The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Broadcasting (one-to-all communication) is one of most important and fundamental research problems for information dissemination in all types of networks. In this paper, we mainly focus on the minimum-latency broadcasting in known topology Wireless Mesh Networks (WMNs), in which the network topology and the size is known in advance. It is well known that the computation of a minimum-latency broadcasting...
Considering a small-scale fading environment in a dense random wireless network, we investigate the impact of the carrier-sensing threshold on the link performance under the premise of a fixed carrier-sensing range. At first, we assume a close transmitter-receiver distance and model the network nodes as a homogeneous Poisson point process (PPP). Then we present a simple analysis model of the conditional...
Glossy is a flooding-based communication primitive for low-power wireless networks that leverages constructive interference to achieve high reliability. The Low-power Wireless Bus (LWB) uses Glossy to abstract an entire wireless network into a shared bus like topology. As Glossy is not designed as a secure communication protocol, Glossy and hence LWB are vulnerable to unauthorised eavesdropping and...
We investigate the impact of mobility on energy consumption in mobile Ad hoc networks in this paper. Considering a cell-partitioned model of a delay-tolerant mobile ad hoc network with Markovian mobility, we focus on that the communication only occurs in the same cell or the adjacent cell. In this model, we characterize the mobility which have an influence on energy consumption as the nodes' maximum...
In this paper, we study the link scheduling problem considering the fluctuating fading effect in transmissions. We extend the previous deterministic physical interference model to the Rayleigh-fading model that uses the stochastic propagation to address fading effects. Based on this model, we formulate a problem called Fading-Resistant Link Scheduling (Fading-R-LS) problem, which aims to maximize...
Node mobility, as one of the most important features of Wireless Sensor Networks (WSNs), may affect the reliability of communication links in the networks, leading to abnormalities and decreasing the quality of service provided by WSNs. The mCWQ calculus (i.e., CWQ calculus with mobility) is recently proposed to capture the feature of node mobility and increase the communication quality of WSNs. In...
Ultra-dense cellular networks are emerging as one key characteristic of 5G wireless networks. In this context, frequency reuse is a fundamental technology enabler for efficient utilization of limited spectrum resources. In this paper, we investigate the in-band Full-Duplex (FD) self-backhauling architecture, in which Base Stations (BSs) operate on the same spectrum used by the users to access the...
The individual applications of network coded opportunistic routing and successive interference cancellation have been proven with significant improvement on throughput performance of wireless multi-hop networks, but there lacks practical optimization on their combination application. Based on a TDMA system, this paper models the throughput maximization as network utility function maximization problem...
Energy efficiency of uplink users is critical for evaluating the energy consumption of heterogeneous cellular networks (HCNs) with heavy loading. The energy efficiency of user equipments (UEs) in HCNs depends heavily on power control scheme as well as maximum power constraint. This paper investigate the energy efficiency of uplink UEs in HCNs taking into account the flexible power control policy along...
Interference between concurrent transmissions causes severe performance degradation in a wireless network. This paper addresses interference cancellation to enable simultaneous packet receptions at a node with a single radio in Wireless Sensor Networks (WSN). Interference cancellation is particularly important for WSN as most of its applications rely on convergecast where all the traffic in the network...
Due to its mathematical tractability, the homogeneous Poisson point process (PPP) has been employed to model wireless networks and analyze their performance. The PPP has the fundamental property that in a network with n nodes, the n nodes are distributed independently from each other. As such the PPP is not a suitable model for many networks where there exists a repulsion among the nodes. In order...
This paper represents the design, feasibility evaluation and performance validation of ICMR, a novel cross layer protocol that can maximize concurrent transmissions and avoid data frame interference in wireless networks, achieving higher throughput comparing with the 802.11 standard and other state-of-the-art protocols. Observations on the 802.11 standard reveal that nodes degrade the network throughput...
In this paper, we propose a maximum dispersion based approach for the problem of determining the feasibility of a set of single-hop rates in SINR model. Recent algorithmic work on capacity maximization has focused on maximizing the number of simultaneously scheduled links. We show that such an approach is not suitable for the problem. We present a polynomial time algorithm to determine the feasibility...
We consider an interference network tapped by external eavesdropper(s) in which each legitimate transmit-receive pair conceals its communications by using joint transmit-based friendly jamming (TxFJ) and receiver-based friendly jamming (RxFJ). Specifically, TxFJ is realized at the transmit side using MIMO precoding while RxFJ is achieved at the receiver side of each link by leveraging the state-of-the-art...
Recently, it has been shown that in a cache-enabled interference channel, the storage at the transmit and receive sides are of equal value in terms of Degrees of Freedom (DoF). This is derived by assuming full Channel State Information at the Transmitter (CSIT). In this paper, we consider a more practical scenario, where a training/feedback phase should exist for obtaining CSIT, during which instantaneous...
We consider a wireless network of static nodes where each transmitter-receiver pair employs slotted Aloha, electing to transmit with a common contention probability p, and we further assume the Rayleigh fading varies with each time slot. The random point processes of actual transmitters in a given time slot (along with their random fades) determine the interference seen by a reference receiver, and...
In the minimum latency broadcasting problem with interference in concern, some previously proposed heuristics where broadcasting nodes with an ability to reduce their transmission range to their farthest nodes have shown an improvement in decreasing interference thus decreasing latency. In this paper, we propose an enhancing scheme for the problem by allowing nodes, which are not selected to be the...
Video streaming applications over wireless networks have been turned out to be immensely popular in recent times. In this thesis, we study the buffering schemes streaming in heterogeneous wireless networks for the VBR video. An analytical framework is presented to derive the number of expected jitters and buffering delay in average. Through experimenting with a wide range of buffering schemes, we...
The impressive growth of secrecy-sensitive wireless applications calls for methods to complement traditional cryptography. In particular, physical-layer security is attractive to enhance communication confidentiality by exploiting the characteristics of the wireless environment. Recent works on information-theoretic wireless network secrecy have shown how to exploit interference to enhance the level...
Recently, IoT (Internet of Things) devices are disseminated into various kind of life circumstances. In network which consists of tremendous nodes, WSN (Wireless Sensor Network) attracts the attention of manufacturers who want to build data collecting network for realizing wealthy life for human. WSN can establish wireless network for relaying the obtained data from sensor nodes to the sink node while...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.