stable throughput for each flow in a wireless LAN in which both high-priority and low-priority (TCP) flows exist. The authors previously proposed a QoS control scheme called Receiving Opportunity Control in MAC Frame (ROC), in which an Access Point (AP) intentionally does not return an...
We propose an event driven semi-Markov chain model for dual radio node architecture. The performance of proposed architecture in terms of energy-latency tradeoff is compared with that of schedule based dual radio architecture. Numerical results show the usefulness of event driven dual radio architecture for delay sensitive data transmission.
In this paper, we propose an architecture for Network of Information mobile node (NetInf MN). It bears characteristics and features of basic NetInf node architecture with features introduced in the LISP MN architecture. We also introduce a virtual node layer for mobility management in the Network of Information. Therefore, by adopting this architecture no major changes in the contemporary network...
This paper presents a cross-layer optimization method for MAC protocol data unit aggregation, abbreviated to A-MPDU, with high throughput (HT) immediate block acknowledgement in non-competitive channel environment. We derive the goodput as a function of the transmission strategy, including the aggregated number of MPDUs and length of each MPDU of the MAC layer, and modulation and channel coding scheme...
Most 802.11 WirelessLAN media transport networks communicate on a shared channel. Since bandwidth- and QoS-demands of new media content constantly increase, network capacities tend to be bailed out soon, if the entire WLAN spectrum is not efficiently exploited. The proposed multi-layer approach combines dynamic channel distribution with additional dynamic interface bundling for multi-interface mesh...
This paper investigates the effect of channel estimation error on performance of physical layer network coding, in which the relay maps the superimposed noisy modulated data received from the two end terminals, to network coded combination of the source packets. Knowledge of channel coefficients is required for network code selection at the relaying terminal. We consider physical layer network coding...
The Smart u-Learning System is designed to provide an interactive and social learning environment that accommodates emerging devices. This demonstration will show how teachers and students can use its interactivity and social features in live lecture situations.
There is undoubtedly an increase in the number of Web-connected devices, such as home appliances, handheld devices, and smartphones. Though Web applications are intended for information sharing among users, conventional Web technology does not sufficiently support synchronized sharing of information among various devices. We propose a method for synchronized sharing information among various Web-connected...
This demonstration shows an innovative concept that introduces PKI for mobile operators. A commercial 3G dongle is equipped with an USIM module used for subscriber's authentication. The USIM embeds a tiny SSL stack written for java cards. The 3G modem delivers internet connectivity and realizes strong mutual SSL authentication providing, in the presented use case, seamless access to real OPENID services.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.