The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we compare communication schemes in scenarios of interest for underwater networks where multiple nodes collaborate towards the accomplishment of a target detection and tracking task. We consider two specific cases: in Scenario 1, a mobile Autonomous Underwater Vehicle (AUV) i) collects data from a set of fixed sensors deployed on the seafloor or ii) transmits data to the same nodes...
Communication between two neighboring nodes is the most basic operation in wireless networks. Yet very little research has focused on the local delay, defined as the mean time it takes a node to connect to its nearest neighbor. In this paper, we derive the local delay in Poisson networks with ALOHA and find the conditions for which the local delay is finite. It turns out that while the local delay...
Compared to traditional wireless networks, wireless mesh networks (WMNs) are more efficient in terms of deployment, configuration, and maintenance. However, connecting all routers through wireless connection in WMNs results in remarkably lower bandwidth of the network backbone. Multichannel technology, where non-interfering channels are used to enable mesh routers to send and receive packets simultaneously,...
Vehicle-based networks need energy-efficient communication to extend the battery lifetime, which subsequently extends the mission time of the node. We observe that these kinds of networks operate under different assumptions than traditional static sensor networks. The main difference is that these are small-scale networks. This motivates the need for a protocol that is optimized for such scenarios...
An analytical formulation of the saturated delay of prioritized contention access (PCA) in the presence of hard distributed reservation protocols (DRPs) and beacon period (BP) in WiMedia MAC is presented The analytical framework is formulated for one Hard DRP class and N PCA classes. The state transition diagram for the ith priority PCA class is modeled by a tridimensional discrete-time Markov chain...
In this paper, the Frame Descriptor Table (FDT) concept, invented to enable MAC protocols applying a frame based reservation strategy to cope with the requirements of 4G mobile radio networks, is evaluated concerning its efficiency in Relay Enhanced Cell (REC) scenarios. MAC protocols for 4G mobile radio networks, also known as IMT-Advanced systems, will operate on high data rate channels resulting...
Future mobile radio networks will have the requirement of very high data rates. Typical wireless data communication will not only occur in short range scenarios like hotspots in airports, city centres, exhibition halls, etc., but also in wide area environments, e.g. a moving car in a rural environment. Data services will require a ubiquitous mobile radio system and demand better quality of service,...
In this paper we consider the problem of minimizing the total energy for all devices in a wireless infrastructure network. The wireless devices use transmission power control and power saving mode to conserve energy. In particular we consider a polling-based MAC protocol which determines optimal power schedules (therefore the transmission rates) for all devices. Moreover, we have considered two grouping...
With the proliferation of wireless communication technologies and mobile computing devices, research interest has grown for location-aware systems and services. We propose LAAC, a novel location-aware access control protocol based on a coarsely defined location area that is enclosed by overlapping areas of multiple access points. Accordingly, a location key for location claim is derived from the overlapping...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.