The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cellular networks are usually described by two-dimensional (2-D) models. These models are appropriate for rural or suburban areas but are not suitable for dense urban environments, where a large number of heterogeneous small cells are deployed to satisfy the rapid increase in mobile subscribers and communication service demands. In this paper, a new general 3-D model for heterogeneous cellular networks...
We devise a framework using tools from stochastic geometry and queuing theory for the study of irregular cellular networks when user traffic varies randomly in time and space. We consider a typical wireless cell with a guard zone surrounded by an interference environment comprised of a dominant node at the guard-edge plus an outer-bound Poisson field of sources. A systematic approach is presented...
In LTE and LTE-Advanced systems the rate of requests on the Random Access CHannel (RACH) can be high. Indeed, the Machine Type Communication (MTC) implies to have a high number of devices that need to request radio resources for transmitting small amount of data. Furthermore, reducing the time in which radio resources are allocated to Human Type Communications (HTC) for energy savings purposes, may...
Device-to-Device (D2D) communication is a promising technology in the next generation (5G) cellular network as it can significantly improve the system performance by leveraging the proximity of communications and reusing cellular frequency resources. However, this benefit may not be fully exploited if the co-channel interference among D2D users (DUE) and cellular users (CUE) is not properly tackled...
Vehicular communication technology leverages communication equipment and infrastructure to improve road safety and provide useful services for road user. In order to operate properly, many of these services need continuous data gathering to assess road situations accurately. In this paper, we analyse the impact of communication technology penetration rate and the proportion of application-equipped...
We develop a new framework for measuring and comparing the accuracy of any wireless interference models used in the analysis and design of wireless networks. Our approach is based on a new index that assesses the ability of the interference model to correctly predict harmful interference events, i.e., link outages. We use this new index to quantify the accuracy of various interference models used...
We consider the physical layer security for the downlink system, where the confidential messages can be wiretapped by both the intended users (IUs) and the external eavesdroppers (EEs). Regularized channel inversion (RCI) precoding is adopted for multiuser communication because it can control the mutual information leakage among users. And, to enhance the secrecy performance, artificial noise (AN)...
In this paper we introduce Stienen's model for analysing the performance of a non-uniform two-tier networks. The topology of the network consists of a set of macro base stations (MBSs) uniformly deployed, and a set of femtocell access points (FAPs) deployed only outside exclusion areas (discs) surrounding the MBSs. The MBSs serve users within the innermost areas of each macrocell, while the femtocells...
Current approaches to the analysis of heterogeneous cellular networks (HetNets) with random spatial models assume users to be distributed according to a homogeneous Poisson Point Process (PPP) independently of the base station (BS) locations. In reality, however, current deployments are capacity-driven, which correlates the BS and user locations. In this paper, we develop tools for the downlink analysis...
The cell association is of a paramount effect on the operation of cellular network. In Ultra-Dense Networks (UDN), different types of small cells are deployed with extremely large densities. This comes with a great advantage of dense reuse of spectrum. In this paper, we investigate the downlink association of a given user equipment (UE) to multiple small cells, which we termed multiple association...
Online Social Networks (OSNs) is taking over television and newspapers, to be the dominant information dissemination option. The growing involvement of individuals create the situation that colliding, even contradicting information coexist and propagate in the same network, which gives rise to an interesting question: how will the conflicting information propagate? To answer this question, the propagation...
How to enhance the communication efficiency and quality on vehicular networks is one critical important issue. While with the larger and larger scale of vehicular networks in dense cities, the real-world datasets show that the vehicular networks essentially belong to the complex network model. Meanwhile, the extensive research on complex networks has shown that the complex network theory can both...
This paper presents an analytical model for analyzing the performance of the TDMA-based distributed reservation protocol for wireless multi-hop ad hoc networks. A novel three-way handshake process is presented which considers the hold-off and competition process before the transmission of scheduling messages. An explicit expression of expectation of the average delay of the three-way handshake process...
In this paper, we develop a comprehensive analytical framework to characterize the performance of device-centric content availability in device-to-device (D2D) networks. Modeling the locations of devices as a variant of Thomas cluster process, we derive the coverage probability of a typical device when its content of interest is available at its kth closest device within the same cluster. Using the...
This paper proposes an analytical approach to modeling and analyzing the coexisting transmission performance in a multi-tier heterogeneous network with multiple radio access technologies (Multi-RATs). The coexistence issue is a special phenomenon uniquely existing in a multi-RAT network and it is rarely studied in prior works on heterogeneous wireless network. To simply characterize the coexisting...
Previous coflow scheduling proposals improve the coflow completion time (CCT) over per-flow scheduling based on prior information of coflows, which makes them hard to apply in practice. State-of-art information-agnostic coflow scheduling solution Aalo adopts Discretized Coflow-aware Least-Attained-Service (D-CLAS) to gradually demote coflows from the highest priority class into several lower priority...
The Energy Harvesting-aware Contention Treebased Access (EH-CTA) protocol is presented in this paper as a novel Medium Access Control (MAC) protocol for wireless Machine-to-Machine (M2M) networks where end-devices are equipped with energy harvesters. The protocol is theoretically modeled to analyze its performance. A performance comparison with an EH-aware Dynamic Frame Slotted-ALOHA (EH-DFSA) shows...
Random Linear Network Coding (RLNC) is a technique that provides several benefits. For instance, when applied over wireless mesh networks, it can be exploited to ease routing solutions as well as to increase the robustness against packet losses. Nevertheless, the complexity of the decoding process and the required overhead might jeopardize its performance. There is a trade-off when deciding the field...
Heterogeneous cellular network has become an important network architecture to improve network capacity and spectral efficiency. This paper works on a theoretical framework for analyzing the system spectral efficiency in a heterogeneous network with different association schemes including best power and range expansion associations. Furthermore, a fractional frequency reuse scheme is applied to mitigate...
The underlying models of sources of noise in flash memory are exploited to compute an accurate distribution of the threshold voltage of a cell after cancelling cell to cell interference (CCI). We analytically express the mean and variance of this voltage solely as a function of number of P/E cycles, retention time and data eliminating the read overhead of the adaptive estimation methods. To reduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.