The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Mesh Network (WMN) is a promising technology for extending the Internet access to wider areas with high bandwidth. Cooperative caching is especially desirable for multi-hop wireless networks, including WMNs, to achieve efficient data access. Although quite a number of works have been done on data cooperative caching in wireless networks, WMN's characteristic in network architecture necessitates...
Multiplayer Online Game has been extremely popular, in which peer-to-peer technology has been introduced to help with the scaling. This paper presents a measurement study on a P2P-based MOG supporting system, called PKTown, which has been fully deployed over the CERNET. By leveraging a large set of traces obtained recently over a 4-month period, we study the benefit of P2P architecture applying to...
Multipath routing has been a promising solution to improving reliability and system throughput for wireless mesh networks. However, existing schemes designed for system throughput improvement suffer the route-coupling problem (i.e., the determined multiple paths originating from the same source node typically stay very close to the shortest path to the gateway) so that the improvement ratio may not...
This paper introduces a novel scalable cognitive routing protocol (SCRP) for mobile ad-hoc networks. It is an on-demand cognitive routing protocol. It employs an intelligent flooding protocol, a novel approach for scalable flooding. A neural network machine learning method is adopted to make nodes aware of history. The intelligent flooding protocol saves routing overhead because nodes selectively...
In this paper we consider the design of multi-stream demodulators for multiple-input multiple-output (MIMO) systems. Our proposed MIMO demodulator is based on the stack tree-search strategy and provides soft-outputs in the form of exact max-log log-likelihood ratios (max-log LLRs). We prove that our proposed demodulator is optimally efficient in that it visits the least number of nodes among all optimal...
Ultra-wideband (UWB) communications has emerged as a burgeoning technology for high data rate wireless personal area networks (WPANs). In this paper, we propose a novel resource utilization mechanism (RUM) for improving the throughput in multi-rate UWB-based WPANs. RUM is intended to remedy a critical issue in both unicast and multicast transmissions. In unicast (single- and multi-hop), the connectivity...
The selection of routes is an important issue in wireless networks when network coding is used. Existing research formulate network-coding-aware routing as a linear optimization program. However, deploying such method in real wireless networks is impractical. To solve this issue, in this paper, a practical network-coding aware routing protocol is proposed for unicast sessions in wireless networks...
The evolution of network technologies brought increasing management complexity of networking infrastructure and protocols. Cognitive networking was introduced to deal with such complexity. This work presents a cognitive algorithm for cross-layer performance management which is the core of a decentralized framework for self-configuration of communication protocols. We illustrate the proposed solution...
How to assess the topology vulnerability of a network has attracted more and more attentions recently. Due to the rapid growing number of real- time internet applications developed since the last decade, the discovery of topology weakness related to its quality of service (QoS) is of more interest. In this paper, we provide a novel QoS-aware measurement for assessing the vulnerability of general network...
We describe a methodology that incorporates the impact of control information transfer into MAC protocol optimization. We apply this methodology to the problem of a synchronous broadcast MAC channel, to generate the optimal protocol when the objective function is the average network throughput per slot. We describe a recursive procedure for the symbolic generation of the optimization program for any...
Network-wide broadcasting and multicasting are two important routing schemes used in group communications. In network-wide broadcasting, generated packets at the source node are distributed to all nodes in the network, while multicasting delivers the packets only to a subset of the nodes by creating and maintaining a data dissemination structure. Due to the overhead in multicasting, in certain situations,...
Wireless Mesh Networks (WMNs) have been widely deployed as a new communication paradigm that can provide innovative services for a community (neighborhood, campus, etc.). WMNs are capable to provide both delay-sensitive services such as Voice over Internet Protocol (VoIP) and delay-insensitive services such as peer-to-peer file sharing. Network routing protocols in WMNs often employ the minimum-hops...
In this paper we address the issue of the optimal candidate-set selection in the opportunistic routing paradigm. More specifically, although several algorithms for selecting the optimal candidate set have been proposed, to the best of our knowledge none of them has never considered the problem of selecting the optimal constrained candidate set, namely the optimal candidate set with a fixed maximum...
Wireless sensor networks are equipped with batteries with limited charge, and are often deployed in conditions that make their retrieval and replacement infeasible. Thus, energy conservation has been a primary consideration for protocol design for such networks. Recent advancements in the transfer of energy wirelessly over large distances, such as through radio frequency electromagnetic (EM) waves...
Employing channel state information at the network layer, an effective routing metric is obtained that minimizes the end-to-end outage probability in amplify-and-forward multihop wireless networks. A disadvantage of the routing metric obtained is that it cannot be optimized in distributed manner, i.e., it does not converge onto optimal routes. The disadvantage cannot be remedied by exhaustive search...
Cognitive radios (CRs) are devices that access spectrum opportunistically taking advantage of unused portions of licensed spectrum. Therefore, depending on the licensed radios activity, cognitive devices may suffer from constant communication disruptions or even lack of opportunities in the access of the spectrum. To solve this problem, we propose a new paradigm of interaction between 802.11 radios...
Wireless sensor networks (WSNs) have been increasingly deployed for both civil and military applications under harsh, unpredictable or open environments. Such environments create opportunities for the intruders to launch a variety of attacks on multiple protocol layers in WSNs. This paper proposes a behavior monitoring and analysis framework for large scale WSNs. Within this framework, we address...
When moving towards fully Peer-to-Peer Virtual Environments (P2P-VE), the amount of network traffic generated at each peer remains a significant concern. Multiplayer Online Games (MOG) are the largest application subset of VEs and have been shown to require high frequency of update messages and minimal network latencies. Yet, this demanding criteria must be balanced with the need to also limit the...
In this paper we introduce the static multicast advance reservation (MCAR) problem for all-optical wavelength-routed WDM networks. Advance reservation connection requests specify their start time to be some time in the future and also specify their holding times. We investigate the static MCAR problem where the set of advance reservation requests is known ahead of time. We develop two efficient heuristics,...
The NP-hard QoS Multicast Routing (QoSMR) is one of the most challenging problems in recent networks. In this paper, we investigate the QoSMR problem as well as its different existing formulations. We analyze the limitations of these formulations and propose a novel one. The main advantage of our formulation is that it considers not only the quality of the multicast subgraph formed by the computed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.