The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a multi-hop wireless network, a node can act as a candidate file provider to other nodes, if it has downloaded the file from the Internet. When another node requires the same file, all nodes which have already obtained the file can act as candidate file providers (sources) and transmit file together to the request node (destination). We form this as the multi-source transmission. As the multi-source...
The issue of energy efficiency for processing multirate signal for wireless sensor network with the aim of increasing channel capacity and delay improvement is addressed. Different types of coding and modulation techniques are used to choose devices from different transmission rates. In a multichannel network the selection of link rate is difficult. In this paper we tried to focus on solution of link...
Recently there have been numerous studies exploring the benefits of the coalition formation in a cognitive radio network and it has been shown that coalition formation tends to improve the performance of cognitive radio networks. In this paper, we use the concepts from matching theory to form coalitions of varying size among cognitive radio users for cooperative spectrum sensing under target detection...
Users can access multiple wireless networks simultaneously because of the explosive development of wireless technologies and a mobile device. This paper proposes a packet scheduling scheme to efficiently exploit multiple wireless networks simultaneously. The proposed scheme estimates the available bandwidth in multiple wireless networks by modifying TCP-friendly Rate Control (TFRC) algorithm. It also...
Cache-enabled device-to-device (D2D) networks turn memory of the devices at the network edge, such as smart phones and tablets, into bandwidth by enabling asynchronous content sharing directly between proximate devices. Limited storage capacity of the mobile devices necessitates the determination of optimal set of contents to be cached on each device. In order to study the problem of optimal cache...
Binary Exponential Backoff (BEB) algorithm is utilized to resolve the channel contention for IEEE 802.11 wireless networks. However, BEB algorithm does not meet the user expectation due to the large collision probability and the poor network fairness when the number of stations is large. To overcome the problems, a novel synchronized contention windows-based backoff algorithm is proposed, i.e., SCW...
In this paper, we study completely uncoupled learning algorithms for general utility maximization. We illustrate the algorithm with a wireless network application viz distributed user association. Our main contribution is expansion of achievable rate region by allowing time sharing of resources, which the previous works based on completely uncoupled strategies have ignored. First, we present a distributed...
For IoT applications that require near real-time wireless connections, the traditional TCP protocol is not adept enough due to the size of its packet header, its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and its slow start strategy. This paper mainly evaluates three kinds of reliable UDP-based transport protocols namely, RUBDP, UDT, and PA-UDP, for...
This paper proposes a wired and wireless network cooperation (NeCo) system to quickly recover civilian telecommunication services in the aftermath of a catastrophic disaster. The proposed NeCo system achieves both rapid recovery and high throughput using wireless bypass routes backhauled by wired networks. With the NeCo system, active leaf nodes relay packets to and from dead leaf nodes whose wired...
Traffic load balancing and radio resource management is key to harness the dense and increasingly heterogeneous deployment of next generation “5G” wireless infrastructure. Strategies for aggregating user traffic from across multiple radio access technologies (RATs) and/or access points (APs) would be crucial in such heterogeneous networks (HetNets), but are not well investigated. In this paper, we...
Wireless networks are required to guarantee the Quality of Service (QoS), including throughput, fairness, delay, etc. IEEE802.11 MAC protocol employs a typical backoff mechanism, Binary Exponential Backoff (BEB) algorithm, to avoid collisions when multiple users try to access the shared wireless channel. Many works on QoS guaranteeing point out that the BEB algorithm introduces the unfairness and...
Software Defined Network (SDN) is deemed to be one of the promising solutions for the next-generation wireless communication system. Software Defined Protocol (SDP) is the data plane equivalent of SDN. The design objective of SDP is to make data processing protocol stacks programmable based on platform virtualization and functionality modularization to redefine the wireless network architecture. In...
The choice of a suitable path for packet transmission represents a fundamental issue to any routing protocol. The principle of choosing the shortest path is also no longer a good option for route selection since many other aspects may influence communication performance. In that sense, the link quality of the path is more important than the length of the path in a wireless network because of the unstable...
The Internet of Things (IoT) applications is envisioned to require higher throughput protocols because of the increasing data amount. To significantly enhance the network throughput between IoT devices, this paper proposes a new link-layer data forwarding technique that is aware of link correlation (LC) and supports receiver initiated acknowledgement (RI-ACK). We also propose a multicast communication...
It has been shown in the literature that Network Coding (NC) can boost the performance of wireless networks. However, to really obtain the potential gain of NC, efficient Medium Access Control (MAC) protocols that operate with awareness of the NC functions are necessary. In this paper, we propose a novel NC-aware MAC protocol for IEEE 802.11 wireless networks that combines k-batch transmissions and...
We present several distributed CDMA/OVSF code assignment algorithms for wireless ad hoc networks modelled by unit disk graph (UDG). We first give a distributed code assignment whose total throughput is within a constant factor of the optimum. Then we give a distributed method such that the minimum rate achieved is within a constant factor of the optimum. A distributed method that can approximate both...
In this paper, we study path selection and power allocation problems for relay-aided systems with multiple source, relay, and destination nodes. To take fairness among different links into account, we aim at maximizing the minimum source-relay-destination link rate performance. We consider the scenario that the source node can be paired with any destination node. For this scenario, we decouple the...
Game-theory based carrier sense multiple access (CSMA) protocols for wireless networks have recently emerged as a competitive alternative to classical CSMA based medium access control designs. The advantage of game-theory based approaches lies in the scope of precise mathematical analysis and hence predictable performance compared to approaches based on ad-hoc arguments and heuristics. In this poster,...
This paper assesses the communication between smart-meters and aggregators as secondary users that transmit their data over the primary uplink channel. We assume: directional antennas are employed in the meter-aggregator link, secondary users transmit with limited power, meters' transmissions are randomized to avoid packet collisions, and an outage constraint for the secondary links' to guarantee...
Recent studies suggest nodes in practical networks are more likely to communicate with nearby nodes than far away nodes, which is referred to as proximity preference. In this paper, we model proximity preference by assuming the probability of communication follows a power law distribution with respect to distance and analyze its influence on the throughput of a hybrid network. Moreover, L-maximum-hop...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.