The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A downlink MAC scheduler aims to improve the radio resources utilization in the Long Term Evolution (LTE) network. The MAC scheduler is responsible for sharing the available radio Resource Blocks (RBs) among different User Equipment (UEs) in time and frequency domains. Several downlink MAC schedulers have been proposed and implemented; however, providing fairness in terms of granting resources to...
In recent years, wireless networks (including WLANs and cellular networks) have been widely deployed in enterprise, public areas and homes. In wireless networks, users are observed to act collaboratively rather than arriving or leaving independently. In this paper, we have analysed real WiFitraces deployed in an enterprise in 2012 and cellular network traces from a urban areas in China in 2013. We...
The rollout of residential photovoltaic (PV) battery systems is mainly motivated by cost saving. Investment decisions are often based on general figures such as the yearly electricity consumption. Simulations used for scientific publications often use standard load profiles or measured load profiles of a specific household. In the latter case, the decision of adequate temporal resolution has to be...
OpenFlow Switch in Software-Defined Networking (SDN) has changed packet classification from standard 5-tuple to arbitrary many-field. The growing number of fields in a rule and the increasing number of rules in a ruleset poses great challenges for packet classification in terms of performance, storage, and update cost. In this paper, we design a two-stage packet classification system to address those...
Imbalanced load distribution among multiple APs (access points) has become a serious problem in enterprise WLANs. Load imbalance causes inefficiency of network usage and unreasonable resource allocation. We find that users tend to come and leave together, which can lead to fluctuation of network load. We propose a novel online AP allocation scheme (ASC) to keep load balanced when users come and leave...
Owing to Big Data popularity, the metrics Variety, Volume and Velocity (V3), are gaining importance in large scale data intensive applications. Complex Event Processing (CEP) is an efficient solution for identifying events of interest on data streams arriving from geographically distributed heterogeneous sources in near-real time. CEP is capable of handling large variety of data with high computational...
MANETs are the networks in which each node communicates with the help of an instant infrastructure in the network. Hence these networks have great dependence on its battery power. The battery power has greater influence on the overall life time of the network. In the network, to demote the power various power saving techniques are used. One such method is the power management techniques in which the...
Resource allocation mechanisms are important in assigning all available resources in the network. Scheduling is one of the resource allocation mechanism which will determine the performance of the network. This paper provides the performance analysis on three different scheduling algorithms in the Long Term Evolution-Advanced downlink transmission system with realistic channel model for urban macro...
Carrier aggregation has been introduced by 3rd Generation Partnership project (3GPP) in order to meet the IMT-Advanced requirements. Using carrier aggregation, multiple component carriers with a different bandwidth, dispersed within intra or inter bands can be simultaneously utilised to provide higher data rates, better coverage and lower latency resulting a better user experience. However, carrier...
Commercial web search engines adopt parallel and replicated architecture in order to support high query throughput. In this paper, we investigate the effect of caching on the throughput in such a setting. A simple scheme, called uniform caching, would replicate the cache content to all servers. Unfortunately, it does not exploit the variations among queries, thus wasting memory space on caching the...
String matching or pattern matching algorithms are used in various applications. They are used to find the occurrences of a pattern in a given text or a pool of strings. They are widely used in text editors in computing machines, database queries, bio-informatics, chem-informatics, search engines and many more applications. String matching algorithms can be of two ways: single pattern matching and...
Cognitive Radio is emerged as a means of improving the efficiency of current spectrum by utilizing the available unused spectrum. There are many challenges in the systematization of Cognitive Radio Network and the most obvious is to fulfill the awareness requirement. In a network the nodes are must be able to share the spectral information among them which requires inter node communication channel...
Very High Throughput Multi-User Multiple Input Multiple Output (VHT MU-MIMO) is an 802.11ac communication mode that allows an Access Point (AP) to simultaneously transmit multiple data streams as Aggregated Multi-Protocol Data Units (A-MPDUs) to a group of multiple stations (STAs) over the same channel. This mode combines communication technologies that enable the 802.11ac protocol to use spectrum...
Data reduplication is a special technique to recognize the duplicate data, which stores only one copy for all redundant data, and creates a link to that copy so when data is access by the user, one will have to refer that link. Out-band reduplication is done, after the backup has been written. In today's era, data reduplication has become the necessity and critical component for the primary storage...
Routing plays a critical role in determining the performance of a multi-hop wireless mesh network. When there are a large number of nodes available the task of communication becomes quite challenging. Our main concern is energy-efficient routing. Energy conservation is a critical issue in wireless networks for node and network lifetime, as the nodes are powered by batteries only. One major approach...
Routing plays a critical role in determining the performance of a multi-hop wireless mesh network. When there are a large number of nodes available the task of communication becomes quite challenging. Our main concern is energy-efficient routing. Energy conservation is a critical issue in wireless networks for node and network lifetime, as the nodes are powered by batteries only. One major approach...
Wireless sensor networks are emerging as broadband communication networks, because of their bandwidth, low cost and easy installation. In large sensor networks, data aggregation significantly reduces the amount of communication and energy consumption in the network. In this paper two different routing protocols namely Ad hoc On-demand Distance Vector (AODV) routing protocol and Secure-aware Ad hoc...
This paper considers the design of a cross-layer medium access control (MAC) protocol for wireless ad hoc cooperative networks. Specifically, we redesign the message exchange process of the MAC protocol previously proposed by Shan et al. By using a HRP signal with shorter length the proposed protocol can reduce the protocol overhead and thus improve the transmission reliability. We also propose to...
An auction-based algorithm is proposed for subcarrier assignment for multiple users amplify and forward (AT) orthogonal frequency division multiple access (OFDMA) system aiming to maximize the fairness index. The proposed algorithm is based on one-shot auction, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The...
Traffic classification is used to perform important network management tasks such as flow prioritization and traffic shaping/pricing. Machine learning techniques such as the C4.5 algorithm can be used to perform traffic classification with very high levels of accuracy; however, realizing high-performance online traffic classification engine is still challenging. In this paper, we propose a high-throughput...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.