The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to reduce the impact of inherent network time-varying transmission delay, packet loss and other phenomena on performance of the remote monitoring system based on wireless sensor network, a kind of multi-objective optimization control strategy based on network quality of service (QoS) management is proposed from the perspective of improving the overall system performance. For the data transmission...
In this paper we develop an optimized control strategy for the connection bandwidth maximization over a time varying wireless channel, by jointly controlling the adaptive source rate and the client/playout buffering policy with constraints on the maximum connection bandwidth allowed at the Application (APP) layer, the queue-capacities available at the DataLink (DL) layer and the average and peak transmit...
Application-Layer Multicast (ALM) is considered a viable solution for compensating the lack of global IP Multicast deployment. While early ALM approaches consider only stationary end-systems, their use becomes more and more feasible on smaller devices like laptops and mobiles. Many ALM protocols have been proposed that employ multi-metric optimization strategies to consider e.g. delays, fanout-degrees,...
In 3G cellular networks, the release of radio resources is controlled by inactivity timers. However, the timeout value itself, also known as the tail time, can last up to 15 seconds due to the necessity of trading off resource utilization efficiency for low management overhead and good stability, thus wasting considerable amount of radio resources and battery energy at user handsets. In this paper,...
In order to bear reliable end-to-end services transmission in insecure IP network, SCTP as the transport protocol of the next-generation Internet was proposed. The performance of SCTP has been improved in related literature; however, they optimized it based on a single or a few parameters, which is lack of a comprehensive consideration in correlation parameters. In consideration of real-time and the...
In this paper we present a max flow multipath routing algorithm (MFMP) with congestion mechanism that is designed to reduce latency, provide high throughput and reduce packet loss. The congestion mechanism used, reduces overhead by limiting congestion information to local nodes. Together with Ford-Fulkerson algorithm used to determine a set of paths that are disjoints or virtually disjoint, MFMP is...
In this work the authors show how the asymmetry characteristics of wireless network strongly affects the Web response time of user. It is found that uplink delay degrades Web performance because additional bytes overhead and time overhead are introduced. On the other hand, the study also shows that reduction of Web response time is possible through protocol optimization on different layer of protocol...
Disaster recovery and business continuity issues are becoming fundamental in networks since the importance and social value of digital data is continuously increasing. On the one hand, there is an obvious need of backing up data for resilience against major failures; in many situations the process of storing backup data is also enforced by the law. On the other hand, providing services that allow...
IEEE P1900.4 is an emerging standard for optimized radio resource utilization where cognitive radio technologies are used for efficient spectrum utilization. In this paper, we design and implement a cognitive wireless network system based on open documents of IEEE P1900.4, and evaluate its performance using UDP streaming and HTTP download. Our experiments show interesting results that total network...
This correspondence demonstrates the significant gains that multiple-access users can achieve from sharing a single amplify-forward relay in slow-fading environments. The proposed protocol, namely, multiple-access amplify-forward (MAF), allows for a low-complexity relay and achieves the optimal diversity-multiplexing tradeoff (DMT) at high multiplexing gains. Analysis of the protocol further reveals...
The increasing ubiquity of mobile embedded systems has been matched by the evolution of a variety of wireless network standards and technologies. The major constraints of wireless embedded systems are limitations of communication bandwidth, processing capabilities, and battery power. Remote wireless embedded systems often act as sensors, which provide data to a certain community. The exchange of data...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
Three applications in wireless networks where model-free stochastic learning is applicable, are discussed. The learning based optimization problems are formulated and simulation results are presented. Some open issues are also discussed.
The ever changing demands on computational resources has information systems managers looking for solutions that are more flexible. Using a ldquobigger boxrdquo that has more and faster processors and permanent storage or more random access memory (RAM) is not a viable solution as the system usage patterns vary. In order for a system to handle the peak load adequately, it will go underutilized much...
This paper explores the attributes, layering models and objective functions in cross layer designs for mobile ad hoc wireless networks by taking all the statistical characteristics and constraints from the physical (PHY) layer, media access control (MAC) layer and network (NET) layer into consideration. This paper reviews the entire network optimization across all the PHY/MAC/NET layers. At the PHY...
This paper describes a new path computation model in Multi-protocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks. It introduces a path computation element (PCE), which is functionally separate from label switching routers (LSRs). The Path Computation Element (PCE) is an entity that is capable of computing a network path or route based on a network graph, and applying computational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.