The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor network (WSN) consists of sensor nodes to sense environmental or physical data and that will be communicated to sink through one hop or multi hop communication. These sensors are small, with limited processing and computing resources. These sensors can sense, measure, and gather information from the environment and transmit that data to the sink. All nodes in network are trying to...
Dynamic allocation and release of lightpaths cause spectral fragmentation and degrade the bandwidth occupation in elastic optical networks (EON). Spectral reallocation and defragmentation strategies are key issues to minimize this problem and should be carefully chosen to simplify network management and to avoid excessive use of hardware. In this paper, we investigate the application of three different...
The recently developed Software-Defined Networking (SDN) provides flexibility, scalability and reduce the cost of hardware for operators and vendors. In this paper, we propose four routing algorithms in SDN to minimize network latency and balance the traffic load of each switch link in a network. The first routing algorithm is the shortest path first (SPF) algorithm. The SPF algorithm can find the...
At present, management analysis bandwidth in a university is indispensable. It aims to control bandwidth usage, so that all spots can be served comfortably especially to supporting the teaching and learning activities. In this study, an analysis and clustering of the university internet traffic is required as bandwidth management decision support. Therefore, K-Means as a clustering algorithm bandwidth...
A user in IEEE 802.11(Wi-Fi) system must associate to a particular Access Point (AP) to communicate through the Internet. According to the current association method which is based on Receive Signal Strength Index(RSSI), the user first identify its convenient APs and associate with the strongest AP, excluding the fact whether that AP is overloaded or not. In current scenario, the wireless network...
Traditional fronthaul (FH) solutions are not efficient and scalable enough to enable large-scale Cloud RAN deployment and to support 5G evolutions. In this paper we proposed a new fronthaul interface call Next Generation Fronthaul Interface (NGFI). The design principles of the NGFI are described including decoupling the FH bandwidth from the number of antennae, decoupling cell and user equipment processing...
Data transfer of large files over the Internet is often performed using Peer-to-Peer (P2P) technology. BitTorrent is the most popular P2P content distribution application. In general, BitTorrent users have much higher download bandwidth than upload bandwidth. It leads to bottleneck problem under the lack of the upload bandwidth, and it drastically degrades the performance of the overall system. In...
We demonstrate real-time and fair throughput control among ONUs as realized by our dynamic-load-balancing method. Experiments on the proposal show that it achieves uniform throughput for ONUs that download 3-sec blocks of heavy traffic through OSUs with different bias levels.
In order to estimate the DL cell average throughput of LTE network, the paper proposes an algorithm of LTE throughput based on MCS level distribution which can be used to estimate the DL cell capacity under different load conditions. The algorithm is convenient for operation and useful in guiding network planning and optimization, the simulation results show that the algorithm is effective and the...
There is a fast growing number of public spaces offering Wi-Fi access to meet the rising demands for the Internet. It is common for such service to be offered to users at no charge or for a flat fee. Both situations provide very little incentive for Wi-Fi providers to offer better service to the users. Similarly, Wi-Fi providers pay a monthly flat-rate to ISP for Internet access, which does not incentivize...
This paper presents a novel approach for device-to-device transmission. The proposed method has a variety of transmission modes that can be used interchangeably according to network traffic. With this method, much better overall system performance can be achieved.
This paper presents an analytical model for quantifying the reactive routing overhead in Mobile Ad-hoc Networks (MANETs). The overhead is characterized as a function of network mobility and traffic load. Also, a numerical model for determining the optimal cached route Time-To-Live is derived to minimize the overhead depending on network mobility and traffic load. The final result shows the minimum...
This paper presents an efficient resource allocation approach for outband device-to-device communication within cellular networks. The proposed method aims to maximize bandwidth resource utilization and simplify system protocols, greatly optimizing throughput by minimizing the number of blocked connections and increasing the ease of operation. Using this method, bandwidth resources can be effectively...
We propose an upstream wavelength assignment mechanism for TWDM-PON by taking inter-channel crosstalk effect into account. The proposed mechanism is evaluated and results show it relaxes DeMux design without degrading network performance.
In this paper, we consider the impact of spectrum fragmentation along the optical single-/multi-path routing transmission on the efficiency of the elastic optical networks. Using O-OFDM multicarrier transmission as a promising technique makes it possible to choose just an adequate portion of available spectrum to satisfy the requested capacity. This involves focusing on the work to reduce the fragmentation...
A multi-rooted hierarchical tree topology has been widely adopted for many data center networks. It provides good utilization of resources as well as better performance, still fat tree Data Center Network has two limitations i.e traffic load balance and agility. This is because it is unable to support different traffic types efficiently and has no capacity to access all services by all servers. A...
In this article, the chief research and analysis of the network performance measurement and its research trend in the world are introduced. The network measurement technologies are classified according to consultative layer and other method. Measurement technologies of network layer are emphasized. The advantages/disadvantages of the bandwidth measurement technologies and traffic measurement technologies...
Cellular Network Providers (CNP) provide users with wireless data access to meet the growing ubiquitous demand for the Internet. As users subscribe to a fixed data plan for a monthly flat fee, some users may exhaust their data allowance before the end of the billing cycle, while others underutilize their monthly quota. To take advantage of such underutilization, Khausik et. al. propose a mechanism...
Advances in process technology has enabled the integration of many cores on a single die. The advent of many core systems has led to a commensurate increase in cache coherence complexity. As a solution to this problem, researches have proposed directory based protocols, which are scalable alternatives to snoop-based protocols. Although write-invalidation based directory protocols enhance the performance...
Disasters can cause extraordinary service demand by the public, while concurrently causing outages that reduce network capacity to serve the surging demand. It is imperative that services supporting disaster response management perform with minimal degradation during such events. In order to provide adequate service to special users like first responders, priority treatment mechanisms have to be developed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.