The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the promising enhanced features introduced in LTE-Advanced is relaying. Coverage extensions as well as enhanced throughput gain are attractive from the perspective of network operators. While functioning in the macro-overlaid network, relay offers the flexibility of random deployment (nomadic relay) at places where the communication link is congested due to an occasional event (e.g. festival)...
Radio energy harvesting model is an another method to extend the lifetime of wireless networks. In this paper, an energy harvesting model is given for amply-and-forward relay networks with aiding of ambient interferences. For this reason, the energy constrained relays harvest energy from the received signal and then use that harvested energy to amply and send that signal to the target. A time switching...
In this paper, we study how to provide optimal performance guarantee in multi-resource scenarios, such as Network Function Virtualization (NFV), where Virtual Network Function (VNF) resource demands of one Service Function Chain (SFC) are elastic and correlated with the end-to-end throughput of SFC. Previous works such as Dominant Resource Fairness (DRF) achieve this goal only if the demands are already...
While trying to get a service from the Base station it happens that many devices will find themselves competing to get the cellular service, which means each device will use the maximum power possible to win the competition, but if there is another solution that will allow the device to get what it wanted with minimum of energy, how the device will react to it? In other words, we know that the communication...
Security threats such as jamming and route manipulation can have significant consequences on the performance of modern wireless networks. To increase the efficacy and stealthiness of such threats, a number of extremely challenging, next-generation cross-layer attacks have been recently unveiled. Although existing research has thoroughly addressed many single-layer attacks, the problem of detecting...
To be able to efficiently utilize high data rates of 100 Gbit/s and beyond, protocols must be carefully selected for specific communication parameters. At the same time, communication parameters, such as data rate/latency requirements and the channel quality, are not static. This contradiction can be solved by switching to the best suited protocol when communicationparameters change. However, replacing...
Millimeter wave (mmWave) communication is a key enabling technology for 5G cellular systems. However, due to mmWave propagation characteristics, link length for very high rates is limited and will likely necessitate the use of relay nodes for longer-range ultra-high-speed backhaul communications. This paper investigates relay selection and scheduling to support high end-to-end throughput in mmWave...
Millimeter-wave communication in 60 GHz band is considered a promising technology to meet the explosive growth of data demand in Wi-Fi based WLAN. To address potential blockage for 60 GHz signals, multiple APs are proposed for such WLAN. This paper addresses the important problem of AP assignment and transmission scheduling for a multi-AP 60 GHz WLAN. We propose two AP assignment schemes with different...
The interference attack or better known as jamming attacks are very easy to implement affecting the service of any wireless communication system given the vulnerability of data sent to the user. This attack by denying the normal operation of the service detracts from the purpose of these systems. In general, a jamming attack is difficult to detect given the little experimental data provided by the...
To mitigate performance anomalies due to different transmission rates and to improve throughput performance in ad-hoc networks, a previous work has proposed a new method called user cooperative mobility. It also showed that the method achieved good improvement when users appropriately move. However, it only employed theoretical evaluation which does not include detailed behavior such as capture effect...
Penetration of multimedia communications with mobile Wi-Fi and tethering requires wireless LANs (WLANs) to guarantee a specific bandwidth in densely deployed WLANs. IEEE802.11e (HCCA) with 802.11aa could use inefficiently radio frequency as well as fail to provide each WLAN with enough CFP period in which sending opportunity of a terminal is guaranteed. To guarantee a specific bandwidth even in densely...
Demand for ad-hoc networks is increasing so it is expected ad-hoc networks will exist in close proximity in the future. A contention window control method, ACWA, which improves throughput of ad-hoc network against radio interference has been recently proposed. However unfairness of throughput between ACWA and DCF might be caused. We propose a modified ACWA method (GSAR scheme) which drastically improves...
Cumulative distribution function (CDF)-based scheduling (CS) has been known as an efficient technique for cellular networks, which satisfies arbitrary channel access ratio requirements of users in a cell, while efficiently exploiting multiuser diversity (MUD). In this paper, we mathematically analyze both throughput and energy efficiency (EE) of CS in a multi-cell downlink network where the users...
Non-Orthogonal Multiple Access (NOMA) is a promising multiple access technique for 5G wireless communication networks due to its higher spectral efficiency and user fairness. Power allocation is the key to improve the performance of NOMA systems. In this paper, we focus on a certain NOMA group of a hybrid NOMA system. We formulate a sum-throughput maximization problem for uplink under the constraints...
In the paper, we studied the solution of resource allocation problem with Coordinated Multi-Point(CoMP) in heterogeneous wireless networks. The utilization of CoMP technology enhances channel quality of users at the edge of cells, but it also brings more complexity to resource management of the network. To reduce this pressure, we exploited a feedback-based method to determine the allocation of users...
In this study, the resource blocks (RB) are allocated to user equipment (UE) according to the evolutional algorithms for long term evolution (LTE) systems. Particle Swarm Optimization (PSO) algorithm is one of the evolutionary algorithms, based on the imitation of a flock of birds foraging behavior through learning and grouping the best experience. Therefore, we propose a Simple Particle Swarm Optimization...
Wi-Fi enabled hand-held devices have quickly occupied the consumer market as a result of the remarkable customer acceptance of IEEE 802.11 standard. In this regard, the demand of high throughput introduces high throughput standards such as IEEE 802.11ac. It supports Dynamic Bandwidth Channel Access (DBCA), where a wireless station selects channel bandwidth dynamically based on the availability of...
In 5G, the small cell technology is proposed to cooperate with the cellular networks, and forms a Heterogeneous Network (HetNets) for achieving cooperative communications. The small cell-based cooperative communication brings several advantages: increasing system capacity in the indoor/outdoor hotspots, increasing wireless coverage, improving signal quality, reducing the eNB deployment cost, etc....
The fifth generation (5G) ultra dense network (UDN) is envisioned as a very dense deployment of low power base stations where heterogeneous radio access technologies are used to satisfy the data rate demand of users employing both licensed and unlicensed spectrum. In UDN scenario, conditions of the channels operating in licensed band may exhibit intermittent characteristics due to the varying level...
This study concerns about Beamforming techniques in a Multi-User Indoor environment at mm-Wave E-band. Directional mm-Wave measurement data are used as reliable radio channel reference for the study and, furthermore, are checked against advanced Ray Tracing simulations. The main goal is to assess the quality of Spatial Division Multiple Access using three different Beamforming schemes in order to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.