The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents Markov Chain modeling of the randomly deployed IEEE 802.15.4 based Wireless Personal Area Networks (WPAN) in which, the wireless sensor nodes communicate to the coordinator in a single hop. In Most of the previous works, the un-slotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) channel access mechanism and the sensor nodes without buffer are considered for...
Mobile ad hoc network (MANET), a flexible peer-to-peer networking technology without pre-existing infrastructure, holds great promises for many critical applications like emergency networks, metropolitan mesh networks, and sensor networks. In this paper, we introduce our recent progress in capacity studies for MANETs with a deterministic Medium Access Control (MAC) protocol, in particular, the capacity...
Competitive environment has led popularity of VoIP over WiMAX due to its large transmission bandwidth coverage, and Quality of Service (QoS) support. For voice calls applications such as MSN Messenger, Google Talk, and Skype, VoIP is an emerging technology for WiMAX networks. In this kind of network, performance analysis of node mobility depends on network connectivity. This paper has considered horizontal...
We investigate the performance of delay constrained data transmission over wireless networks without end-to-end feedback. Forward error-correction coding (FEC) is performed at the bit level to combat channel distortions and random linear network coding (RLNC) is performed at the packet level to recover from packet erasures. We focus on the scenario where RLNC re-encoding is performed at intermediate...
A volcano monitoring system plays a key role for launching emergency early warning, and the use of alternative technologies have proven their effectiveness in this setting, which is the case of wireless sensor networks. For surveillance systems, the real-time requirement is mandatory due to the need for immediate access to the signals derived from a natural disaster where the goal is safeguarding...
The IEEE 802.11p is an emerging wireless protocol dedicated for Wireless Access in the Vehicular Environment (WAVE). It employs the Enhanced Distributed Channel Access (EDCA) mechanism to access the channel. Its objective is to provide differentiated services to vehicular networks which are delay-sensitive and requires high communication throughput. In this paper, we carry out comprehensive performance...
Cloud computing is becoming commonly used for enterprise systems. Users utilize WAN, the Internet, or a wireless network to access the cloud service. These networks often have large RTT and packet loss ratios (PLR), so if users communicate via TCP widely used for accessing cloud services, the throughput decreases and the access quality of the cloud service deteriorates. Therefore, much TCP acceleration...
In this paper, we investigate the topology boundary conditions in wireless mesh networks (WMNs) with focus on the maximum network diameter of such networks under different performance requirements. Specifically, we derive an end-to-end maximum node number upper bound, i.e., an upper bound on the network diameter as a function of end-to-end delay requirement, and an end-to-end maximum node number upper...
The design of wireless embedded systems needs their efficient and realistic simulation to verify that requirements are met. The reproduction of communication behavior is crucial to assess the performance of hardware and software components, e.g., dependability and energy consumption. This work presents and discusses different levels of abstraction for the simulation of the communication behavior....
3G networks penetration is increasing in China, particularly on mobile devices, but little is known about the performance in the country. In this paper, the WCDMA and CDMA's uplink broadband performance was measured in Nanjing. Content of the measuring include throughput, packet loss, delay and receiving interval. Through testing, we can identify the relationship between uplink packet loss, delay...
In this paper we present evaluation of ZigBee network and coexistence of ZigBee and WiFi network. We provide a simulation in OPNET Modeler using two scenario. In the first scenario we evaluate ZigBee network topology then in the second scenario we analyze coexistence between ZigBee and WiFi network. The result shows that tree topology on ZigBee gives highest throughput while mesh topology has the...
The Low Voltage Low Power (LVLP) 8T, 11T, 13T and ZA SRAM cell is designed using the dynamic logic SRAM cell. The SRAM cells are implemented using pass transistor logic technique, which is mainly focused on read and write operation. The circuits are designed by using DSCH2 circuit editor and their layouts are generated by MICROWIND3 layout editor. The Layout Versus Simulation (LVS) design has been...
Ad hoc networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. The paper brings out a comparison among various routing protocols in different scenarios with TCP variants, for their better understanding and implementation. A comprehensive performance evaluation...
Wireless Sensor Networks (WSNs) are of great interest to researchers due to their various applications in areas such as environmental monitoring, process monitoring and tracking surveillance systems. Sensors are deployed in hostile in random fashion giving self-organized topology. Medium Access Control (MAC) plays a vital role in the power saving mechanism of WSNs. MAC schemes for WSNs are different...
IEEE 802.11n WLAN was mainly developed to support a high data transmission rate toward 600Mbps based on the aggregation scheme that accumulates several sub-frames to transmit them into a larger frame. This concept reduces overheads and increases efficiency and throughput. Nevertheless, it cannot provide QoS satisfaction for delay sensitive application since it badly affects the delay. To outperform...
Video transmission over 802.11 wireless networks poses many challenges. Bandwidth demands and timing constraints are two major challenges for real time video transmission over wireless. To increase network throughput as well as overall network capacity, the use of cross layer design approach is required. One of such design approaches includes physical (PHY) and medium access control (MAC) layers considerations...
Applications of Wireless Sensor Networks (WSNs) have increased significantly in the last few decades and real time needs have to be satisfied using appropriate time synchronization algorithms. Novel synchronization algorithms can lead to improved network performance including energy consumption, throughput, and delay. This paper proposes, implements and evaluates a hybrid synchronization algorithm,...
In IP multimedia subsystem (IMS), in order to have a multimedia service first a session should be established. The signaling part is done by the SIP protocol-the most important protocol used in IMS network. Excessive signaling during the session setup mechanism leads to an undesirable delay in session establishment and also the final response of the other subscriber. This matter is considered important...
Using maximum weight matching algorithm, the crossbar switch with VOQ is proven to be stable and can achieve 100% throughput even under non-uniform traffic pattern. However, maximum weight matching has a high complexity of order O(N3) that is not scalable to fast line rates, neither to high port counts. The scheduling based on Birkhoff-von Neumann decomposition of traffic matrices completely eliminates...
The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.