The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider the effect of caching in wireless networks where fading is the dominant channel effect. First, we propose a one-hop transmission strategy for cache-enabled wireless networks, which is based on exploiting multi-user diversity gain. Then, we derive a closed-form result for throughput scaling of the proposed scheme in large networks, which reveals the inherent trade-off between cache memory...
In this paper we propose a cooperative protocol and a symbol decoding algorithm that target improved performance in the presence of inter-cell interference (ICI) in wireless cellular networks. Our scheme uses the wireless signals that interfere at relay nodes located at the cell edge instead of discarding them. The relays are non-regenerative and apply a space-time code (STC) to the interfered signal...
Wireless Virtualization enables multiple concurrent virtual networks running on shared wireless substrate resource, which makes networks more flexible, efficient and customizable. Efficiently allocating physical wireless spectrum to multiple virtual networks to enhance the resource utilization is a fundamental challenge. Different from previous works focusing on only one physical wireless network,...
Data gathering is one of the most popular applications in multi-hop wireless sensor networks. Since resources are limited, it is important to efficiently allocate the resource while providing desired performance. In this paper, we consider resource allocation in the uplink of multi-hop wireless networks with the use of data buffers of finite size in the presence of transmission error. We first analyze...
Cognitive radio networks (CRNs) are envisaged to alleviate the spectrum and capacity shortage aggravated by the static spectrum allocation. They are crucial for meeting the requirements of wireless traffic explosion emerging with new wireless applications and services. However, the security of CRNs is critical for their practical usage and widespread proliferation. Therefore, the fundamental mechanism...
In this paper, a novel 3D real-time geographical routing protocol (3DRTGP) for wireless sensor networks (WSNs) is presented. This protocol controls the number of forwarding nodes by adapting a unique packet forwarding region (PFR) selection algorithm based on network density. This algorithm reduces the number of redundant packet transmissions, collisions, and congestion, which in turn, enables it...
Delay tolerant networking (DTN) is able to provide communication services in areas where there is no guarantee that a fully connected path between source and destination exists at any time, and seek to address the technical routing issues in wireless networks. Traditional routing protocols are unable to deliver messages between hosts in such conditions. PRoPHET protocol is among the most widely used...
Energy harvesting (EH) is an effective method to reduce power consumption of wireless networks. In this paper, we investigate the use of EH relays that harvest energy via RF radiation from the source node into finite energy buffers to forward the source data. For a multi-relay network, a proactive selection protocol is considered which employs a single best relay to forward source data and let the...
In recent years, HETerogeneous NETworks (HET-NET) arises as a promising network technique to manage a large number of mobile devices. By using the networks having different coverage size in the HETNET, it enables to increase the network capacity drastically. However, sometimes variations in user distribution causes inhomogeneous traffic load among the networks having different coverage size in the...
Consider secure transmissions over the downlink of a multiuser MISO system with independent confidential messages, each of which is intended for one of the users and should keep secret from others. We are interested in a scenario where users have individual secrecy rate requirements. This scenario is practical but has drawn little attention in the literature so far. In this paper, we propose a secrecy...
In this paper, the unnecessary handover avoidance scheme is discussed in Long Term Evolution-Advanced (LTE-A) small cells. Specifically, a handover is considered as unnecessary one if the active time in the target cell (i.e., duration where the user equipment can perform data communication) is not larger than a pre-defined threshold, where the active time is predicted before the handover through the...
Despite the complex cellular network models, when it comes to analytical techniques for modeling intercell interference, researchers often resort to simpler network models. The conventional network models such as the simple Wyner model including its modifications have been widely used for this purpose. However, all these network models including the popular grid based one-dimensional model have always...
We propose a cooperative device-to-device (D2D) communications framework in order to combat the problem of congestion in crowded communication environments. The idea is to allow a D2D transmitter to act as an in-band relay for a cellular link and at the same time transmit its own data by employing superposition coding in the downlink. Cooperation between the cellular link and D2D transmitter eases...
Utilization of device-to-device communication links provides an alternative way for mitigating the skyrocketing mobile data growth that challenges cellular operators nowadays. Namely, the owners of these devices can serve requests of their neighbors for the files that are stored at their caches. However, users are unwilling in general to serve requests of others, since data transmission incurs energy...
With the dense deployment of femtocell, interference control is becoming a major challenge for resource management in femtocell networks. Most of the existing works focus on improving throughput or reducing the total power consumption respectively, neglecting the energy consumption. In this paper, we investigate energy efficiency aspect in a femtocell network and propose an interference-mitigation...
We propose user-aware deployment strategies for femto-cell access points (FAPs) in heterogeneous networks where users' spatial distribution and long-term signal-to-interference plus noise ratios (SINRs) are available to a control centre. Assuming basestations are already deployed, the information on user density and long-term rate coverage is utilized to generate spatial throughput metrics for determining...
Energy efficiency is the critical problem in wireless multi-hop networks for extending network lifetime. Recently, the construction of multicast tree and converging tree has become increasingly important in multi-hop wireless networks. However, the existing topology-based protocols have large control overhead, and can not acquire the approximately optimal tree with considering the energy equilibrium...
This paper proposes a Markov decision process (MDP) based base station management scheme that dynamically and collectively manages activation of a group of base stations depending on the time-varying traffic demand for power conservation in self-organization networks. Our MDP model is unique in a sense that it accurately captures the dynamics of handover traffic among neighboring cells, and it formulates...
This paper investigates the secrecy outage probability of multicast cooperative relay networking in the presence of multi-destination and multi-eavesdropper nodes. The study is carried out in a multicast relay communication scenario whereby multi-eavesdropper nodes attempt to overhear the source message. Most of the previous studies in the field of cooperative communications and relay selection have...
In this paper, we propose a hybrid decision algorithm for the selection of the access in multi-operator networks environment, where competing operators share their radio access networks to meet traffic and data rate demands. The proposed algorithm guarantees the user satisfaction and a global gain for all cooperating operators. Simulation results prove the efficiency of the proposed scheme and show...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.