The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
the mobile ad hoc network (MANET) is a temporarily organized computer multi-hop communication network which is composed of mobile hosts equipped with wireless transmitters and receivers. Considering human repair, this paper studied a M/M/1 queue model for damaged nodes in MANET where the service man applies N-policy. By assuming damaged nodes' arrival be subject to Poisson process, repair time and...
In wireless networks a packet can be lost due to numerous reasons, such as congestion, medium related errors, routing and mobility. In these scenarios, the real congestion status of the network is crucial to develop accurate and efficient congestion control protocols. Some of the most known and recent protocols developed to provide faster and lighter congestion control are the eXplicit Control Protocol...
Multi-Packet Reception (MPR) enables simultaneous receptions from different transmitters to a single receiver, which has been demonstrated to bring capacity improvement in wireless network. However, MPR does not improve the transmission capability of intermediate relay nodes in a multi-hop routing and thus these nodes may become the bottlenecks for increasing throughput despite of great reception...
Most studies on hybrid automatic repeat request (HARQ) with respect to rate adaptation have been focused on throughput maximization. However, for real-time traffic, resource minimization is a more efficient rate adaptation method in OFDMA-based systems. Moreover, most previous work have dealt with either slow or fast fading channel although practical wireless channels typically exhibit a time-correlated...
We consider the two-way relay channel with random access for the cases of symmetric and asymmetric channel statistics in the low SNR regime. We propose three different schemes implementing different physical layer techniques for collision recovery and channel adaptation and obtain analytical throughput expressions. We compare the proposed schemes with several benchmarks in order to study their bandwidth...
Scheduling schemes of wireless networks determine packet transmission opportunities for each network node by considering network parameters such as link quality, transmission rate, and delay. However, security has not been taken into account in these schemes, although it plays a critical role in network performance. In this paper a new scheduling scheme is proposed to determine packet transmissions...
In the paper, we consider the end-to-end routing and link scheduling problem for multi-hop wireless sensor networks. The efficient link scheduler under our consideration is intended to assign time slots to different users so as to minimize channel usage subject to constraints on data rate, delay bound, and delay bound violation probability. We also present a coupled robust multi-path routing structure...
Energy Harvesting (EH) nodes, which harvest energy from the environment in order to communicate over a wireless link, promise perpetual operation of a wireless network with battery-powered nodes. In this paper, we address the throughput optimization problem for a rate-adaptive EH node that chooses its rate from a set of discrete rates and adjusts its power depending on its channel gain and battery...
This paper addresses the problem of interference coordination in relay-aided cellular OFDMA systems, aiming at exploiting the benefits of RNs while minimizing the negative effects of interferences introduced. We first analyze the possible interference scenarios in multi-cell OFDMA systems. Based on the insights in our analysis, we propose an Integrated Interference Coordination Scheme (IICS) for cellular...
In cognitive radio (CR) networks, cooperative relaying is emerging as a key technology to improve the performance of secondary users (SUs), while ensuring the quality of service of primary transmissions. Most previous work considers maximizing physical layer throughput as a design criterion. However, the end-to-end Transmission Control Protocol (TCP) performance perceived by SUs is largely ignored...
Due to integrated high-speed networks accommodating various types of services and applications, the quality of service (QoS) requirements for those networks have also become diverse. The network resources are shared by the individual service traffic in the integrated network. Thus, the QoS of all the services may be degraded indiscriminately when the network becomes congested due to a sudden increase...
Several load balancing techniques for IP routing scheme have appeared in the literature. However, they require optimization process to compute optimal paths to meet traffic demand so that it requires a mechanism to measure traffic demand and to share them among all routes in order to follow dynamics of traffic. It naturally results in communication overhead and losing sensitivity to follow traffic...
Among the techniques proposed to reduce interference in cellular ODFMA networks, base station cooperation (BSC) is currently the technique known to achieve the highest network throughputs. Its deployment however is vastly expensive and cheaper alternatives are expected to play an important role in future wireless access standards. This contribution introduces relay-augmented networks based on the...
In this paper, we present a practical and provably secure two-way wireless communication scheme in the presence of a passive eavesdropper. The scheme implements a randomized scheduling and power allocation mechanism, where each legitimate node transmits in random time slots and with random transmit power. Such randomization results in ambiguity at the eavesdropper with regard to the origin of each...
We introduce a homogeneous $r$-regular network model for a peer-to-peer (P2P) video broadcast network. Such networks are simple to construct and allow the implementation of fairness strategies. We use our model to show why the greedy and rarest first push-based strategies give the suboptimal performance often observed in the literature. We propose a novel network coding based transmission strategy...
Cross-layer design has been widely used in wireless sensor networks, especially to improve the network lifetime, as can be seen in the literature. In this paper, a cross-layer solution is combined to a transmission advertisement scheme to improve a slotted ALOHA-based wireless sensor network throughput and lifetime. This medium access method scheme has been chosen because it does not add protocol...
Network coding aware routing protocols have been an interesting research topic in recent years. In this paper, we explore similar routing gains with physical layer coding techniques. A source routing protocol S3 is proposed to be implemented with a routing metric called iETT. By extending the traditional ETT measurement, iETT provides a simple way to make the routing protocol interference-aware. To...
Content Delivery Network services, which were originally aimed at achieving fast content delivery, began being used for fast delivery of data stored in cloud services, but they are only effective for frequently accessed data. In this paper, we present an overlay architecture of inter- data center (DC) networking for fast content delivery that is effective for long-tail contents. Based on round-trip...
We present an analytical model for end-to-end (e2e) channel systems with lossy communication (E2E-CSLC) of multihop wireless networks using Quasi-Birth Death models (QBDs). Moveover, we show that the state set of level 0 of E2E-CSLC model, i.e., S0, is an attractor according to the special structure of QBDs, which is the foundation of studying the probabilistic reachability for E2E-CSLC. Based on...
Data deduplication techniques are ideal solutions for reducing both bandwidth and storage space requirements for cloud backup services in data centers. Current data deduplication solutions rely on comparing fingerprints (hash values) of data chunks to identify redundant data and store the fingerprints on a centralized server. This approach limits the overall throughput and concurrency performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.