The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider a dual-hop wireless network where an energy constrained relay node first harvests energy through the received radio-frequency signal from the source, and then uses the harvested energy to forward the source's information to the destination node. The throughput and delay metrics are investigated for a decode-and-forward relaying mechanism at finite blocklength regime and delay-limited transmission...
Adaptive contention window algorithms are most commonly used in CSMA/CA to improve the throughput, fairness and reduce the latency and the collision probabilities in today's applications. All the calculations are done with keeping perfect carrier sensing in mind. There is a huge role played by sensing errors like probability of false alarm and probability of miss detection, in the carrier sensing...
Multipath Transport Control Protocol (MPTCP) is a promising solution to support simultaneous transmission of packets through multiple paths. With bounded receive buffer and heterogeneous networks, MPTCP could suffer from degradation of its performances, undermining the advantage from multiple path transmission. In this paper, we propose a simple and effective method to manage the multiple paths of...
The underwater wireless remote sensors convey messages in a range, where there is no possible human intervention. It is difficult to replace the battery in order to sustain energy in an acoustic environment. Moreover, considering the environment, solar energy cannot be used to recharge for batteries. These sensors are required to be awake for an extended period, taking in consideration that they have...
Due to the difficulty of coordination in multi-cell random access, it is a practical challenge how to achieve the optimal throughput with decentralized transmission. In this paper, we propose a decentralized multi-cell aware opportunistic random access (MA-ORA) protocol that almost achieves the optimal throughput scaling in a multi-cell random access network with one access point (AP) and multiple...
The S-ALOHA (i.e. slotted-ALOHA) protocol is recently regaining interest in Lower Power Wide Area Networks (LPWAN) handling M2M traffic. Despite intensive studies since the birth of S-ALOHA, the special features of M2M traffic and requirements highlight the importance of analytical models taking into account performance-affecting factors and giving a thorough performance evaluation. Fulfilling this...
We analyze the performance of the type-I automatic repeat request (ARQ) protocol with ultra-reliability constraints. First, we show that achieving a very low packet outage probability by using an open loop setup is a difficult task. Thus, we introduce the ARQ protocol as a solution for achieving the required low outage probabilities for ultra reliable communication. For this protocol, we present an...
In this paper, we consider the simultaneous wireless information and power transfer assisted cooperative nonorthogonal multiple access (SWIPT-CNOMA) system, in which the near NOMA users with strong channel conditions serve as energy harvesting (EH) relays to help the far NOMA users with poor channel conditions. For the considered system, a new power splitting (PS) protocol for EH relay is proposed...
Multi-Path TCP (MPTCP) boosts network performance of applications by aggregating bandwidth over multiple paths using sub-flows of the same TCP connection. However, MPTCP suffers from three limitations: (1) it is an end-to-end protocol with no control over the network routes, and sub-flows might end up traversing the same links, (2) it has no dynamic control over choosing the optimal number of sub-flows...
As was reported in the literature, TCP transmissions in an LTE network cannot fully utilize available bandwidth due to the limitations of TCP's mechanisms. Historically, a similar situation - but more spectacular - was observed in the beginning of the 1990s, during the first real (not simulated or emulated) TCP transmissions over newly introduced ATM networks. In the paper we test behavior of the...
Virtual Private Networks (VPN) are an established technology that provides users a way to achieve secure communication over an insecure communication channel, such as the public Internet. It has been widely accepted due to its flexibility and availability on many platforms. It is often used as an alternative to expensive leased lines. In traditional setups, VPN endpoints are set up in hardware appliances,...
Recent advances in the electronics for wireless communications is enabling transceivers to transmit and receive signals at the same time. Thus, the so called full duplex (FD) radios will soon be introduced in devices as opposed to traditional half duplex (HD). However, although FD radios allow to almost double the capacity of a single link, the advantage obtained in a network is still debated and...
Among the design aspects that limit the network capacity of low power wide area networks (LPWAN), the adoption of an appropriate random access (RA) medium access control (MAC) protocol plays a fundamental role. Recently, ultra narrow band (UNB) networks, which operate over Time- and Frequency-Asynchronous ALOHA (TFAA), have emerged as a novel alternative to spread spectrum communications for LPWAN...
In this work we show that random-access protocols, which are used in a range of networks (e.g. WiFi, power line communications and Internet of Things), may experience a high-throughput, extremely long (of the order of hours) transitory phase. This behaviour is not highlighted by common analysis techniques and experimental evaluations, which can lead to incorrect prediction of network performance....
The number of small wireless devices is rapidly increasing, making the radio channel efficiency in limited geographic areas (individual rooms or buildings) an important metric for MAC protocols. Many of these emerging devices have use-cases that are difficult to satisfy with current hardware solutions and channel access methods; for instance device mobility, small energy reserves, and requirements...
Radio Frequency IDentification (RFID) plays a vital role in smart computing applications. Due to the limited communication range of individual RFID readers, large RFID systems deployed in real applications usually contain multiple readers. Existing reader scheduling algorithms either disallow adjacent readers to simultaneously work in order to avoid collisions among them, or simply activate all the...
Many services used in large scale web applications should be able to tolerate faults without impacting their performance. State machine replication is a well-known approach to implementing fault-tolerant services, providing high availability and strong consistency. To boost the performance of state machine replication, recent proposals have introduced parallel execution of commands. In parallel state...
The host-to-host conmunication mode based on the "IP address" has been difficult to meet the current development requirements of the Internet. Research of the future network has become a hot spot, and Information Center Network (ICN) is considered a promising fixture network architecture. ICN can't avoid the emergence of network congestion because of the routing and forwarding based on information...
This paper presents P5, a programmable packet parser with packet-level parallel processing for FPGA-based switches. P5 overcomes both limitations. First, P5 has the programmability of dynamically updating parsing algorithms at run-time. Second, P5 exploits packet-level parallelism in the bottleneck of parsing pipeline to compensate FPGA’s low clock frequency, and reduces resource consumption through...
Multi-path TCP has recently shown great potential to take advantage of the rich path diversity in data center networks (DCN) to increase transmission throughput. However, the small flows, which take a large fraction of data center traffic, will easily get a timeout when split onto multiple paths. Moreover, the dynamic congestions and node failures in DCN will exacerbate the reorder problem of parallel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.