The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Mesh Networks have been traditionally deployed to offer Internet access. Following the general trend of convergence, they must increasingly provide customers with communication services whose quality constraints are heterogeneous. For large scale deployments, access to the Internet is provided by multiple gateways installed at different points in the network. Each gateway may be connected...
In conventional cognitive radio networks it is usually assumed that the primary network remains unchanged. The onus is then placed on the secondary network users to make the best use of any residual radio capacity. In some situations however, the primary network operator may wish to accommodate secondary user access. This objective has motivated recent work which considers simple modifications at...
We present a simulation-based study of the impacts of different types of attacks in mobile ad hoc networks (MANETs). We consider three common types of attacks: blackhole attack, jellyfish attack and neighbor attack. Specifically, we study how the number of attackers and their positions affect the performance metrics of a connection such as packet delivery ratio, throughput, end-to-end delay, and delay...
A delay-locked loop (DLL) based fractional-N frequency synthesizer with a programmable injection clock is presented. The proposed DLL architecture overcomes the integer-N limitation of the conventional DLL-based frequency multiplier, and can achieve small frequency step while maintaining low jitter accumulation. The frequency multiplication part is achieved by using either edge-combing DLL or MDLL...
Due to increased on-chip power density, multi-core systems face various thermal issues. In particular, exceeding a certain threshold temperature can reduce the system's performance and reliability. Therefore, when designing a real-time application with non-deterministic workload, the designer has to be aware of the maximum possible temperature of the system. This paper proposes an analytic method...
Jitter is used in wireless ad hoc networks to reduce the number of packet collisions and the number of transmissions. This is done by scheduling random back-off for each packet to be transmitted and by piggybacking multiple packets in a single transmission. This technique has been standardized by the IETF in RFC 5148. This paper investigates on the impact of the standardized jitter mechanism on network-wide...
This paper studies QoE (Quality of Experience) in Multi-View Video and Audio (MVV-A) transmission over IP networks where the users change the viewpoint by request. It jointly analyzes the effects of user interfaces for viewpoint change and contents in conjunction with network performance in a multidimensional way. In order to assess the QoE, we perform a subjective experiment which employs two user...
In this paper, we present an adaptive algorithm to deploy or re-deploy wireless mobile relays in pervasive environments. To that end, we simulate a simple scenario where a wireless router moves between two static nodes, a source and a destination of multimedia traffic. The mobile relay and both static nodes are in line of sight. The mobile router can move on the straight line between source and destination...
Worldwide Interoperability for Microwave Access or better known as WiMAX is a technology based on IEEE 802.16 standard with guaranteed QoS which provides high speed data rates. In this paper, we analyze the performance of VoIP over the commercial WiMAX networks through traffic measurements. The measurements focused on two QoS elements, jitter and latency that greatly affect the quality of the network...
Voice over Internet Protocol (VOIP) is a technology that transports voice data packets across packet-switched networks using the Internet Protocol (IP). Losing packets in the network is inevitable, and losing voice packets degrades audio quality. The Sender-Based loss-recovery techniques can be used to mitigate the undesired effects of packet loss in VOIP system. In this Paper we introduce a newly...
Electrification of transportation is offering reduced vehicle emissions and operating costs in addition to increased energy-independence. Electric cars are anticipated to be adopted as passenger vehicles and in commercial fleets in the near future. Plug-in Hybrid Electric Vehicles (PHEVs) can drive on battery up to few hundred miles with the current battery technologies. Depleting PHEV batteries are...
The paper describes the performance of the B.A.T.M.A.N daemon (Batmand) protocol in an indoor Mesh Potato (MP) testbed. The MPs are small devices used for voice communications over the wireless medium but can also support data. The MPs along with the Batmand protocol are used to bring cheap telephony to rural areas. However there are no performance tests that show the quality of the service provided...
In VoIP applications, packet loss, delay and delay jitter are inevitable and have a large impact on the perceived speech quality. Jitter buffers are commonly deployed to compensate for jitter in order to play out the received packets continuously. For mobile devices, due to limited battery power, computational complexity has to be kept to a minimum. In this paper, we propose a jitter buffer management...
This paper proposes a jitter buffer for IP-based network which regulates packet-receiving interval. The proposed method utilizes a PD controller to adjust queue length of the jitter buffer to avoid overrun and underrun. In addition, the derivative value of packet-receiving interval is converged to zero by a low-pass filter. Proposed jitter buffer improves control performance of feedback control systems...
Many important real networks can be modeled as intermittently connected mobile networks (ICMNs), like the vehicular ad hoc networks, wildlife tracking and habitat monitoring sensor networks, military networks, etc. However, the fundamental performance limits of ICMNs are still largely unknown so far. This paper explores the capability of these networks to support multicast traffic, where each source...
This paper discusses the condition under which the jitter buffer at the receiver is to be operated for minimum output variance in a TDMoIP framework. The above study would be useful in the design of synchronization algorithms at the receiver of a TDMoIP network. This work uses the results derived in [1] to the above problem. We model the receiver jitter buffer as a M/G/1 queueing system with EARMA...
Injection locking is an effective method to reduce the jitter of clock generators especially for a ring oscillator-based PLL that has poor phase noise [1–3]. While the use of injection locking reduces the output jitter, one disadvantage is that the output frequency can be changed only by integer multiples of the reference frequency, if it can be changed at all. In this work, an ADPLL-based clock generator...
Progress in the development of communication network technology continues apace and Ethernet technology, once limited to local area network applications, is increasingly being considered for use as the backbone technology for wide area communication networks. The technology, most commonly referred to as “Carrier Ethernet”, seems likely to become the dominant technology within wide area networks ultimately...
This work presents a simulation study of the influence of a multiplexing method on the parameters that define the subjective quality for online games, mainly delay, jitter and packet loss. The results for an available subjective quality estimator from the literature are also shown. Two buffer implementations, each one with two buffer sizes, are tested in order to study the mutual influences of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.