The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To alleviate the pressure brought by the explosion of mobile video traffic on present cellular networks, small cell base stations (SBS) with caching ability are introduced. In this paper, we consider the caching strategy using network coding for mobile users over heterogeneous wireless network containing SBSs. We formulate an integer programming problem to minimize the average number of packets downloaded...
The explosion of mobile data traffic has an adverse effect on communication delay and system performance in 5G wireless network. Deploying a number of caches on the base stations(BSs) to cache content has became an essential solution. In this paper, we present a caching structure and propose a CMAC(Cooperative Multicast-Aware Caching) strategy to reduce the average latency of delivering content. The...
In this paper we have proposed the model of load balancing in a mobile network in order to decrease the coefficient of sector utilization. This method allows increasing the availability of the mobile network resources using forced radio resource redistribution. The mathematical model for evaluation of the volume of extra load that occurs under repetitive calls under the conditions local overload of...
For wireless sensor networks deployed to monitor and report real events, event source-location privacy (SLP) is a critical security property. Previous work has proposed schemes based on fake packet injection such as FitProbRate and TFS, to realize event source anonymity for sensor networks under a challenging attack model where a global attacker is able to monitor the traffic in the entire network...
This paper proposes a Markov decision process (MDP) based base station management scheme that dynamically and collectively manages activation of a group of base stations depending on the time-varying traffic demand for power conservation in self-organization networks. Our MDP model is unique in a sense that it accurately captures the dynamics of handover traffic among neighboring cells, and it formulates...
Utilization of device-to-device communication links provides an alternative way for mitigating the skyrocketing mobile data growth that challenges cellular operators nowadays. Namely, the owners of these devices can serve requests of their neighbors for the files that are stored at their caches. However, users are unwilling in general to serve requests of others, since data transmission incurs energy...
Mobile wireless networks increase in popularity and pervasiveness, we are faced with the problem of merging a diverse number of wireless networks. The wireless communications of fourth generation is expected to combine a potentially large number of heterogeneous wireless technologies in what could be considered a vast step forward toward universal seamless access. One of the main problems for seamless...
We study the occupied buffer size in intermittently connected wireless networks with Base Stations (BS's). In this kind of networks, the link between two nodes is intermittent because of external constraints, and there exists Base Stations following the uniform distribution. With the condition that each node has the same probability 1 − p to be inactive during each time slot, there exists a critical...
As the mobile traffic is expected to continue its exponential growth in the near future, energy efficiency has gradually become a must criterion for wireless network design. Three fundamental questions need to be answered before the detailed design could be carried out, namely what energy efficiency network is, where the energy efficiency improvement may come, how the energy efficiency evaluation...
We study the multicast throughput capacity for hybrid wireless mobile ad hoc networks (MANETs) with a directional antenna and delay constraint. The hybrid wireless network consists of a mobile ad hoc network with nodes and regularly placed base stations connected by high-bandwidth wired links. For the MANET, there are multicast sessions and each multicast session has one source which transmits...
In some networks, a mobile node must be located securely as well as accurately. One way to locate is for base stations to use time-difference-of-arrival multilateration. An attacker that can transmit at different times in different directions may falsify its position with respect to known base stations. Previous work proposed hiding the base stations, following a model of "security through obscurity...
In this paper, we derive closed-form expressions for the call dropping probability and call completion probability for a cellular network with general distributions for the cell dwell time. In particular, we consider a non-homogeneous cellular network in which the handoff request failure in each cell follows a uniform distribution. We assume throughout this paper that the channel holding time is exponentially...
Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional...
It is proved that wireless network is suitable for disaster information infrastructure because of its robustness, mobility and flexibility. However current conventional wireless networks have limit in communication distance because of low electro-magnetic power density, non-directional antenna. This is quite fatal as emergency network particularly in mountain areas like Japan. In order to solve those...
It is proved that wireless network is suitable for disaster information infrastructure because of its robustness, mobility and flexibility. However current conventional wireless networks have limit in communication distance because of low electro-magnetic power density, non-directional antenna. This is quite fatal as emergency network particularly in mountain areas like Japan. In order to solve those...
Global warming caused many countries to call for drastic energy savings within the coming years. At the same time we see a rapidly increasing demand on Telecom services. Estimations of the future Telecom and ICT sectors' energy consumption are varying; nevertheless all predict an increase of energy consumption. On the other hand, the ICT sector is believed to be one of the solutions on the way to...
Recently, in an assessment of the potential damage that may result from a NANKAI linkage-type earthquake, expected to occur in the future, we became concerned about information isolation that may arise in the case of many islands of Seto Inland Sea. Further, when a disaster strikes an island, a vessel and an operation ship (liner) have been utilized for providing the disaster-stricken areas with support...
In this paper, the deployment of IMS functionality in femtocell environment is investigated and overviewed. Femtocell is a small cellular base station designed for use in residential or small business environments. It allows service providers to extend service coverage inside of our home, especially where the existing access is limited or unavailable. In the mean time, the IMS, as emerging framework...
Due to the mobility of hosts, limited battery power and processing power of mobile hosts, and the low bandwidth of wireless channels, the existing distributed algorithms designed for the static distributed systems required to be restructured before these can be used in the cellular wireless networks. The group mutual exclusion (GME) problem is an interesting generalization of the classical mutual...
The mobility with quality of service in wireless networks is a reality ever closer. The need for mobility while communicating becomes more and more necessary. Technologies for wireless networks with interoperability develops the concept of "communications anytime anywhere". Interoperability uses the handover to ensure the mobility of a mobile terminal through various communication infrastructures,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.