The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, throughput of hybrid automatic repeat request (HARQ) schemes with finite blocklength codes is studied for both constant-rate and ON-OFF discrete-time Markov arrivals under statistical queuing constraints and deadline limits. After analyzing the decoding error probability and outage probability, the distribution of transmission period is characterized, and the throughput expressions...
This paper investigates the impact of video-tagged UDP traffic on best-effort TCP traffic in an experimental setup with a novel observation approach. Our setup consists of three 802.11ac nodes in a hidden node topology, where a 20Mbps UDP and a best effort TCP traffic flow from the edge (hidden) nodes to the center node. We observe that, even though the RTS/CTS mechanism is enabled, when UDP and TCP...
The index coding problem has been generalized recently to accommodate receivers which demand functions of messages and which possess functions of messages. The connections between index coding and matroid theory have been well studied in the recent past. Index coding solutions were first connected to multi linear representation of matroids. For vector linear index codes discrete polymatroids which...
This paper uses a case study of a tail-biting convolutional code (with successful decoding indicated by the reliability output Viterbi algorithm) to present an information density approach for analyzing and optimizing the throughput of systems using incremental redundancy controlled by feedback. Polyan-skiy's normal approximation combined with a linear model for the information gap of a rate-compatible...
This paper investigates the design of secondary access policies which exploit the temporal redundancy of the retransmission protocol employed by primary users (PU) to improve the spectral efficiency of wireless networks. Secondary users (SU) perform selective retransmissions in order to optimize the potential of interference cancellation at the receiver. The corrupted signals are selectively buffered...
In wireless LAN, low channel utilization is a serious problem. We have proposed some packet transmission scheduling methods that improve channel utilization by transmitting packets at as high rate as possible through preferential scheduling of packets in proper wireless condition, compared with an existing approach that uses lower transmission rate according to the channel fading around receiver stations...
Interference between concurrent transmissions causes severe performance degradation in a wireless network. This paper addresses interference cancellation to enable simultaneous packet receptions at a node with a single radio in Wireless Sensor Networks (WSN). Interference cancellation is particularly important for WSN as most of its applications rely on convergecast where all the traffic in the network...
Understanding user-induced effects on signal reception across multiple frequency bands is of great scientific and military importance to the wireless industry. Various on-body locations and directional heading of the user are believed to impact the performance of mobile devices, but there has been little work across multiple frequency bands to quantify these user-induced effects. In this work, we...
The exponentially increasing number of IoT devices makes the unlicensed industrial, scientific, and medical (ISM) radio bands (e.g., 2.4 GHz) extremely crowded. Currently, there is no efficient solution to coordinate the large amount heterogeneous IoT devices that have different communication technologies (e.g., WiFi and ZigBee). To fill this gap, in this paper, we introduce embedded multiple flows...
The proliferation of loT applications drives the need of ubiquitous connections among heterogeneous wireless devices. Cross-Technology Communication (CTC) is a significant technique to directly exchange information among heterogeneous devices that follow different standards. By exploiting a side-channel like frequency, amplitude or temporal modulation, the existing works enable CTC but have limited...
This paper presents a family of FIFOs for clock-domain crossings. These designs are distinguished by an interleaved architecture for the control and data-paths. This approach eliminates most of the throughput bottlenecks in the FIFO design, allowing operation at well over 1GHz in a 65nm process using a standard ASIC design flow. Furthermore, these designs are low-latency: the fall-through time for...
This paper represents the design, feasibility evaluation and performance validation of ICMR, a novel cross layer protocol that can maximize concurrent transmissions and avoid data frame interference in wireless networks, achieving higher throughput comparing with the 802.11 standard and other state-of-the-art protocols. Observations on the 802.11 standard reveal that nodes degrade the network throughput...
Uplink grant-free non-orthogonal multiple access (NOMA) is promising for machine-to-machine (M2M) communications to meet the requirement of sporadic short packets transmission of massive devices. In this paper, successive interference cancellation (SIC) and joint decoding (JD), as two well-known decoding techniques for NOMA, are analyzed for M2M random access. Due to the sporadic small packet transmission,...
Energy harvesting wireless nodes provide much longer lifetime and higher energy efficiency for wireless networks compared to battery operated systems. In this paper, we study a MIMO wireless communication link in which the nodes are equipped with energy harvesters and rechargeable batteries that are continuously charging from a renewable energy source. Since the harvested energy arrival and thus the...
Covert communication is to achieve a reliable transmission from a transmitter to a receiver while guaranteeing an arbitrarily small probability of this transmission being detected by a warden. In this work, we study the covert communication in AWGN channels with finite blocklength, in which the number of channel uses is finite. Specifically, we analytically prove that the entire block (all available...
Hybrid beamforming (BF) is a widely considered strategy to enable downlink multiuser transmission for mmWave communication systems. However, current mmWave WiFi standard, the IEEE 802.11 ad, does not support hybrid BF because it could only serve one user at a time. Thus, it is important to implement hybrid BF based on IEEE 802.11.ad such that it could be applied in future mmWave WiFi. In this paper,...
Network-coded (NCed) automatic repeat request (ARQ) techniques have been shown to provide significant throughput improvements over basic ARQ systems in two-way wireless systems. Most results derived so far, however, used the assumption of no extra overhead. In practical systems, NCed-ARQ requires more information exchange between base-station and end-nodes, and therefore it is crucial to study the...
Intravehicular wireless systems are attracting a lot of research interest during the last years. A future scenario where intravehicular wired systems will be replaced by wireless systems will allow to reduce cabling weight and increase the flexibility. But one of the main requirements of wireless systems is to maintain the same reliability level as the wired ones. A system based on LDM (Layered Division...
Recently, data transmission has become more important in our daily life. The developments of communication component are diverging with electromagnetic (EM) techniques. According to the popularity of wireless communications, the limitations of transmission also appear. Especially, electromagnetic interference (EMI) and frequency spectrum shortage would limit the application of wireless communication...
Growing demand for video services is the main driver for increasing traffic in wireless cellular data networks. Wireless video distribution schemes have recently been proposed to offload data via Device-to-Device (D2D) communications. These offloading schemes increase capacity and reduce end-to-end delay in cellular networks and help to serve the dramatically increasing demand for high quality video...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.