The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a wireless domain where a mobile user accesses heterogeneous wireless technologies with multiple interfaces, a multi-path scheduling algorithm can benefit mobile users' experience by aggregating different network bandwidth together. However, existing literature actually shows that for TCP flows, it may not be the case. To better exploit multi-path scheduling for TCP connections, this paper presents...
Wireless clients must associate to a specific Access Point (AP) to communicate over the Internet. Current association methods are based on maximum Received Signal Strength Index (RSSI) implying that a client associates to the strongest AP around it. This is a simple scheme that has performed well in purely distributed settings. Modern wireless networks, however, are increasingly being connected by...
In this paper, we proposed a simple yet novel multicast scheduling scheme for IEEE 802.16e wireless metropolitan area networks. Specifically, we want to solve the problem that how the base station schedules the data in a multicast superframe such that mobile stations can receive their required multicast data and the total awake time of mobile stations is minimal. We first prove that this problem is...
The IEEE 802.16e standard, also known as mobile WiMAX, has emerged as an exciting mobile wireless communication technology that promises to offer both high throughput and guaranteed quality of service (QoS). Call admission control (CAC) scheme serves as a useful tool for WiMAX, which ensures that resources are not overcommitted and thereby, all existing connections enjoy guaranteed QoS. Existing CAC...
Energy consumption is a concern with mobile de-vices nowadays. Network interfaces are among the most power hungry components in these devices. In this paper, we describe the design and implementation of a client-centric protocol for energy efficiency. Inspired by earlier work, our protocol works by exploiting the TCP flow-control mechanism to shape incoming traffic into bursts in order to utilize...
Wireless mobile multimedia communications are being greatly increased in the number of users, diversity of applications and interface technologies. Future mobile based Internet will accommodate various wireless technologies and also will need to provide sufficient end-to-end QoS (Quality of Service) mechanism to provide enhanced user's satisfaction. In this paper, we propose a new adaptive end-to-end...
In this paper, we extends bandwidth balancing technique in wired networks to operate in mobile ad hoc networks (MANETs). In bandwidth balancing in Distributed-Queue-Dual-Bus (DQDB), different nodes occupy the same channel, and information about the bandwidth is transferred between nodes in the unused bandwidth. Similarly, in wireless networks, the capacity on a channel is shared by several sources...
The congestion control scheme plays a critical role in the multicast communication. Without a proper congestion control mechanism, multicast protocols would cause unfairness while sharing network bandwidth with other flows. We propose a deliberated congestion control scheme to multicast multimedia contents for smart phones retrieving effectively. Our key idea is to detect the single trip time of packet...
Future wireless access will involve a variety of integrated and interworking technologies. Depending on the conditions (e.g., the specific application, the quality of service requirements, the user mobility) each session will be served through the most suited access network; following some event, there will be a variation of the access technology, which is called vertical handover. Although the use...
To combat the challenges(the mismatch between throughput and layer delivery ratio, the useless packets in high layers due to the loss of packets in low layers) brought by the layered encoding to data scheduling for P2P streaming in the mobile network, We propose a new data scheduling scheme, named MLayerP2P. The key idea of the MLayerP2P is: A 3-Stage Model is used to schedule the absent streaming...
This paper intends to propose a novel handover algorithm to balance the load of the layers in a multi-reuse scenario. Each layer works independently from each other and it has its own scheduling process, coverage and mobile stations attached. The algorithm proposed balances the resources among layers by moving mobile stations from one to another layer according their QoS requirements and channel condition...
In Ad Hoc network, transport protocol design is appearing to the research surface with quite innovative conceptions. TCP, a widely used protocol in the wired world, is not suitable for Ad Hoc Networks. To prevail over this problem researchers have provided many solutions that are either variants of TCP or independent of TCP. ATP is one of the protocols designed for ad hoc network independent of TCP...
The most common physical layer models for network simulations are the bit error rate and the SNR threshold model. In time-varying channels such as those experienced in vehicular networks, these models are assumed valid as long as the packet duration is less than the coherence time of the channel. The coherence time is a statistical measure of the channel invariance. It is independent of the signal...
In this paper, we consider the throughput performance in relay-aided multi-cell orthogonal frequency division multiple access (OFDMA) system, when mobile user (MS) is uniformly distributed and relay station (RS) is located at some typical positions, such as dRS = 0:5 and dRS = 0:85, where dRS is the ratio between the distance from RS to base station (BS) and the cell radius. Although cooperative diversity...
The TCP throughput deteriorates in networks with large bandwidth-delay product, and new congestion control algorithms have been proposed to address such deterioration. Traditional TCP protocols treat all packet loss as a sign of congestion. Their inability to recognize non-congestion related packet loss has significant effects on the communication efficiency. The proposed protocols such as TCP - Reno,...
In this paper we model the data traffic congestion scenario in a vehicular ad-hoc network, and we apply the Adaptive PI Rate Controller (APIRATE) to deal with the congestion. Derived from classical control theory, the APIRATE controller performs AQM (Active Queue Management) by controlling the source rate based on the instantaneous queue length of the congested node. We then study the performance...
In this paper, we study about bandwidth and delay estimate in WMAN, and propose a method to obtain different delay estimate in multi-path by transmission detect packets. So that we can estimate any packet's transmission delay in each path. According to delay estimates of the different path, adjust the order of sending of data packet in Cache. So as to achieve the purpose of reducing delays of the...
In this paper we propose a mechanism to enable Flexible Spectrum Usage (FSU) in Local Area (LA) indoor deployment scenario of International Mobile Telecommunications-Advanced (IMT-A) with several operators in the given geographical area. The proposed scheme is referred to as policy assisted light Cognitive Radio (CR) enabled FSU, because it follows the CR cycle and considers policy as an important...
Mobile Ad-hoc Networks (MANETs) are susceptible to both insider and outsider attacks more than wired and base station-based wireless networks. This is because of the lack of a well-defined defense perimeter in MANETs, preventing the use of defenses including firewalls or intrusion detection systems. This lack of perimeter calls for implementation of security in a distributed, collaborative manner...
Mobility management solutions designed for heterogeneous networks can provide seamless handover and service continuity. Thus, ongoing TCP sessions can remain active, even when mobile node handovers from one access network to another. In such seamless handover, packet loss can be avoided but TCP still undergoes through several performances degradation issues due to change of network characteristics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.