The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an adaptive channel access (ACA) mechanism for LTE-U and WiFi coexistence in an unlicensed spectrum. To support the ACA mechanism, we introduce a new time-frequency structure, and a modified listen before talk (MLBT) functionality for channel contention of LTE-U users. Moreover, we also introduce a dynamic channel switch (DCS) sub-mechanism and an adaptive almost blank subframe...
As the number of small cells is increased to improve mobile network capacity, disparity in the traffic load between small cells will unexpectedly widen, and then user throughput in a small cell with high traffic load will decrease. We propose a novel coverage control method that adaptively controls cell coverage for areas where users are densely located by using cell-specific beamforming with multiple...
Reduction of energy consumption is becoming a crucial aspect of wireless communications, due to the need of lowering CO2 emissions and enhancing mobile network operators OPEX. In this work we consider a heterogeneous mobile network topology with coexisting macrocellular and microcellular Base Stations (BSs). By employing two energy optimization heuristics we determine operational profiles for the...
In next generation mobile communication systems, the cell size reduction is unavoidable due to the transmission power limitation at user equipments (UEs). The small cell size accelerates traffic non-uniformity between cells, and this situation brings non-uniform transmission performance between cells across the system. The inter-cell carrier aggregation (CA) technique, which aggregates multiple component...
Routing protocols for mesh and ad-hoc networks are designed under the assumption that the underlying channel is unreliable and nodes may be mobile. Therefore, route failure detection and recovery are important components of the design. However, under high traffic scenarios, an aggressive route failure detection technique may create a chain of routing messages which interfere with the data communication...
Mobile WiMAX is a burgeoning network technology with diverse applications, one of them being used for VANETs. The performance metrics such as Mean Throughput and Packet Loss Ratio for the operations of VANETs adopting 802.16e are computed through simulation techniques. Next we evaluated the similar performance of VANETs employing 802.11p, also known as WAVE (Wireless Access in Vehicular Environment)...
Motivated by the fact that when selfish users choose their policies independently without any coordination mechanism, Nash equilibria could result in a network collapse, we develop in this paper a hierarchical distributed learning framework for decision-making in heterogeneous cognitive networks. We introduce the Nash-Stackelberg fuzzy Q-learning, with the network as leader that aims at maximizing...
Seamless performance of communication applications is critical for today's mobile workers who are dependent on their mobile computing devices. One area of such criticality is the smoothness of handovers between Access Points (APs) in 802.11 based communications. In this work, two heuristic handover algorithms based on indoor positioning are designed and tested on 802.11 based networks. The two algorithms,...
This paper studies the resource allocation algorithm for multicasting scalable video coding (SVC) source in WiMax network. In order to effectively utilize the radio resources, the proposed scheme considers the channel condition of each mobile station for the establishment of multicast groups. We considers that a service multicast group, which receive the same service traffic simultaneously, can be...
Based on a survey on the technical challenges to the future radio access network beyond LTA-Advanced, which should offer very high average areal throughput to support a vast amount of data traffic and user density with energy-efficient operation, we discuss the potential techniques and propose an overall framework.
Future cellular mobile radio networks will exhibit a much more dense base station deployment than 2nd or 3rd generation communications systems, particularly with regard to traffic coverage. Hence, a significant increase in power consumption of cellular networks can be expected. In order to counter this trend, energy efficiency of such networks should be increased considerably. Concerning energy efficiency,...
In wireless cellular networks, indoor coverage is a problem from the perspective of the service provider. A femto Access Point, also known as femto AP, is utilized to solve the problem. Generally, the femto AP is deployed in a home to support indoor users. Since there might be a small number of users in the home, it could be expected that the traffic load of the femto AP is lower than its wireless...
In this paper, we analyze an anonymized packet trace of mobile handset data traffic from a major European mobile Internet Service Provider (ISP). Our goal is to understand the effect of the differences between this traffic and the traffic in wired residential networks. This knowledge can be useful for adapting the network to specific mobile usage. We show that, compared to wired users, mobile users...
It is undesired to drop an ongoing call in wireless systems; however, call dropping may occur in two situations, one of which is hand-off between cells in cellular wireless networks, the other of which is channel withdrawal in wireless systems with spectrum leasing. Channel reservation is a common solution to reduce the two types of call dropping. Optimal numbers of reservation channels were separately...
As mobile Internet environments are becoming dominant, how to revamp P2P operations for mobile hosts is gaining more and more attention. In this paper, we carry out empirical traffic measurement of BitTorrent service in various settings (static, bus and subway) in commercial WiMAX networks. To this end, we analyze the connectivity among peers, the download throughput/stability, and the signaling overhead...
In recent years, an ever-increasing growth in international air traffic has made airports the most complex and busiest built environments known. Provisioning quality of service (QoS) to passengers and staff, in such a dynamic environment, is extremely challenging. However, having previously designed and determined the passenger flow according to flight departures, in this paper we propose an ad hoc...
Some research work has been done on topology control in wireless networks. In this work we have presented the traffic load analysis of the mobile node in the wireless network by cluster concept. The wireless domain has been partitioned into different zones or clusters. Here we present analytically, the hops distance between random cluster heads. We have considered the minimum hops distance between...
In this paper, we study the fairness problem for downlink traffic in multi-hop wireless backhaul networks with selfish nodes, including Transit Access Points (TAPs) and the gateway. Unlike the transmission of uplink traffic in which transit packets are dropped at intermediate TAPs, almost all downlink link traffic is dropped at the gateway. Therefore, we design an incentive-based mechanism where the...
Malicious data packet flooding attacks interfere with services of a victim node such as laptop computer, cellular phone, etc. in wireless ad hoc networks. The victim node is hard to distinguish traffics performing data packet flooding attacks from normal burst traffics. Hence, this paper proposes a period-based scheme so as to prevent from malicious data packet flooding attacks with enhancing the...
This paper proposes an adaptive P2P rate control scheme to provide fairness between P2P traffic and traditional Internet traffics and throughput improvement. The proposed scheme adjusts P2P traffic volume through the temporary transmission interrupts when network experiences congestion.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.