The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Carrier Aggregation started to appear since release 10 of LTE, and offers higher data rates, but at the cost of increased Peak-to-Average-Power-Ratio (PAPR). This paper studies the distribution of PAPR through analyzing the Crest Factor (CF) which is the square root of the PAPR of the Carrier Aggregated OFDM (CA-OFDM) signals used in the downlink of LTE-A. Although the base station is not power constrained,...
DDoS attack is one of the major concerns for network and cloud service providers, due to its substantial impact on revenue/cost and especially on their reputation. Also, network administrators are looking for solutions to manage voluminous data traffic. SDN is an emerging networking paradigm that provides a flexible network management. Hence, SDN is being widely adopted for wired, wireless, and mobile...
The LoRa technology has emerged as an interesting solution for low power, long range loT applications by proposing multiple “degrees of freedom” at the physical layer. This flexibility provides either a long range at the cost of a lower data rate or higher throughput at the cost of low sensitivity, so a shorter range. In this paper, we analyze the flexibility of LoRa and propose various strategies...
Low Power Wide Area Networks (LPWAN) technologies have recently triggered many research efforts and standardization activities due to the inherent possibility of both providing long range wireless communications and guaranteeing a long life for very cheap sensing devices. At the same time, the increasing interest of telco operators into such kind of networks is due to the wide range of applications...
Novel wireless systems are often first evaluated by simulation, before prototypes are tested and the concepts are standardized. In order to ensure relevant simulation results, the wireless channel has to be modelled properly and application oriented. Currently, only few considerable industrial channel models are available. The IEEE 802.15.4a model is the most commonly used. CM 7 applies for LOS modelling...
In this paper, we introduce a distributed algorithm to compute the Čech complex. This algorithm is aimed at solving the coverage problems in self organized wireless networks. The complexity to compute the minimal Čech complex that gives information about coverage and connectivity of the network is O(n2), where n is the average number of neighbors of each cell. An application based on the distributed...
Although IEEE 802.11p technology is standardized for road safety and efficiency applications, the channel congestion problem is its key weakness necessitating distributed congestion control (DCC) algorithms on different layers of the communication stack. In this paper, we propose DCC-enabled Contention based Forwarding scheme targeting multi-hop dissemination of Decentralised Event Notification Messages...
Inter-Cell Interference Coordination (ICIC) techniques are proposed as solutions to alleviate the negative impact of interference on system performance, while enhancing the provided Quality of Service (QoS). Typically, the available bandwidth is divided into inner and edge sub-bands. Users are also classified into interior and edge users. The available resources in each zone are exclusively allocated...
With the increment in users' data demand and the emergence of applications with stringent Quality of Service requirements, important improvements in cellular network architecture need to be made. In this paper we explore the symbiosis of three key communication technologies in 5G: Device-to-Device communications, 60 GHz unlicensed band transmissions and adaptive beamforming techniques. It provides...
Terahertz (THz) band (0.1–10 THz) communication, which is envisioned as one of the key wireless communication technologies of the next decade, exhibits an extremely large bandwidth at the cost of an extremely high path loss. The unique distance-dependent behavior on the available bandwidth in THz communication interrelates all THz properties, and affects the design and performances within and across...
The remote monitoring and control of machines are essential in industrial environments. Emerging communication technologies such as Web of Things and Machine to Machine Communication can meet this demand for automation in Industry 4.0. This paper aims to introduce a solution for continuous and remote monitoring of electrical quantities in smart industrial environments with three-phase systems. The...
This paper investigates the possibility to use Channel State Information (CSI) extracted from Long Term Evolution (LTE) signals for signal fingerprinting localization. Being the first work in this direction, several types of signal fingerprinting-based approaches have been compared (e.g., CSI-based vs RSSI-based, statistic vs deterministic matching rule). In particular, the paper proposes a novel...
Internet of Things (IoT) has become a favored wireless communication concept in many application domains recently. Most of the IoT networks must fulfill the strict quality of service (QoS) requirements such as low latency and high reliability. Besides, low power consumption is essential in those networks due to the use of battery operated devices. Time Slotted Channel Hopping (TSCH), an operating...
Data delivery in low power and lossy networks like Wireless Sensor Networks (WSN), which has a significant role in Internet of Things (IoT), is vital due to the high probability of packet loss due to wireless and constrained environment. Data caching and transmission rate control are independent ways of improving the performance of transport protocols in WSN by immediately responding to packet losses...
This paper considers the problem of joining a network of constrained IoT devices. We propose to take advantage of Singer Cyclic Difference Sets (S-CDS) for a joining scheme that results in low duty cycles and apply the proposed scheme to the joining problem in 802.15.4e TSCH networks. S-CDS distributes the active periods of nodes over time so that a joining node does not suffer from long scanning...
Reliable service provisioning is crucial to the public safety (PS) communications especially when network outage happens. Isolated E-UTRAN operation, introduced in LTE Release 13, is able to host separate core network functions at the base stations (BSs) to provide limited set of services to the users. However, a significant issue remains to be solved is to coordinate among BSs to create an autonomous...
Application-Level Forward Erasure Correction (AL-FEC) codes have become a key component of communication systems in order to recover from packet losses. This work analyzes the benefits of the AL-FEC codes based on a sliding encoding window (A.K.A. convolutional codes) for the reliable broadcast of real-time flows to a potentially large number of receivers over a constant bit rate channel. It first...
New Long-Range radio technologies have recently emerged in the IoT landscape. These technologies work in the Sub-GHz bands, allowing low-power communications over long distances. They are typically based on star-topology networks, where nodes send the data directly to a base station connected to the Internet. One of such technologies is LoRa. Enabled LoRa-based multihop communications would open up...
Smart home user usually controls smart devices through smart application, which is managed by user's account. Thus, compromised account is possible and countermeasure to such attack can help protect both devices and data pertaining to them. In this paper, we propose a security countermeasure in case of compromised account in smart home system by introducing another layer of access control beyond the...
We propose novel resource allocation algorithms that have the objective of finding a good tradeoff between resource reuse and interference avoidance in wireless networks. To this end, we first study properties of functions that relate the resource budget available to network elements to the optimal utility and to the optimal resource efficiency obtained by solving max-min utility optimization problems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.