The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate the throughput analysis for the MIMOMAX protocol, a cross-layer design based on multiple transmit and receive antennas (MIMO) capabilities. We propose an analytical model based on a three-dimensional Markov chain. This model includes two additional parameters than the conventional model: a) non-saturated traffic situation, and b) beam strength at the receiver. Each beam...
Ultra dense networks and device-to-device communications are expected to play a major role in 5G networks to meet tremendous traffic requirements. In our work, we address traffic offloading in dense device-to-device cooperative heterogeneous networks with focus on use cases where a very large number of users request simultaneously common streaming content from a remote server with quality of service...
Cooperative forwarding has shown a substantial network performance improvement compared to traditional routing in multi-hop wireless networks. To further enhance the system throughput, especially in the presence of highly congested multiple cross traffic flows, a promising way is to incorporate the multi-radio multi-channel (MRMC) capability into cooperative forwarding. However, it has been said that...
We study the problem of serving randomly arriving and delay-sensitive traffic over a multi-channel communication system with time-varying channel states and unknown statistics. This problem deviates from the classical exploration-exploitation setting in that the design and analysis must accommodate the dynamics of packet availability and urgency as well as the cost of each channel use at the time...
The performance of existing coded caching schemes is sensitive to the worst channel quality, when applied to wireless channels. In this paper, we address this limitation in the following manner: in short-term, we allow transmissions to subsets of users with good channel quality, avoiding users with fades, while in long-term we ensure fairness across the different users. Our online delivery scheme...
The Raspberry Pi has become one of the most popular devices used in the internet of things studies because of its flexibility and affordability for prototyping purposes. It has found its niche in wireless sensor networks as it can function both as sensor node and router node just by adding wireless adapter. Studies have employed the Raspberry Pi as WSN mesh node and sensor node. These studies looked...
WLANs (Wireless Local Area Networks) have become ubiquitous in our everyday life, and are mostly based on IEEE 802.11 standards. In this paper, we consider the performance evaluation of an arbitrary-topology unsaturated network based on the IEEE 802.11 DCF. We present a conflict graph-based modeling approach to discover the attainable throughput of each node. Our model consists of a single Markov...
It is becoming more and more obvious that the challenges regarding tactical radio communication cannot be met by a single static radio waveform. Instead, waveforms with different properties regarding range, robustness, and throughput need to be orchestrated. In order to benefit from the advantages of each radio technology integrated into the transparent tactical radio network, traffic engineering,...
We study an offloading mechanism for cellular networks in which mobiles with good cellular links can act as hotspots and can assist other mobiles. We study throughput optimal offloading and also a fair offloading strategy which we call proportional increment offloading. We show that the former problem can be reduced to a capacitated facility location problem (CFLP) whereas the latter can be solved...
In this paper we consider the selection and deployment of MANET protocol to efficiently route the traffic and communicate in Tactical Battle Area (TBA). Tactical Wireless Communication Network (TWCN) provides connectivity between Wide Area System (WAS) of TWCN nodes, forming a backbone transmission network. TWCN is for TBA that consists of Network Centric Systems. These entities impose routing challenges...
Secure routing in the field of mobile ad hoc network (MANET) is one of the most flourishing areas of research. Devising a trustworthy security protocol for ad hoc routing is a challenging task due to the unique network characteristics such as lack of central authority, rapid node mobility, frequent topology changes, insecure operational environment, and confined availability of resources. Due to low...
Mobile ad hoc networks (MANETs) are continuously self-organizing, infrastructure-less consisting of collection of mobile nodes that communicate with each other without the use of centralized authority. MANETs are perfect for positions where a fixed structure is infeasible. Today's MANETs, suffer from network partitioning. This restriction makes MANETs in appropriate for applications such as crisis...
An adhoc network is collection of wireless mobile hosts, which form a temporary network by using reconfigurable structure that means it doesn't use fixed infrastructure to form a temporary network. It will connect all nodes through wireless technique. Hence it can change the link between one node to another node during run time, when the link failure problem occurs. There is a limited range for each...
Mobile Ad-hoc Network is one of the popular technologies among the various wireless technologies. The MANET is an ad-hoc technology and inherits the properties of mobility, wireless connectivity and independence. In one side it demonstrates the advantage over applications on the other side that is complicated to manage. Therefore the routing protocols are an essential component of the entire network...
The high densities of network nodes has made spatial reuse an essential characteristic of modern wireless networks. In this paper, we evaluate the maximum throughput of Carrier Sense Multiple Access (CSMA) for Vehicular Ad-hoc Networks (VANETs) when spatial reuse is taken into account. We begin our study by extending a simple stochastic model in order to fit a VANET pattern and to obtain the spatial...
To mitigate performance anomalies due to different transmission rates and improve throughput performance in ad-hoc networks, we propose a method called user cooperative mobility in which a node, i.e., a user of an ad-hoc network, moves (changes its geometrical position) for communication. Unlike previous research regarding user cooperative mobility, it is not easy to decide to where the user should...
Tactical networks are generally simple ad-hoc networks in design, however, this simple design often gets complicated, when heterogeneous wireless technologies have to work together to enable seamless multi-hop communications across multiple sessions. In recent years, there has been some significant advances in computational, radio, localization, and networking te, and session's rate i.e., aggregate...
As Internet of Things (IoT) and smart devices are becoming widespread, expectations for large-scale ad-hoc networks are increasing. To accommodate a large number of nodes, ad-hoc networks should use multiple channels. Thus, dynamic channel switching methods in multi-channel ad-hoc networks have been investigated to control congestion of the channel. However, such channel switching has a considerable...
In wireless multihop networks, a sequence of data messages are transmitted along a predetermined wireless multihop transmission route. Collisions among wireless transmission signals from the intermediate wireless nodes cause reduction of the end-to-end data message throughput. Hence, avoidance and/or reduction of collisions between 2-hop neighbor intermediate nodes due to the hidden terminal problem...
The rapid development in communication approach has brought out new mode of communication. Among the recent developments, adhoc network has emerged as new mode of data communication. The objective of link reliability is a major concern in such network. In this paper, a new approach to route discovery based on network power and operational characteristic is proposed. The approach suggested, results...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.