The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security threats such as jamming and route manipulation can have significant consequences on the performance of modern wireless networks. To increase the efficacy and stealthiness of such threats, a number of extremely challenging, next-generation cross-layer attacks have been recently unveiled. Although existing research has thoroughly addressed many single-layer attacks, the problem of detecting...
In cellular networks, under ARQ and SINR model of transmission, the effective downlink rate of packet transmission is the reciprocal of the expected delay (number of retransmissions needed till success). We define the cellular network capacity as the ratio of the basestation (BS) density and the expected delay. Exact characterization of this natural and practical but non-trivial (because of SINR temporal...
We present a distributed algorithm for joint power control, routing and scheduling in multihop wireless networks. The algorithm also provides for Quality of Service (QoS) guarantees, namely, end-to-end mean delay guarantees and hard deadline guarantees, for different users. It is easily implementable and works by giving local dynamic priority to flows requiring QoS, the priority being a function of...
In this article, we investigate the average transmission delay performance for the distributed multiple access cooperative communication systems with splitting opportunistic relay selection in the presence of strong co-channel interference (CCI). We consider a distributed wireless network with random access and analyze the impact of imperfect channel state information (CSI) due to CCI on latency....
In this paper, we analyze some basic metrics of an energy harvesting (EH) wireless network which consists of some EH access points (APs). The energy harvesting wireless network is modeled as a Poisson network. In the system, energy is harvested randomly from the environment and stored in energy queue (rechargeable battery) for data transmission. Obviously, the instability of energy will impact the...
The evolution of wireless networks and the low cost of WiFi technology, have enabled a promising scenario for deployment of these kind of networks in rural areas, as an effective alternative to interconnect distanced sites above tens kilometers. This work presents the results of the performance evaluation of a network with WiLD technology, based on simulation and a deployment in the Andean region...
In wireless networks, where each node transmits independently of other nodes in the network (the ALOHA protocol), the expected delay experienced by a packet until it is successfully received at any other node is known to be infinite for the signal-to-interference-plus-noise-ratio (SINR) model with node locations distributed according to a Poisson point process. Consequently, the information velocity,...
As the capacity demand of mobile applications keeps increasing, the backhaul network is becoming a bottleneck to support high quality of experience (QoE) in next-generation wireless networks. Content caching at base stations (BSs) is a promising approach to alleviate the backhaul burden and reduce user-perceived latency. In this paper, we consider a wireless caching network where all the BSs are connected...
This paper proposes a distributed relay assignment scheme with interference limitation for industrial wireless networks that exploits cooperative diversity to cope with problems of wireless channels and to enhance the reliability of data transmission. By combining the selection and incremental relaying schemes and by taking the channel status information and queue length at each node into account,...
This paper deals with admission control in wireless networks such as WiMAX or LTE. Because of the limited sources, available bandwidth has to be used effectively. In case, where multimedia traffic is considered, each type of service has different requirements for transmission rate and delay. The frequency band has to be divided between several service streams. In this paper, five basic types of service...
Transmission Evidence (TE for short) refers to a historic trail of the packet transmissions in the network. TE is collected and maintained in a distributed manner by the nodes in the network and can be queried on demand by a network forensics system to trace past events. The latter can facilitate crucial applications such as identifying malicious or malfunctioning nodes. Recently, we developed an...
Many of the distributed power control algorithms for wireless networks in the literature ignore the fact that while the algorithms necessitate communication among users, propagation delays exist in the network. This problem is of vital importance, since propagation delays are omnipresent in wireless networks. The Foschini-Miljanic algorithm is provably stable if there are no time-delays in the execution...
Stochastic linear-quadratic Gaussian nonzero-sum Nash games with constrained state information is proposed for joint control of power and rate in wireless networks. When each player(node) is constrained to use a linear Kalman-like state estimator to solve onepsilas optimal strategy, state estimators of two players are investigated according to information structure: the current output and a one-step...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.