The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Mesh Networks (WMNs) are gaining popularity due to the features provided, especially the low cost and self-configuration ability. In WMNs, the data traffic is transmitted through intermediate nodes and a number of packets are dropped during the transmission due to various reasons. One significant reason is the limitation of network resources such as bandwidth and buffer size. Because of these...
Spectrum sensing using cooperative power spectral density cancellation (CPSC) over both fast and frequency-selective fading channels has not been investigated yet. We investigate the performance of the newly proposed CPSC method over this severely-impaired Rayleigh channel. We initially compare two approaches to calculate the decision variable in the CPSC algorithm. Then, it is assumed that the fading...
In this paper, we propose a throughput-maximum resource provision scheme in the OFDMA-based Wireless Virtual Network (WVN). The proposed scheme takes the dynamics of both traffic arrivals and wireless channels into consideration. Furthermore, we consider a more flexible service contract where average resource provision is guaranteed for each slice. As it is practically impossible to know future traffic...
In this paper, we investigate fundamental throughput and delay tradeoffs in cognitive radio networks (CRN) with a primary user (PU) and a cooperative secondary user (SU). Considering the user fairness, we propose a novel cooperation scheme, where the PU transmits packets with a probability of α instead of always occupying the spectrum, in exchange for the SU's cooperation. The unauthorized SU can...
In cellular mobile communication systems, the co- channel inter-cell interference (ICI) remains as a critical barrier to achieving further improvement in spectrum efficiency. As an approach to controlling downlink ICI, multi-cell coordinated MU-MIMO has been actively discussed in many papers. In multi-cell coordinated MU-MIMO, the simultaneous transmission for multiple mobile stations is made possible...
Millimeter wave frequencies will likely be part of the fifth generation of mobile networks and of the 3GPP New Radio (NR) standard. MmWave communication indeed provides a very large bandwidth, thus an increased cell throughput, but how to exploit these resources at the higher layers is still an open research question. A very relevant issue is the high variability of the channel, caused by the blockage...
This paper proposes a traffic flow control system at intersections for Internet of Vehicles by combining ideas from process scheduling in Operating Systems with a ticket mechanism. The paper models an intersection as a network of mutual exclusive resources and the vehicle flows as processes that access the resources. Two graph models: Flow Intersection Network and Flow Resource Allocation Network...
In vehicular ad hoc networks (VANETs), due to highly mobile and frequently changing topology, available resources and transmission opportunities are restricted. Transmitting frames efficiently within transmission opportunities is very important for system performance. Generally, there are many transmissions between many senders and receivers in a congested environment, which leads to network congestion...
Recurrent neural network(RNN) has been widely applied to many sequential tagging tasks such as natural language process(NLP), and it has been proved that RNN works well in those areas. In this paper, we propose to use RNN with long short-term memory(LSTM) units for web server performance prediction. Classical methods focus on building relation between performance and time domain, which can't capture...
Channel access procedures of the state-of-the-art cellular standards create a significant overhead for small messages transmitted by Internet of Things (IoT) devices. As IoT becomes a major source of traffic for next-generation wireless communications, there are recent efforts to design low-overhead access schemes. Here we present the delay and capacity analysis of two low-overhead access protocols...
Serving user requests from near-by caches or servers has been a powerful technique for localizing Internet traffic with the intent of providing lower delay and higher throughput to end users while also lowering the cost for network operators. This basic concept has led to the deployment of different types of infrastructures of varying degrees of complexity that large CDNs, ISPs, and content providers...
In vehicular ad hoc networks (VANETs), due to highly mobile and frequently changing topology, available resources and transmission opportunities are restricted. Transmitting frames efficiently within transmission opportunities is very important for system performance. Generally, there are many transmissions between many senders and receivers in a congested environment, which leads to network congestion...
Resource allocation and traffic aggregation is becoming a significant part of the network deployment as it is expected that operators will offer advanced services through 5G systems. Scheduling procedures need to be fair but also to handle requirements set for diverse groups of users forming network slices. Heterogeneous networks will need to be controlled locally and the traffic could be split between...
In this paper, the basic methods of routing organization in software-configurable network are considered. The efficiency of the implementation of routing SDN networks are evaluated using a specially designed setting — delays in the routing domain. Evaluates the effectiveness of routing under various principles of organization SDN-Controller and the various protocols for implementing an interface between...
In this work, we introduce a powerful hardware-based rogue access point (PrAP), which can relay traffic between a legitimate AP and a wireless station back and forth, and act as a man-in-the-middle attacker. Our PrAP is built of two dedicated wireless routers interconnected physically, and can relay traffic rapidly between a station and a legitimate AP. Through extensive experiments, we demonstrate...
The various flows in production datacenters usually can be classified into two types: bandwidth-hungry and delay-sensitive. To improve their performance, datacenter networks require effective load balancing and flow control protocols, respectively. However, as the two techniques are typically employed separately in current datacenters, they are unable to optimize the network in a coordinated way....
This paper proposes a perspective method of Digital Power Line Carrier channels throughput increase in transmission of Supervisory Control and Data Acquisition packet traffic from electrical substations. The proposed method based on capturing of data packets and their compression with application of Predictor algorithm. The paper presents results of experimental evaluation of SCADA data compression...
Long-tail latency of web-facing applications continues to be a serious problem. Most of the previously published research addresses two classes of long latency problems: uneven workloads such as web search, and resource saturation in single nodes. We describe an experimental study of a third class of long tail latency problemsthat are specific to distributed systems: Cross-Tier Queue Overflow (CTQO)...
State machine replication is a fundamental approach to high availability. Despite the vast literature on the topic, relatively few studies have considered the issues involved in recovering faulty replicas. Recovering a replica requires (a) retrieving and installing an up-to-date replica checkpoint, and (b) restoring and re-executing the log of commands not reflected in the checkpoint. Parallel techniques...
WiFi has become the primary method to access the Internet. However, the WiFi-hop latency, particularly in dense-WiFi environments, is far from satisfactory [1], to support delay-sensitive applications such as Web browsing and VoIP. The WiFi latency mainly comes from two kinds of queues: the host queue and the distributed queue, which is caused by CSMA/CA mechanism when multiple nodes contend for the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.