The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Penetration of multimedia communications with mobile Wi-Fi and tethering requires wireless LANs (WLANs) to guarantee a specific bandwidth in densely deployed WLANs. IEEE802.11e (HCCA) with 802.11aa could use inefficiently radio frequency as well as fail to provide each WLAN with enough CFP period in which sending opportunity of a terminal is guaranteed. To guarantee a specific bandwidth even in densely...
Demand for ad-hoc networks is increasing so it is expected ad-hoc networks will exist in close proximity in the future. A contention window control method, ACWA, which improves throughput of ad-hoc network against radio interference has been recently proposed. However unfairness of throughput between ACWA and DCF might be caused. We propose a modified ACWA method (GSAR scheme) which drastically improves...
The ability to provide a high Quality of Service is a crucial aspect in the acceptance and widespread dispersion of the Industrial Internet of Things and it has a key role to enhance the end user experience. The emerging fog cloud computing architectural concept aims to diminish the experienced latency while simultaneously providing a seemingly unlimited quantity of computational power by moving computations...
Cognitive radio (CR) is a promising method suitable for solving inefficiency spectrum policy by opportunistically identifying the vacant portions of the spectrum that are used by primary users (PUs). In cognitive radio ad hoc networks (CRAHNs), secondary users (SUs) can opportunistically utilize the spectrum that is available from PUs. In this paper, we propose a neighbor-aware distance estimated...
BBR is a recently proposed congestion control. Instead of using packet loss as congestion signal, like many currently used congestion controls, it uses an estimate of the available bottleneck link bandwidth to determine its sending rate. BBR tries to provide high link utilization while avoiding to create queues in bottleneck buffers. The original publication of BBR shows that it can deliver superior...
Recently, 5G systems started to explore the usage of mmWave bands both for access and backhaul. Cellular systems operating at such frequencies would achieve a significantly higher capacity than current systems due to the large frequency block available. Due to the propagation characteristics, highly directional mmWave links may frequently switch between Line-of-sight, Non Line-of-sight and outage...
Network performance is one of the most important entities in today’s long-distance networks. TCP congestion control mechanisms play an important role in these networks. Most of the current TCP congestion control mechanisms which are also known as TCP variants, detect congestion and slow down the packets transmission to avoid further congestion in the network. In this paper, three classes...
Multilayer Clustered Designing Algorithm is exploited to present MCDA - Hot Spot algorithm; a technique to increase the network throughput by alleviating the impact of hotspot issue on network lifetime. The network nodes in the hot spot region are in a flat layer form in contrast to rest of the network nodes that are grouped into clusters. This design substantially helps in achieving goal above. This...
Low Power Wide Area Networks (LPWAN) technologies have recently triggered many research efforts and standardization activities due to the inherent possibility of both providing long range wireless communications and guaranteeing a long life for very cheap sensing devices. At the same time, the increasing interest of telco operators into such kind of networks is due to the wide range of applications...
Energy harvesting has been gaining a lot of attention in the past decade due to its ability to provide a-virtually-endless energy supply. Nodes in a Wireless Powered Communication Network (WPCN) depend, totally or partially, on the energy harvested from the Central Node (CN) which has a constant power supply. This work addresses a solution to the problem of lack of fairness in the distribution of...
Automation of modern industrial plants require real-time tracking of object locations and sensing of local and ambient parameters for variety of applications such as counting and tracking of objects in assembly line, detection and positioning of failures of machines etc. Mostly, discrete Real Time Location System (RTLS) performs object tracking in existing industrial automation without its integration...
The network infrastructures have been rapidly upgraded in many high-performance networks (HPNs). However, such infrastructure investment has not led to corresponding performance improvement in big data transfer, especially at the application layer, largely due to the complexity of optimizing transport control on end hosts. We design and implement ProbData, a PRofiling Optimization Based DAta Transfer...
This paper considers a fast fading wireless powered wiretap channel, where an energy constrained information source, powered by a dedicated power beacon, sends a secret message to a legitimate user using the artificial noise (AN) scheme in the presence of a passive eavesdropper. Based on a two-phase time division protocol, the ergodic secrecy throughput is derived. Furthermore, the optimal time-switching...
In this paper, we propose a non-orthogonal random access (NORA) technique for the uplink 5G networks, in which user equipments (UEs) make use of the channel inversion so that their received power at the base station (BS) can satisfy a certain threshold condition. In particular, each UE opportunistically adjusts its transmit power according to its channel gain. We also mathematically analyze the system...
Recently, the 3rd Generation Partnership Project (3GPP) has standardized LTE-licensed assisted access (LTE-LAA) supporting LTE downlink carrier aggregation (CA) in the 5 GHz unlicensed spectrum. LTE-LAA technology allows LTE operators to freely use additional frequency resources in the 5 GHz unlicensed spectrum. Therefore, the problem of coexistence with other existing communication technologies in...
Backscatter communication enables a device to transmit or receive data using only the energy harvested from ambient RF signals. It can be realized via employing energy-efficient modulation and demodulation mechanisms. Specifically, a threshold-based demodulation method integrated with signal smoothing has generally been employed for backscatter communications. However, previous proposals considering...
Due to the expansion of the unmanned aerial vehicle (UAV) market, there is the issue of spectrum scarcity for unmanned aerial system (UAS). Thus, it needs to allocate the resource effectively in the limited bandwidth considering the network environment. In this paper, we propose the frame structure and the resource allocation algorithm which can maximize the network throughput as well as satisfy the...
Cumulative distribution function (CDF)-based scheduling (CS) has been known as an efficient technique for cellular networks, which satisfies arbitrary channel access ratio requirements of users in a cell, while efficiently exploiting multiuser diversity (MUD). In this paper, we mathematically analyze both throughput and energy efficiency (EE) of CS in a multi-cell downlink network where the users...
Cognitive radio networks (CRNs) enable secondary users (SU) to make use of licensed spectrum without interfering with the signal generated by primary users (PUs). To avoid such interference, the SU is required to sense the medium for a period of time and eventually use it only if the band is perceived to be idle. In this context, the encryption process is carried out for the SU requests prior to their...
Traffic engineering at network edges is challenging given the latency-sensitive nature of all applications that need to be supported. End-to-end delay estimation and forecasts were essential traffic engineering tools even before the mobile edge computing paradigm pushed the cloud closer to the end user. In this paper, we model the path selection problem for edge traffic engineering using a risk minimization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.