The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Built-in hardware sensors and network connectivity in many modern smartphones provide opportunities for novel location-based and context-aware applications, particularly in the field of public transportation, physical activity recognition and event detection. A real-time prediction method of the time remaining before reaching the specified destination for bus trips is designed and implemented. The...
Many companies use the Internet as a basis for their services, defining Service Level Agreements (SLA) with their respective Internet Service Providers. However, the current Internet works in a Best Effort manner, what points toward the concept of network virtualization to support the Future Internet. Within this context, this work proposes a generic SLA negotiation protocol for Virtualized Environments...
For the purpose of prediction analysis of customer relationships in social networks, this paper proposes a simple model that can generate future states of a social network based on relevant data analysis. In this model, nodes and edges of the social network are inserted at the same preferential attachment probabilities, but deleted at different anti-preferential attachment probabilities. In this model,...
Recently cognitive radio has gained considerable interest by wireless communication researchers as a viable mean to solve the spectrum utilization problem. The advancement in this area has met with many challenges including in the field of spectrum decision. To this end we propose a QoS based spectrum decision framework for cognitive radio networks which guarantees the QoS to the data packets by allocating...
The virtual network embedding (VNE) problem deals with the embedding of virtual network (VN) requests in an underlying physical infrastructure (substrate network). Re-embedding of an already embedded VN may be precipitated due to failure of physical resources (nodes and/or links) in the substrate network. Our endeavor in this paper is to design a VN re-embedding algorithm to address these dynamics...
New applications bring a new set of requirements that the Internet is not able to satisfy in a proper way. Internet architecture must be reviewed and researchers from all over the world are engaged in the design of a new Internet. Software Defined Networking (SDN), which is materialized in OpenFlow, represents an extraordinary opportunity to rethink computer networks. In this paper, taking advantage...
Delivery of multimedia transmission in mobile networks requires appropriate coverage and enough capacity to provide Quality of Service. Femtocell systems can be suitable network components to handle these challenges. State of the art mobile and wireless networks introduce MIMO transmitters and receivers to increase available capacity significantly in exchange of very sophisticated signal processing...
The most widely used transport layer protocol, TCP, consistently contributes the largest traffic volume in the Internet. The objective of this study is to determine whether there are long-term trends in TCP flows and popular TCP applications from over several years in different organizations. The results show that TCP flows' average packet size has increased steadily and each TCP flow contains slightly...
HTTP adaptive video streaming has become the de facto standard for media data delivery in the Internet. Mobile users are increasingly accessing video streaming services while traveling in fast-moving vehicles (e.g., public transport). The inherent high-speed mobility in these scenarios escalates bandwidth uncertainty and seriously degrades the performance of HTTP adaptive video streaming. This paper...
Packet Classification is the enabling function for many Internet functions like QoS and Security. In this paper we propose a Classification engine architecture which exploits parallelism to increase throughput. The architecture also make use of the Temporal locality observed in Internet traffic positively by employing Popular Rule Caching mechanism to increase the classification throughput. We also...
When utilizing video streaming for professional purposes, the quality of service needs to be evaluated by the service provider. This is the case especially when the service must be available for a large number of customers with a wide range of network interfaces and terminal equipment. Service providers have usually information about network-level metrics. However, the problem is that conditions that...
Advanced computing and sensing capabilities of smartphones provide new opportunities for personal indoor positioning. A particular trend is to employ human activity recognition for autonomous calibration of pedestrian dead reckoning systems thereby achieving accurate indoor positioning even in the absence of any positioning infrastructure. The basic idea is that the activity context, such as switching...
In recent years Wireless Mesh Networks (WMN) have gained lot of attention from service providers and industry due to low cost and instant deployment at both access and distribution level. The IEEE 802.11s standard addresses the need for such networks. In multi-hop networks, throughput decreases exponentially with the increase in number of hops. Thus providing QoS in multi-hop networks becomes a delicate...
Due to limited batteries of senor node in wireless sensor networks, it is essential to minimize the energy consumption so that the lifetime of WSNs can be prolonged. In this paper, we propose a cooperative multi-input multi-output (CMIMO) scheme by introducing variable cluster size. In general, if the same cluster size is applied in each cluster, the cluster head with lower residual energy runs up...
Operators and wireless internet service providers are increasingly using Wireless Mesh Networks (WMN) to offer Internet connectivity, as it allows fast, easy and affordable network deployment and provide Internet services to the end user through all existing network technologies like Ethernet, WLAN, WiMAX, GPRS etc. Due to evolution of 4G heterogeneous wireless networks, today's mobile devices are...
This paper presents a survey of state-of-the-art routing techniques in Wireless Sensor Networks (WSNs). Compared with traditional wireless networks, WSNs are characterized with denser levels of node deployment, higher unreliability of sensor nodes and severe power, computation and memory constraints. Various design challenges such as energy efficiency, data delivery models, quality of service, overheads...
Radio frequency identification (RFID) has become more popular and used ubiquitously in various applications nowadays. They are also commonly found in close proximity to human body in everyday life. There has been growing concerns over health issues caused by the widely spread radio technologies which might be hazardous if operated in close proximity of human beings continuously. However, in our novel...
We have numerically evaluated optical backward propagation (OBP) by the conjunction of dispersion compensating fiber (DCF) and a non-linear compensator (NLC) devised by effective negative Kerr non-linear coefficient using two highly non-linear fibers (HNLF) to compensate fiber transmission impairments, i.e. chromatic dispersion (CD) and non-linearities (NL). The OBP module is evaluated for dual-polarization...
Previous works on the network coding focused on applying cryptographic theorems on wireless and wired network to protect the network from the malicious packets. In this paper a new framework to create a trust model between the sink node and the source node is proposed, in which the new framework used a logistic map chaotic model within the trust approach to increase the uncertainty in the generated...
We discuss the performance enhancement of digital backward propagation by step-size selection for implementing split-step Fourier method (SSFM) in 224Gbit/s PolMux-16QAM system. The two DBP algorithms based on the step-size selection methods; (a) constant step-size based modified DBP (M-DBP) and (b) non-uniform, i.e. logarithmic, step-size based DBP (L-DBP), are compared for diverse fiber types i...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.