The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an incremental redundancy hybrid ARQ (IR-HARQ) scheme for the wireless local area network (WLAN) system employing multiband simultaneous transmission. The proposed scheme adopt the rate compatible low-density parity-check (RC-LDPC) codes based on IEEE802.11n LDPC codes and ensure backward compatibility with WLAN devices by using the current WLAN control frame. Additionally, it...
This paper proposes a method of TCP multi-pathization for IoT network by SDN. The method distributes packets according to the congestion between paths and IP packet length. Since it is performed over SDN, no changes of existing protocols and devices are required. The authors implement the method by actual IoT devices and evaluate QoS by experiment. The results of the experiment show that the TCP throughput...
In this work we report experimental tests on the performance of FTTX accesses using the mPlane measurement plane, including lab and field environments and above all we point out the role of such measurement plane in Software Defined Network architectures. For such an aim we show an experimental procedure based on a central unit (orchestrator) that automatically manages GbE links in a regional network...
A MANET or Mobile Ad-Hoc Network is decentralized in nature and it is basically a collection of heterogeneous mobile nodes which are autonomous and can communicate among themselves over the wireless link. In this infrastructure-less network, all the nodes dynamically route the packets by themselves with help of some protocols for sending or receiving the packet information. The ZRP or Zone Routing...
Security threats such as jamming and route manipulation can have significant consequences on the performance of modern wireless networks. To increase the efficacy and stealthiness of such threats, a number of extremely challenging, next-generation cross-layer attacks have been recently unveiled. Although existing research has thoroughly addressed many single-layer attacks, the problem of detecting...
ITU-R M.1842-1, which is one of the renowned specification for VHF data exchange system (VDES) devoted to maritime mobile applications, has been standardized wireless transmission protocols according to the peculiar characteristics of a maritime communications scenario. Generally, in the Annex-4 of ITU-R M.1842-1, the VHF data link protocols for maritime mobile services are described along with a...
Vehicular ad hoc network (VANET) is a particular class of mobile ad hoc network (MANET) that utilizes moving cars as nodes to establish wireless communications and exchange information between them without the need of infrastructure. VANET is a promising technology used to provide safety, efficiency, and comfort to the road users. Routing protocol has become one of the most challenging tasks for VANET...
Opportunistic communications through wireless ad-hoc mesh networks have been thoroughly studied in the context of military infrastructureless deployments, sensor networks and even human-centered pervasive networking. However, due to the lack of a model that accurately computes the probability distribution of the delay, we usually content ourselves with the mean values. Such an approach can limit both...
Due to the limitation of frequency resources, Long Term Evolution(LTE) is usually applied for the train-ground communication applications of Communication(CBTC) service, Wireless Local Network (WLAN) is used for the train ground applications of Passenger Information System (PIS) service and Closed Circuit Television(CCTV) service. Train ground communication systems for PIS and CCTV applications are...
QoS of applications in an edge node of mobile edge computing (MEC) could degrade due to congestion of wireless access or short of mobile edge computing resource. In order to improve QoS such as TCP throughput, we propose a VM migration method, which takes a VM from congested node to another node in a mobile edge. Users can choose a far but less-congested node, instead of a near but congested node...
The ability to provide a high Quality of Service is a crucial aspect in the acceptance and widespread dispersion of the Industrial Internet of Things and it has a key role to enhance the end user experience. The emerging fog cloud computing architectural concept aims to diminish the experienced latency while simultaneously providing a seemingly unlimited quantity of computational power by moving computations...
BBR is a recently proposed congestion control. Instead of using packet loss as congestion signal, like many currently used congestion controls, it uses an estimate of the available bottleneck link bandwidth to determine its sending rate. BBR tries to provide high link utilization while avoiding to create queues in bottleneck buffers. The original publication of BBR shows that it can deliver superior...
Recently, 5G systems started to explore the usage of mmWave bands both for access and backhaul. Cellular systems operating at such frequencies would achieve a significantly higher capacity than current systems due to the large frequency block available. Due to the propagation characteristics, highly directional mmWave links may frequently switch between Line-of-sight, Non Line-of-sight and outage...
Network performance is one of the most important entities in today’s long-distance networks. TCP congestion control mechanisms play an important role in these networks. Most of the current TCP congestion control mechanisms which are also known as TCP variants, detect congestion and slow down the packets transmission to avoid further congestion in the network. In this paper, three classes...
Multilayer Clustered Designing Algorithm is exploited to present MCDA - Hot Spot algorithm; a technique to increase the network throughput by alleviating the impact of hotspot issue on network lifetime. The network nodes in the hot spot region are in a flat layer form in contrast to rest of the network nodes that are grouped into clusters. This design substantially helps in achieving goal above. This...
The network infrastructures have been rapidly upgraded in many high-performance networks (HPNs). However, such infrastructure investment has not led to corresponding performance improvement in big data transfer, especially at the application layer, largely due to the complexity of optimizing transport control on end hosts. We design and implement ProbData, a PRofiling Optimization Based DAta Transfer...
We investigate adaptive transmission for tactical packet radio networks in which a source uses fountain coding to multicast a file to a number of destinations over time-varying links. We examine two strategies from the literature for packet-by-packet adaptation of the modulation and channel code. The maximum data-recovery rate philosophy attempts to maximize the throughput for each transmitted packet...
Joint pushing and proactive caching holds the promise of significantly increasing the throughput and decreasing the latency of content-centric wireless networks. In this work, we import the pushing and caching mechanism into a traditional packet-oriented network for decreasing the average queueing delay. Since the decreasing relies on extra costs paid for the pushing-caching mechanism, such as the...
Dual Connectivity(DC) is one of the key technologies standardized in Release 12 of the 3GPP specifications for the Long Term Evolution (LTE) network. It attempts to increase the per-user throughput by allowing the user equipment (UE) to maintain connections with the MeNB (master eNB) and SeNB (secondary eNB) simultaneously, which are inter-connected via non-ideal backhaul. In this paper, we focus...
ECN thresholds have limited operational range and very strict scope. Lower thresholds exacerbate the queue underflow while higher thresholds increase the queueing delays. In this paper, an Adaptive ECN (A-ECN) marking scheme is proposed to enhance the performance of ECN. A-ECN can adaptively adjust ECN marking thresholds in different scenarios to achieve good generality. Therefore, network operators...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.