The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper develops a simple analytical model based on a Markov chain that calculates saturation throughput and average packet delay for the IEEE802.11 Distributed Coordination Function (DCF) for network scenarios with voice and data stations. The analytical model is validated by comparing its results with simulation outcome. Based on the analytical model, a methodology that calculates voice capacity...
In this paper, we have proposed secondary user (SU) resource assignment scheme for a multi-hop cognitive radio network. In Multi-hop networks, since each link has different SNR because of their different distance between the stations and some other circumstance, it degrades the end-to-end throughput. To overcome this problem, we have proposed to give a channel priority in each link based on the link...
Interferences in cellular wireless networks (CWN) between central station (CS) and the terminal station (TS) have a direct impact on available throughput and represents the main capacity limitation, especially in networks with full frequency reuse among all CSs. More and more attention is being focused on a way of minimizing interferences. We are introducing a new Coordinated Channel Gain Estimation...
Metaverses provide a framework for developing distributed 3D Internet applications where users gain presence through the proxy of an avatar. They offer much of the engagement of online 3D games but support heterogeneous applications. From the network perspective metaverses are similar to games in that timeliness is important but differ in that their traffic is less regular and requires more bandwidth...
With the advances in mobile technologies, smart mobile computing devices have become increasingly affordable and powerful, leading to a significant growth in both the number of advanced mobile users and their bandwidth demands. Moreover multimedia streaming to these high-end mobile devices has become widespread. However, multimedia applications are known to be resource-hungry and in order to cope...
We consider single-hop broadcast packet erasure channels (BPEC) with degraded message sets and instantaneous feedback regularly available from all receivers, and demonstrate that the main principles of the virtual-queue-based algorithms in [1], which were proposed for multiple unicast sessions, can still be applied to this setting and lead to capacity-achieving algorithms. Specifically, we propose...
This paper addresses the problem of flexible procurement of multiple services with multiple non-functional characteristics, i.e., quality of service attributes. We consider the one-to-many negotiation approach as a flexible method for procuring multiple services by a buyer agent. We address the problem of coordinating multiple concurrent negotiations and propose a novel dynamic negotiation strategy...
In dynamic spectrum access networks, the unused licensed spectrum of primary users (PU) is opened to unlicensed secondary user (SU) for improving spectrum efficiency. The problem we study in this paper is to maximize the SU throughput while guaranteeing PU performance. We design a simple time-based threshold strategy to maximize the SU throughput while guaranteeing the PU performance by learning directly...
The Web 2.0 era is characterized by the emergence of a very large amount of live content. A real time and fine grained content filtering approach can precisely keep users up-to-date the information that they are interested. The key of the approach is to offer a scalable match algorithm. One might treat the content match as a special kind of content search, and resort to the classic algorithm [5]....
Simultaneous Multithreading(SMT) technology is designed for using the hardware resources more efficiently by implementing Thread Level Parallelism. Usually, an SMT processor fetches instructions from different threads each cycle and fulfills shared instruction queues. Hence, the quality of the instruction sequence which is mainly constructed by the fetch unit would heavily affect the SMT processor's...
The widespread deployment of varying networking technologies, coupled with the exponential increase in end-user data demand, have led to the proliferation of multi-homed or multi-interface enabled devices. To date, these interfaces are mainly utilized one at a time based on network availability, cost, and user-choice. While researchers have focused on simultaneously leveraging these interfaces by...
The Payload Dropping CSMA/CA is a cross-layer modified version of the CSMA/CA protocol that can serve as an alternative to the carrier-sense threshold approach for improving throughput in multi-cell networks when the number of co-channel, interference-limited cells is small. The basic idea behind it is a qualification of each signal during the entire preamble and header stages of its reception, and...
High throughput and low latency are the desirable characteristics of a multi processing system. CLICHE (ChipLevel Integration of Communicating Heterogeneous Elements) is the simplest form of Network-on-Chip architecture in terms of the layout and the local interconnections between resources and switches. The throughput varies with the number of virtual channels. When the number of virtual channels...
The popularisation of Networked Virtual Environment (NVE) applications in several context, including social interaction and e-Health fields, makes them an interesting subject of study. The proper estimation of their network requirements are key to ensure a good user experience, an important factor that determines the acceptance and success of the applications. The studies focused on NVE with an important...
Many scientists perform extensive computations by executing large bags of similar tasks (BoTs) in mixtures of computational environments, such as grids and clouds. Although the reliability and cost may vary considerably across these environments, no tool exists to assist scientists in the selection of environments that can both fulfill deadlines and fit budgets. To address this situation, we introduce...
The current spectrum allocation model aims to avoid interferences in licensed spectrum communications without further concerns regarding spectrum usage. Because the radio spectrum is a finite resource, several approaches have been presented in order to improve the effectiveness of its utilization. The main contribution of this work is to present an opportunistic approach to spectrum sensing and allocation...
In this paper, we propose a new backoff algorithm for wireless local area networks (WLANs). The proposed algorithm develops by using mathematical optimization function theory on Carrier Sensing Multiple Accesses with Collision Avoidance and Request-to-Send Clear-to-Send protocol (CSMA/CA RTS CTS). A new backoff algorithm is named Contending Stations Backoff Algorithm (CSBA). The performance of CSBA...
In the context of primary/secondary spectrum sharing, we propose a randomized secondary access strategy with access probabilities that are a function of both the primary automatic repeat request (ARQ) feedback and the spectrum sensing outcome. The primary terminal operates in a time slotted fashion and is active only when it has a packet to send. The primary receiver can send a positive acknowledgment...
In this paper, we consider a cognitive relaying network in which the secondary user accesses the channel with a certain access probability that depends on the feedback information sent by the primary destination. In addition, the secondary user is granted relaying capabilities by which it can relay primary traffic that was unsuccessfully transmitted by the primary user. We show that this proposed...
Efficient handling of large volumes of data is a necessity for exascale scientific applications and database systems. To address the growing imbalance between the amount of available storage and the amount of data being produced by high speed (FLOPS) processors on the system, data must be compressed to reduce the total amount of data placed on the file systems. General-purpose loss less compression...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.