The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Resource allocation is a critically important issue for cognitive networks, because it needs to not only meet the quality-of-service (QoS) requirements for the secondary users (SU), but also protect the QoS of primary users (PU) from degradation. In this paper, we develop the optimal power allocation scheme for the cognitive network, which can satisfy the QoS requirements of SUs and PUs simultaneously...
In this paper we introduce a reliable multicast concept for Device-to-Device (D2D) communication integrated into cellular network. In addition to the introduction of the basic concept, initial simulation results are presented as well. Clustering closely located devices which have local communication needs is a feasible and efficient way of solving the increasing data traffic requirements in the future...
In this paper we propose a power control policy over an imperfect fading channel within a cognitive spectrum sharing area. In particular, our proposed scheme maximizes the secondary user effective capacity subject to the average interference power and the secondary user transmit power constraints. We also investigate the minimization of average interference power at the Primary Receiver (PR) under...
China Train Control System level 3 (CTCS-3) transmits bi-directional track-train data via Global System Mobile for Railway (GSM-R) network, and GSM-R network should provide secure wireless environment to ensure train operation safety. GSM-R network handoff will cause a brief interruption of communication. If a train control message is on transmission during this interruption time, some message data...
In current wireless networks, channel access is controlled via either a TDMA- or a CSMA-based scheme. While usable in single-hop networks, these techniques are far from optimal and result in significant per-hop and per-packet delay an jitter. This makes multi-hop mesh networks unsuitable for several in-demand applications, including VoIP. We present a new medium access control (MAC) protocol for wireless...
This paper presents a decentralised cross-layer dynamic power control (DDPC) scheme for wireless mesh networks (WMNs). A general cross-layer occupation measure (COM) based on transmission scheduling probability (TSP) and power control policy (PCP) model is proposed. Depending on the network traffic application and multiple transmission activity (MTA), each user adjusts its power dynamically so as...
In this paper, an energy efficient adaptive modulation scheme is proposed for a wireless cognitive radio ad hoc network, where each node is equipped with cognitive radio and the network is an OFDMA system operating on time slots. In each slot, the users with new traffic demand will sense the spectrum and locate the available subcarrier set. Then they choose subcarriers with favorable channel condition...
Many real-time communication protocols have been studied to guarantee the communication requirements of distributed real-time systems. But, current techniques lack all or most of these requirements specially bounded message delivery time. In this paper we have proposed a Mac layer protocol called RDM+ with concepts similar to Round Data Mailer multi layer protocol. Our simulation results show that...
In this paper, we study bandwidth management of a wireless/optical based access/metro network in support of voice and data services. For voice services, we use a finite state Markov Chain to estimate the blocking probability of voice circuits over an Adaptive modulation and coding wireless channel, as a function of the channel parameters. For data services, we evaluate a rate matching and a buffer...
This paper explores the attributes, layering models and objective functions in cross layer designs for mobile ad hoc wireless networks by taking all the statistical characteristics and constraints from the physical (PHY) layer, media access control (MAC) layer and network (NET) layer into consideration. This paper reviews the entire network optimization across all the PHY/MAC/NET layers. At the PHY...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.