The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose improvements for the physical uplink control channel (PUCCH) format 2 control signaling in 3GPP-LTE systems. These improvements can be useful for low-cost UE design and optimization planned for the future LTE releases. In the proposed method, instead of repeating a single QPSK symbol across the 12 subcarriers in each OFDM symbol of a resource block as done in the current release of the...
This article explores the possibility of using traffic optimization techniques within the context of the LISP (Locator/Identifier Separation Protocol) framework. These techniques use Tunneling, Multiplexing and header Compression of Traffic Flows (TCMTF) in order to save bandwidth and to reduce the amount of packets per time unit. Taking into account that encapsulation is necessary in LISP, bandwidth...
IP mobility management has a key role in wireless networking and mobile Internet. The existing IP mobility protocols are deployed generally in a centralized manner. All the data traffic passes through a centralized entity and all the bindings are managed at this entity as well. As the number of mobile users and the volume of their traffic increase, such centralized architectures may encounter scalability...
Dynamic power management techniques have been proposed in a number of recent approaches to reduce the energy consumption of telecommunication networks and devices. These techniques aimed at finding an optimal trade off between network performance and energy requirements. Control policies using energy-aware routing and traffic engineering can be used in order to extend these techniques to the whole...
Search engines and Internet service providers rank domains leveraging on search hits, information gathered through social networks, advertisement campaigns, and third-party applications such as web-browser extensions. Unfortunately, these methods are difficult to implement and deploy as they require substantial amount of traffic and data to be analysed. In this paper we describe a novel methodology...
Ultra wideband (UWB) signal has a broad spectrum and high resolution; therefore it is potential in communication and identification areas. At present, for the communication perspective, UWB wireless sensor network (WSN) plays an important role. And for the identification perspective, UWB radar, radar, passive radar and WSN with special sensors make a great achievement. In the paper, a novel method...
Context data collection is a fundamental and important process for realizing context-aware recommender or personalization systems. The existing context data collection approaches are based-on traditional TCP/IP that has several disadvantages such as lack of mobility and security. On the other hand, Content-Centric Networking (CCN) provides advantages in terms of mobility, security, and bandwidth efficiency...
In the last few decades, environmental impact of the petroleum-based transportation system, along with the lack of oil, has led to renewed interest in Electric Vehicles (EVs). The electric power grid has to supply sufficient electric power as the energy source of EV. In order to satisfy the huge demand of electric power by the continuously growing EVs, the grid should be innovated towards smart grid...
Wolves attacks to sheep and goats are very frequent at night. It has caused great economic losses in some countries. When an animal feels the presence of people or different animals, it experiences an increase of its cardiac frequency and corporal temperature. In this paper, we present a network of wireless nodes using IEEE 802.15.4 technology, which are capable of monitoring the vital signs of the...
The performance of communication protocols in vehicular networks highly depends on the mobility pattern. Therefore, one of the most important issues when simulating this kind of protocols is how to properly model vehicular mobility. In this paper we present VACaMobil, a VANET Car Mobility Manager for the OMNeT++ simulator which allows researchers to completely define vehicular mobility by setting...
Thanks to the expansion of wireless networks, Voice over IP (VoIP) is becoming widespread. Because of the particular characteristics of the physical layer of wireless scenarios, providing good levels of quality has become a new challenge for multimedia services. The current trend is to measure the Quality of user Experience (QoE), instead of only assessing network metrics (Quality of Service, QoS)...
In large scale sensor networks, storage nodes may be placed as an intermediate tier for caching the sensor readings and respond to queries, resulting in reduced power consumption and storage savings for sensors. However if a storage node is compromised, it will create privacy issues and may return fake/incomplete results. Thus we suggest a simple yet effective dummy reading-based anonymization framework,...
In Wireless Sensor Network (WSN) based smart grid condition monitoring applications (e.g., the detection of a Partial Discharge (PD) event in high voltage transformers), network traffic dramatically increases when cascaded faults occur. Reliability and delay are among the main issues that are affected by this increase in the traffic rates. In this paper, we present an adaptive Quality of Service (QoS)...
Vertical handoff is crucial to future wireless communication. In this paper, a two-step vertical handoff decision algorithm based on dynamic weight compensation is proposed. This algorithm adopts the filtering mechanism to reduce the system cost and improves the conventional algorithm by dynamic weight compensation and consistency adjustment. The experimental results show that our algorithm outperforms...
We provide a general framework for data offloading in a cellular network, where some demand of users is served in a complementary network. The complementary network is either a small-cell network that possibly shares the same resources as the cellular network, or a WiFi network that uses orthogonal resources. For a given demand served in a cellular network, the load, or the level of resource usage,...
Small cells are an attractive technology for offloading traffic from the macrocellular network. The first small cell architecture for offload was the femto cell, but it was not widely commercially deployed. This is because it had some drawbacks in terms of network planning such as interference handling. In this paper, we propose and study a new concept for a low-cost small cell base station (BS) for...
Stereoscopic 3D video is an important technology for immersive and interactive multimedia. Quality of Experience (QoE) provision is a key objective of the emerging multimedia delivery systems. While subjective assessment of QoE remains the most reliable option, objective metrics are often sought after while engineering practical media distribution solutions. While there have been several efforts in...
In this work, the relation between the key parameters of Wireless Information-Theoretic Security, namely the probability of non-zero secrecy capacity, the outage probability, and the shadowing deviation is investigated. The purpose is to provide a framework to identify the boundaries of secure communication from a physical layer standpoint in MANETs. This framework is heavily influenced by the intrinsic...
Peer-to-peer streaming is a fundamental approach for the delivery of real-time video content. Although self-scalable, peer-to-peer networks suffer from peer dynamics like unpredictable arrivals and departures. In tree-based overlays, these phenomena lead in frequent disconnections or network partitioning. In the present work, a failover mechanism for multiple-multicast-tree-based overlays is presented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.