The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Downlink throughput performance in Long Term Evolution - Advanced (LTE-A) networks has been widely investigated by many simulation studies. However, these studies generally assume that users are uniformly distributed in regularly arranged hexagonal cells. Analytical models and methods of stochastic geometry have been applied to wireless networks to consider the effects of spatial configuration of...
We demonstrate high-speed data transfer GridFTP using a multipath control mechanism with SDN (Software-Defined Networking). GridFTP is a typical tool that has been developed and widely used for bulk data transfer over a wide area network in the field. GridFTP supports a parallel high-speed data transfer scheme using multiple TCP streams. However, one of the shortest paths is used solely for data transfer...
A mobile adhoc network is an independent system of mobile stations associated by wireless link to form a system. This system can be modeled in the form of an uninformed graph. Adhoc networks are peer to peer, multihope networks were data packets are transmitted to a source to destination through intermediate nodes (which serve as router). The infrastructure is not the main issue to setup MANET and...
The ubiquity of WLAN networks bears inherently a risk of generating considerable interference level. Measurements have been obtained to demonstrate that densely, though randomly deployed Access Points cannot operate at maximum bit rates due to mutual interference. A simple non-collaborating algorithm has been proposed and verified under carefully controlled measurement conditions providing a proof...
In communications, the nodes with the ability of harvesting energy potentially can prolong the overall network lifetime. In this paper, we consider a single-user energy harvesting wireless communication system, in which arrival data and harvested energy curves are modeled as continuous functions. Our goal is to find an online algorithm for the throughput maximization problem, which only needs the...
Since traffic diversity and volume increase with growing popularity of mobile applications, there is the strong need to manage the traffic carried by networks. Software defined networking can manage network while enabling new services by employing traffic management whose goal is to maximize the utility objective while satisfying given requirements. In this paper, we propose an efficient routing to...
Multicast over wireless medium is considered for multimedia service such as YouTube and NetFlix. However, the multicast frames are sent in a low data rate without the feedback in IEEE 802.11. The low data rate of multicast causes performance anomaly problem. In this paper, we propose a feedback overhead reduction scheme to guarantee the reliable multicast, and to sustain the high throughput in recent...
Device-to-Device (D2D) communications can offload the traffic and boost the throughput of cellular networks. By caching files at users, content delivery traffic can be offloaded via D2D links, if a helper user are willing to send the cached file to the user who requests the file. Yet it is unclear how much energy needs to be consumed at a helper user to support the traffic offloading. In this paper,...
With the development of various radio communication systems in recent years, spectrum sharing in heterogeneous networks has received a considerable amount of research attention for the efficient use of spectral resources, as the lack of these has emerged as an important problem. Prevalent spectral sharing methods focus on improving total throughput, and ignore lower throughput along the cell edges...
UHF EPC Gen2 RFID systems use Dynamic Frame Slotted ALOHA (DFSA) to manage reading of multiple RFID tags. In DFSA, the reader may receive short address messages (RN16) from one or more tags at any given timeslot. To enable RFID readers to read a significantly large population of tags within a small time interval, it is required to increase the underlying throughput by maximizing the percentage of...
In the modern world of digitization, processing of data in real time requires an increase in the operating speed of a system. The processing more often than not utilizes multiplication which is time consuming and introduces considerable amount of delay. As such, there is a need to reduce this delay and achieve faster real time processing of data. This paper proposes a novel architecture for implementation...
Wireless sensor network is one of the developing ranges of research in present situation. A Wireless sensor network comprises of geographically dispersed self-governing tiny sensor nodes with little battery life to screen and control over the physical parameters or ecological conditions, for example, temperature, sound, pressure, humidity and so on and this data is gone by the sensor nodes in the...
Internet applications are increased and growing at very fast. Owing towards the technological development, secured way of data transmission over the internet is becoming a questioning task. Intruders hack the data and use it for their beneficial purpose. To avoid these undesirable acts, cryptography is used to ensure security of the covert and secure message. Although encrypted data is difficult to...
Cross-layer design with respect to reference layered architecture is the design of algorithms, protocols and architectures that utilize an available set of interlayer exchanges a superset of the standard interfaces provided by the reference layered architecture. The cross layer approach transports feedback, dynamically via the layer margins to enable the remuneration for e.g. load, latency or other...
Cognitive Radio (CR) [4] has a capacity to dynamically utilize the unused spectrum because of the advances in electronics and government policies. Dynamic spectrum access (DSA) [9] is the technique to utilize the free spectrum and release the current spectrum if the original user (incumbents) arises on that spectrum within channel move time. This paper analyzed the DSA characteristics in IEEE 802...
The unplanned deployment of small cells is leading to high levels of intra- and inter-tier interference. An insight on how to manage the interference is vital to reach a significant capacity improvement through ultra-dense networks. This paper considers heterogeneous networks with carrier aggregation, where the macro cells operate at 800 MHz to provide coverage and the small cells operate at 2.6 GHz...
In this paper, we propose a cooperative spectrum sharing protocol for cognitive radio networks (CRNs) which operate in underlay mode with an automatic repeat-request (ARQ)-based primary user (PU) including primary transmitter (PT) and primary receiver (PR) and a bidirectionally communicating secondary user (SU) which consists of the nodes S1 and S2. In ARQ-based PU, ACKnowledgement/Negative-ACKnowledgement...
In this paper, we propose a client-based adaptation method for Adaptive Streaming over HTTP/2 leveraging the server push feature. A cost function that takes into account both the number of pushed segments and the playout buffer level is defined. Experiment results show that the proposed method can improve the tradeoff between the number of requests and buffer stability compared to existing solutions.
This paper presents the design and implementation of an automatic lecturer availability tracking system incorporating various software and hardware technologies. The system is aimed at reducing the amount of time that students, visitors and faculty members spend looking for specific employees without being hindered by the ethical issues surrounding RFID based staff tracking. It focuses on the availability...
In many practical applications, we need to compute a nonblocking supervisor that not only complies with pre-specified safety requirements but also achieves a certain time optimal performance such as maximum throughput. Previous time optimal synthesis methods have had the significant drawback of only being able to deal with acyclic behavior. In this paper we propose a time optimal synthesis method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.