The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the use of multi-channel MAC protocols in the Wireless Sensor Networks has attracted the attention of many researchers. In this paper, we analyze the different techniques that are used in multi-channel MAC protocols proposed for WSNs. These protocols often use either a centralized or a distributed manner to select and allocate channels. We present HMC-MAC, a Hybrid Multi-Channel MAC...
Topology control for ad-hoc networks is crucial due to the absence of a fixed infrastructure that can guarantee satisfactory connectivity among communication nodes. In this paper, we study the impacts of adjustment of transmission power as a means to control the network topology (connectivity) to the signal-to-interference-plus-noise (SINR) ratio and the number of hops between two nodes, where the...
We study the symmetric degrees-of-freedom (DoF) of partially connected K-user interference networks in which the transmitters are unaware of the actual channel gain values. Several linear algebraic and graph theoretic concepts are introduced to derive new outer and inner bounds on the symmetric DoF for arbitrary network topologies. We evaluate the bounds for a class of networks, showing that the bounds...
The existing 3D topology control methods can not be applied to initial disconnected network topology and do not consider connectivity extension. Although extending Coop. Bridges scheme to 3D space can solve it, the induced network topology is not energy efficient. In this paper, we propose the Connectivity-enhanæd Interference-aware Energy-efficient Topology Control (CIETC) for 3D cooperative ad hoc...
In a multi-radio multi-channel wireless mesh network, a channel assignment that is based on a fixed number of available frequency channels may cause co-channel interference, which degrades the network throughput. We address this problem by ensuring interference-free communication among the mesh nodes. The main purpose of this work is to determine the minimum number of non-overlapping frequency channels...
While underwater acoustic sensor networks (UWSN) are still considered to be in their development phase, professional users are starting to understand their future potential. For example, large areas encircling offshore oil installations need to be environmentally supervised. UWSNs consisting of a large number of sensor nodes can present a viable solution to this challenge. One way to build such networks...
We propose to enable high-throughput, scalable communication for cooperative autonomous vehicles through zero mutual interference (ZMI) networks. Cooperation in complex environments relies on wireless communication, but conventional wireless networks are not designed for cooperative autonomous vehicles and are fundamentally limited by mutual interference. Our approach is to avoid mutual interference...
Interference is a major performance bottleneck in Heterogeneous Network (HetNet). The LTE-A working groups are actively studying enhanced inter-cell interference coordination (eICIC) techniques such as almost blank subframes (ABS). We propose a two timescale hierarchical radio resource management (RRM) scheme for HetNet with dynamic ABS control. The long term controls, such as dynamic ABS, are adaptive...
Due to the large number of wireless cells that are required for accurately evaluating inter-site interference in cellular networks, computational resources often pose a considerable limitation. In this paper, a novel method for modeling interference at the edges of the region of interest (ROI) of the cellular topology is proposed. While it shares conceptual ground with previous wrap-around techniques,...
In this paper we propose an algorithm to address the emergency case of an access point (AP) failure by adjusting a radio parameter of the neighboring APs. The goal is to minimize the coverage gap while at the same time: a) restrain imposed interference as much as possible and b) provide adequate load fairness among the APs. We assume an 802.11 infrastructure network where initially every mobile terminal...
In this work, the relation between the key parameters of Wireless Information-Theoretic Security, namely the probability of non-zero secrecy capacity, the outage probability, and the shadowing deviation is investigated. The purpose is to provide a framework to identify the boundaries of secure communication from a physical layer standpoint in MANETs. This framework is heavily influenced by the intrinsic...
In this paper, two novel energy efficient resource allocation schemes are proposed for beyond next generation mobile networks. The schemes take into account the clustering capability of base stations before assigning users to the base stations. A topology management scheme that adjusts the number of active base stations in accordance with the traffic load and also responds to QoS deterioration is...
The existence of under-utilized spectrum and the congestion of certain spectrum give rise to development on cognitive radios as a promising technology to address these problems. However, the general precondition that secondary users should evacuate from the channel which primary users are willing to use, makes the cognitive ad hoc networks vulnerable and unstable since network partition may occur...
Network-Wide Broadcasts (NWBs) are a fundamental operation for Wireless Mesh Networks (WMNs), which are required by routing and for distributing information to all nodes in the network. Many optimizations for NWBs exist which aim to counter the broadcast storm problem by reducing redundant transmission. However removing the redundancy can also hurt reliability in lossy networks like WMNs. We therefore...
Recently, two trends in wireless communication are observable. First, traffic patterns tend to be unsaturated, due to an enormous increase of traffic types like mobile video and voice streaming. Second, new standards like IEEE 802.11n or IEEE 802.11ac allow huge physical data rates up to several Gbit/s. However, to utilize these data rates an efficient usage of the new frame aggregation feature is...
A lot of transition mechanisms have been proposed and standardized in Internet Engineering Task Force (IETF), to support the coexistence and interoperability of IPv4 and IPv6. Among them, the 4over6/6over4 edge network tunneling technique has become a particular hot subject recently. To apply this technique into real ISP networks, there is a practical problem: planning the placement of the tunnel...
Recently, a novel 3D wireless mechanism based on 60 GHz band has been proposed to mitigate the job completion time (JCT) in Data Center Networks (DCNs), where signals bounce off DC ceilings to establish wireless connections. The 3D scheme could alleviate hotspots in DCNs with flexible multigigabit wireless links, which bypasses the line-of-sight limitation of 60 GHz wireless links. However, the novel...
In order to cope with the expected increase in traffic demand, the large-scale deployment of Small Cells (SC) becomes a cost-efficient way to realize the foreseen capacity explosion in the near future. In this paper we investigate, for a particular forecast in the 2020, what are the requirements in terms of capacity per area unit and how SC densification along with other design criteria can fulfill...
It has been demonstrated that in wireless networks, Blackholes, which are typically generated by isolated node failures, and augmented by failure correlations, can easily result in devastating impact on network performance. Therefore, many solutions, such as routing protocols and restoration algorithms, are proposed to deal with Blackholes by identifying alternative paths to bypass these holes such...
Private Mobile Radio (PMR) networks are cellular infrastructures dedicated to be used by professionals, such as public safety, military, industry and transportation organizations. In those networks, resources are scarce, and there are strong Quality of Service (QoS) requirements. The emergence of new services which need more bandwidth has made the world PMR leader focus on the LTE-Advanced protocol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.