The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Mesh Networks (WMNs) are currently attracting a lot of attention due to their ability to provide cost-efficient broadband wireless connectivity. In this paper, we evaluate the performance of a WMN by simulations considering packet delivery ratio (PDR), throughput and delay. For simulations, we used ns-3 simulator and Hybrid Wireless Mesh Protocol (HWMP). We evaluate the performance of the...
Traditionally in routing approaches, each node allows a maximum load through the selected route. The existing routing approaches in cognitive radio networks (CRN) do not take into account spectrum trading as well as spectrum competition among licensed users (PUs). This paper introduces a novel routing algorithm that is based on spectrum trading and spectrum competition for cognitive radio networks...
In this paper we compare and evaluate two multicast approaches for delay sensitive media distribution in P2P networks. First approach is based on cooperative m-ary trees, while the second approach is based on a cooperative mesh network. Both schemes exploit the full upload capacity of the participating peers and their proximity relation. Our delivery strategy involves the full cooperation between...
IEEE 802.15.4 standard is designed for low power and low data rate applications with high reliability. It operates in beacon enable and non-beacon enable modes. In this work, we analyze delay, throughput, load, and end-to-end delay of non-beacon enable mode. Analysis of these parameters are performed at varying data rates. Evaluation of non beacon enabled mode is done in a 10 node network. We limit...
Bandwidth aggregation of heterogeneous wireless links faces numerous challenges in maximizing available connectivity services for mobile applications. One serious issue is the out-of-sequence arrival of packets at receiver that is amplified by distribution of packets of a flow over multiple paths. These packets experience asymmetric path characteristics that results in diverse congestion states for...
In the Medium Access Control (MAC) layer of a wireless network that uses Carrier Sense Multiple Access (CSMA), the performance is limited by collisions that occur because of carrier sensing delays associated with propagation and the sensing electronics. In this paper, we use a continuous-time Markov model to analyze and optimize the performance of a system using CSMA with collisions caused by sensing...
Airborne networks often use frequency hopping to be jam resistant. Because users are highly mobile and can have large propagation delays, otherwise orthogonal frequency hopping patterns appear asynchronous, and hop-by-hop collisions will occur. We compare the achievable throughput and delay of scheduling schemes versus random access schemes in this context via modeling and simulation. Because collisions...
Satellite systems can be fruitfully utilized to provide connectivity to terrestrial sensor networks to exploit large-scale monitoring applications based on IP protocol. Sensor traffic patterns are very different from those occurring with current Internet applications, so that performance evaluation requires some specific investigation with the aim to draw the main requirements to achieve target Quality...
For the low delay requirements of Ad Hoc networks in high traffic-load, it mentioned an improved algorithm named Slotted ALOHA based on Multichannel Statistics (SAMS) . Compared to the widely used protocol of ALOHA, Slotted ALOHA, CSMA and TDMA, the result of SAMS simulation proved it can maintain very low delay of ensuring the high-priority data send successfully in high traffic-load.
The quality-of-service (QoS) metrics in a wireless sensor network (WSN) of multiple sensor types depend on the performance of the network protocol layers, motivating a comprehensive cross-layer design approach to optimize QoS. Advances in energy-harvesting techniques enable increases in WSN lifetime by prolonging operation of the wireless nodes. While the primary objective of energy harvesting is...
In-band spectrum sensing protocols require that the secondary users (SU's) periodically suspend their transmission periods and sense the channel in order to determine whether the primary user (PU) has emerged or not. There is a tradeoff between the spectrum sensing period and the throughput of the SU, often referred to as sensing-throughput tradeoff. In this paper, using the receiver error count,...
The current Medium Access Control (MAC) protocol of the Wireless Access in Vehicular Environments (WAVE) system does not consider time utilization of CCH and SCH. In this paper, we present a novel mechanism to extend MAC protocol, which dynamically adjusts the length of Control Channel (CCH) and Service Channel (SCH) intervals according to vehicle density and load conditions of network. In the proposed...
Even though many studies have dealt with the common channel issues, the detailed procedures for common channel configuration have not been paid much attention. In this paper, the fast and reliable dynamic common channel setup and reconstruction method for the point-to-point communications in DSA networks is proposed. The detailed time parameters for common channel setup and reconstruction, such as...
Delay is a critical QoS performance metric for Multi-hop Wireless Network (MHWN). It is well known that schemes that give a higher data rate to the link with larger queue length can achieve high throughput performance. However, this queue-length-based approach may potentially suffer from large (even infinite) packet delays due to the subsequent contention problem caused by the next-hop arriving packets...
It is typical for enterprises to rely on services from cloud providers in order to build a scalable platform with abundant available resources to satisfy user demand, and for cloud providers to deploy a number of datacenters inter-connected with high-capacity links, across different geographical regions. In this paper, we propose that video conferencing, even with its stringent delay constraints,...
We show that the performance of downloads in a 3G/HSPA mobile network can be significantly degraded by a concurrent upload that saturates the uplink buffer on the mobile device. In particular, we found in some instances that download speeds can be reduced by over an order of magnitude from 2,000 kbps to 100 kbps. To mitigate this problem, we propose a new algorithm called Receiver-side Flow Control...
Many methods have been proposed in the literature to perform admission control in order to provide a sufficient level of Quality of Service (QoS) to accepted flows. In this paper, we introduce a novel data-driven method based on a time-varying model that we refer to as Knowledge-Based Admission Control solution (KBAC). Our KBAC solution consists of three main stages: (i) collect measurements on the...
Several high speed TCP variants are adopted by end users and therefore, heterogeneous congestion control has become the characteristic of newly emerging high-speed networks. In contrast to homogeneous TCP flows, fairness among heterogeneous TCP flows now depends on router parameters such as queue management scheme, buffer size, etc. To the best of our knowledge, this is the first evaluation of fairness...
In this paper, we examine a new kind of P2P traffic localization approach exploiting the peer selection adaptation (i.e., preferring peers who are likely to provide better performance), called Netpherd. Netpherd tries to affect the peer selection adaptation to localize the P2P traffic by manipulating the network performance. To manipulate the network performance, Netpherd adds an artificial delay...
In order to ensure a reliable and efficient end-to-end communication among the network nodes in a Mobile Ad Hoc Network (MANET), an appropriate routing protocol is needed. In this paper, we present an extensive simulation-based comparison of three well-known MANET routing protocols (AODV, DSDV and OLSR) evaluating their performance in three real-life scenarios. Considering various performance metrics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.