Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, cooperative spectrum sensing based censored energy detection is considered in order to improve the accuracy of the decision made about the spectrum availability. Proposed two witnesses fusion rule is used to derive a spectrum sensing final decision. However, the accuracy of this decision cannot be ensured unless the best choice of the two decision thresholds is made such that the probabilities...
This paper presents mechanisms that have the potential for dramatically reducing end-to-end delay in mobile networks. We introduce a simple algorithm for dynamic user plane gateway placement in a mobile network. The proposed algorithm is able to optimize gateway location according to given targets, e.g., path latency or bottleneck link load. We shall also present how active queue management can be...
Machine-to-machine (M2M) applications are expected to be the main traffic contributors through the Internet of Things (IoT) paradigm. One of the most prevalent communication access technologies is Wi-Fi. While open Wi-Fi hotspots can be easily used by M2M communications of static or mobile devices, this is not the case for private Wi-Fi installations that are normally secured against unauthorized...
The goal of this paper is to construct an dynamic secure combinatorial keying approach. We focus on heterogeneous mobile wireless sensor network environments. The proposed approach is called dynamic secure combinatorial keying approach (DSCKAD). Most of the previous work on WSN security focuses on homogeneous motes. In homogeneous WSN, sensors have the same resource specifications such as battery...
The flexibility of long-range transmission comes at the cost of stricter legal regulations where duty-cycle approaches limits a transmitter to 1% duty-cycle in the general case. To provide better surveillance service guarantee we propose an activity time sharing mechanism for a pool of devices deployed by a single organization. Devices that need to go beyond the activity time limitation can borrow...
Multi-hop message dissemination in vehicular networks has been largely studied in the past decade. It notably allows to push information to the drivers concerning hazards that they will encounter ahead on the road such as, for instance, traffic jams, ice patches, etc. In this paper, we investigate the performance of several dissemination schemes on a realistic micro-mobility trace: the Madrid Highway...
The energy in wireless sensor networks is a restrictive resource which primarily affects the life of nodes. Many routing protocols use clustering mechanism to optimize the network lifetime. A problem can occur if the allocation of cluster members is not uniformly distributed. In case of LEACH protocol there are great differences in cluster sizes. Consequently, the energy load of such network becomes...
In dense wireless sensor networks, a multichannel MAC is a good means to reduce channel contention and increase frame reception probability. In this paper, we report on experiments with transmissions on various channels in the 2.4GHz ISM band and find more channel diversity than expected: this effect is particularly exacerbated at a short range, but it also has a significant impact at any distance...
The improvement of the Internet's network conditions have made possible for the real time Haptic data transferring over the Internet. With the word Haptic we refer to the sense of touch that the user feels when he uses a Haptic service. This paper deals with the transfer of real time Haptic data over the Internet. It presents the related work on Haptic data transferring. It outlines the Haptic data...
To avoid collisions in Wi-Fi networks, access points (APs) — acting as coordinators — got the ability to use centralized contention-free channel access, e.g. HCCA, which supports parameterized QoS. However, the growth of WLANs population raises a problem of coordination between APs. As a solution to this problem, IEEE 802.11aa introduces the HCCA TXOP Negotiation mechanism, which allows APs to agree...
Effective strategies are required to ensure efficient data collection for wireless sensor networks deployed in harsh environment, and where propagation conditions are unstable. In this paper, we propose a scheduled based routing protocol that use both topological and link quality information to adapt to environment changes. The multiples channels is used to enable parallel transmissions and hence...
The increase of machine-to-machine (M2M) communications over cellular networks imposes new requirements and challenges that current networks have to handle with. Many M2M UEs (User Equipment) may send small infrequent data, which suppose a challenge for cellular networks not optimized for such traffic, where signaling load could increase significantly and cause congestion over the network. This paper...
Machine-to-Machine (M2M) communications are expected to be the main contributor of traffic over the Internet by the time frame of the launch of 5G. Wireless access via a cellular infrastructure is expected to be the main M2M traffic passage into the Internet. Long Term Evolution (LTE) is the main cellular technology for 5G. The method by which user devices are normally allowed to attach to an LTE...
Network Virtualization is one of the key technologies for developing the future mobile networks. In this paper we propose an LTE virtualized Mobility Management Entity queue model to evaluate its service time for a given signaling workload. Additionally, we provide a compound data traffic model for the future mobile applications, and we predict theoretically the control workload that it will generate...
The location information for a forwarding scheme for Vehicular Ad-hoc Network (VANET) communications serves several purposes based on specific network characteristics. The concept of the angle-based forwarding scheme takes into account the relative-angle calculation to support an optimal forwarding decision. This survey summarizes angle-based forwarding schemes in VANET by reviewing their characteristics,...
We present in this paper a MAC layer protocol capable to cope with lossy links in interference-prone wireless environments. Our approach exploits the recent advances in information theory and physical layer coding by relaying at intermediate nodes corrupted messages. To do so, we rely on collaboration between nodes and on a complete rethinking of the header structures and wireless access techniques...
The use of the large number of deployed WiFi access points is an interesting solution to offload LTE networks. In the perspective of convergence between fixed and mobile access, it is possible to connect WiFi access points to eNodeBs. With very tight coupling, WiFi and LTE flows are merged just below the IP layer. The objective is to accelerate the process of attachment to a WiFi Access Point and...
Enabling an acceptable QoS provision for realtime services is constrained by the lack of radio resources availability and the load network. To overcome this issue, an efficient admission control must be applied to provide user's QoS expectation while respecting the resource availability constraint. We propose in this paper different admission control strategies aiming at simultaneously improving the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.