The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The worldwide mobile traffic is growing rapidly and more than 90% of the internet traffic relies on the Transmission Control Protocol (TCP) protocol, which is known to have a poor performance over unreliable wireless networks. One of the promising TCP enhancement mechanisms that are being considered by the wireless network operators is the Split-TCP. It is also quite well known that the Split-TCP...
Multipath TCP (MPTCP) enables a single TCP connection to use multiple paths for data delivery. This is expected to increase the overall data transfer throughput by utilizing the multihoming capabilities of communicating nodes. This paper introduces an experimental study of MPTCP connections of multihomed wireless nodes. The nodes' transceivers use two wireless interfaces. One is connected to a WiFi...
We tackle the challenging problem of link scheduling and channel assignment in multi-channel, multi-hop wireless networks, aiming to achieve high network throughput. We adopt the signed graph spectral clustering algorithm to solve this problem heuristically, by jointly considering channel gain and mutual interference. The basic idea is to cluster links with smaller mutual interference and allocate...
Modelling data flow in wireless networks is a complicated task, since network dynamics are frequently unpredictable. The situation is even harder in the case of Wireless Sensor Networks (WSNs). Thus, many researchers instead of modelling the microscopic behavior of each single node, they choose to model traffic flow macroscopically. Fluid dynamic principles provide researchers with a powerful tool...
This chapter illustrates the use of non-cooperative games to optimize the performance of protocols for contention-prone shared medium access in wireless networks. Specifically, it proposes and analyses a set of new utility functions conforming to a recently proposed generic game-theoretic model of contention control in wireless networks [5]. The functions ensure that the game has a unique non-trivial...
The emerging software defined networking (SDN) provides a new paradigm of network management by separating control functionalities from underlying data forwarding hardware to an external controller. SDN provides high flexibility to control the whole network in a unified way. In this paper, we are motivated to study the performance issues of a software defined WiFi network testbed. This testbed consists...
The full duplex communication is a spotlighted technology as a most promising solution that can solve channel capacity problem in wireless network. In the future, the device to device(D2D) communication can be considered to reduce the load of network. Furthermore, the centralized network have advantages in collision ratio. For these reasons, we propose a novel centralized full duplex MAC protocol...
Network coding (NC) enables us to mix two or more packets into a single coded packet at relay nodes and improve performances in wireless networks. Intra-session sliding window network coding is used at the source nodes and inter-session network coding is employed at the relay node to combine the recovered source packets of source nodes. In this paper, we investigate the performance of the network-coded...
Wireless Smart Home Sensor Network (WSHSN) is a home-similar environment, where several wireless sensors can observe the home status and transmit the data streams to the Smart Home Information System (SHIS). Communication in Wireless Sensor Network (WSN) in small living environments faces noise and data transmission speed problems. Especially in the case of employing mobile agents, the WSN restructures...
In Wireless Mesh Networks (WMNs), many applications are based on broadcast, such as the public security information, weather forecast and live show for users. Besides, broadcast is also a fundamental component of network protocols. Many broadcast approaches has been proposed like flooding and node-based CDS(N-CDS) scheme, but few have promising performance when used in multi-channel scenarios. In...
To meet different communication requirements, a smart grid communication framework based on a hybrid network has been widely used. Virtual networks are established for various types of services respectively, and are embedded into heterogeneous substrate networks. Based on the framework, wireless network virtual mapping algorithm based on particle swarm optimization is proposed. In this scheme, the...
Wireless networks progress into subsequent creation to afford quicker and superior services, a key in technology Wireless mesh networks have been emerged in recent times. A wireless mesh network comprised of radio nodes which a form of wireless ad hoc network. In wireless mesh network nodes are combination of mesh routers and mesh clients. Wireless mesh network shows potential wireless technology...
The Wireless Network after Next (WNaN) radio is a multi-transceiver multi-frequency mobile ad-hoc network system that features four independent frequency agile transceivers and uses a variation of Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA). Utilizing WNaN's multiple transceivers, dynamic frequency assignment algorithm, and varying the hello packet interval can help alleviate the increased...
The paper considers multi-hop wireless mesh networks that serve multicast periodic packet traffic. The packets from each packet stream are generated at the stream's source node and traverse a number of wireless nodes in order to reach their multiple destination nodes. Packet periodicity means that a common repeatable frame of time slots is defined and that the packets to be transmitted arrive at the...
Hierarchical cooperation schemes in wireless networks rely on local cooperation among neighboring nodes to create virtual multiple-input multiple-output (MIMO) connections between clusters of nodes. It was shown that, by applying the virtual MIMO technique recursively in a hierarchical manner, the sum rate of all source-destination pairs can scale linearly with the number of nodes in the network....
By current medium access control mechanisms designed for Half-duplex (HD), a node in distributed In-band Full-duplex (IBFD) wireless networks cannot identify the HD or IBFD transmission modes of the other nodes. This will decrease IBFD transmission opportunities by preventing simultaneous transmission in asymmetric dual link. In this paper, we propose a novel in-band Full-duplex Distributed Medium...
This paper proposes hybrid TDMA-CSMA for virtualized wireless networks, aiming to meet their isolation requirements. In this scheme, high-load users with non-empty queues are proper and potential candidates for TDMA, while others can compete using p-persistent CSMA. At each superframe, AP decides on TDMA-CSMA scheduling by taking into account traffic parameters of users and slice reservations to maximize...
Recently, caching of the popularity video files in the caches near to the users has been proposed as a promising way to reduce data traffic. These caches can be considered as the nodes which their transmission ranges are limited but have significant storage capacity and are known as the helper nodes. To evaluate the performance and efficiency of the caches, a suitable model for their distributions...
Security and energy efficiency are two critical metrics in many multiuser networks (e.g. M2M networks, sensor networks and ad hoc networks). In this paper, we try to maximize secure energy efficiency (SEE) by allocating power for those User Equipments (UEs) meeting the security transmission requirements, where SEE is defined as the ratio of the total secrecy throughput to the total transmission power...
Full-duplex communication has been proved as a realizable way to enhance the capacity of wireless network. In this paper, we analyze the asymptotic capacity of full-duplex wireless networks where each terminal is equipped with only one interface, but two channels are available. By analysis, we obtain the upperbound of the full-duplex capacity. Based on the theoretical analysis, we design two link...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.