The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dynamic spectrum access in the form of cognitive radio (CR) has gained traction in wireless sensor networks (WSN) because of a) scarcity caused by the proliferation of wireless devices and service and b) it provides spectrum efficient communication for the resource constrained WSNs. However, proper means have to be devised to satisfy the requirements of both WSNs and CRs and to enjoy the benefits...
Unlike traditional file transfer where only total delay matters, streaming applications impose delay constraints on each packet and require them to be in order. To achieve fast in-order packet decoding, we have to compromise on the throughput. We study this trade-off between throughput and in-order decoding delay, and in particular how it is affected by the frequency of block-wise feedback, whereby...
Real-time multimedia comprises a large, and growing, fraction of mobile data traffic. An important subset of such flows are from interactive conferencing applications using RTP on UDP/IP to reduce latency. UDP has no congestion control, and while the IETF is developing RTP-level congestion control algorithms as part of the WebRTC standards, these will take time to finalise and deploy. In the interim,...
Long-distance WiFi networks are a cost-effective means for providing Internet connectivity in developing regions. In these regions, providing support for real-time applications is considered an important requirement. Unlike prior works, this paper studies the effectiveness of features (e.g., frame aggregation and channel bonding) of 802.11n/ac in improving the performance of long-distance WiFi links...
The service quality of a station in IEEE 802.11 wLAN (wireless Local Area Networks) is strongly influenced by which access point it associates with. Therefore, a key challenge is how to select an appropriate access point from multiple available ones. Conventional association protocols have been proved to be not effective. In this paper a strategy for differentiated access service selection based on...
Cloud computing will have profound impacts on wireless networks. On one hand, the integration of cloud computing into the mobile environment enables mobile cloud computing (MCC) systems; on the other hand, the powerful computing platforms in the cloud for radio access networks lead to a novel concept of cloud radio access networks (C-RAN). In this paper, we study the topology configuration and rate...
This paper proposes a framework for Wireless Resource Virtualization (WRV) in Long Term Evolution (LTE) systems. An shared radio access network connects Multiple Mobile Network Operators (MNOs) and allocates radio resources to their users. We formulate the WRV problem as a Binary Integer Programming (BIP) problem. Subsequently, a low complexity iterative algorithm is presented to solve the BIP problem...
Interference management is an important subject in Device to Device (D2D) communication when underlying a LTE-A cellular band. By default, in LTE-A there is negligible intra-cell interference due to the orthogonality of the subcarriers but this orthogonality will be lost when D2D communication takes place under cellular users (CU). Therefore, the purpose of this paper is to propose a novel scenario...
Anomaly detection is essential for preventing network outages and maintaining the network resources available. However, to cope with the increasing growth of Internet traffic, network anomaly detectors are only exposed to sampled traffic, so harmful traffic may avoid detector examination. In this paper, we investigate the benefits of recent distributed computing approaches for real-time analysis of...
Named Data Networking (NDN) is an emerging communication paradigm to resolve a traffic explosion problem due to repeated and duplicated delivery of large multimedia content. To make NDN being useful more widely, however, it should support various types of traffic and their Quality of Service (QoS) requirements. In this paper, we propose a differentiated services (diffserv) model for NDN. For scalability,...
Developing an efficient spectrum access policy enables cognitive radios to dramatically increase spectrum utilization while assuring predetermined quality of service levels for the primary users. In this abstract, modeling, performance evaluation, and optimization of a distributed secondary network with random sensing order policy are studied. Specifically, the secondary users create a random order...
Future dynamic wireless and online social networks will require more agile and efficient infrastructures to support the anticipated user traffic and service requirements. In response, in this work, we propose a novel spectrum-agile resource allocation approach that combines Markov Random Field (MRF) cross-layer decisions for the allocation of resources at the lower protocol layers with Back-pressure...
Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a distributed MAC protocol for WLANs, capable of achieving greater throughput than the current contention mechanism in WLANs. It does so by changing to a deterministic backoff after successful transmissions, which leads to a collision-free schedule that under ideal conditions can be permanently maintained. This demo shows...
This demo presents a novel multirate multicast scheme for video delivery to wireless users. We demonstrate an adaptive scheme that combines differential backlog scheduling and intelligent packet dropping, both based on local information. An important feature of this scheme is that it does not require centralized calculations. We focus on 802.11 mesh networks and we show that our solution copes efficiently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.