The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Compressive random access scheme is considered one of promising candidates for future Machine Type Communications. It enables one-shot detection, which means that the preamble, channel estimation, and data detection could be carried out at once to keep signaling overhead low. For one-shot detection, improving the performance in terms of the number of successfully received preambles is necessary. To...
In data centers, micro-burst is a common traffic pattern. The packet dropping caused by it usually leads to serious performance degradations. Therefore, much attention has been paid to avoiding buffer overflow caused by micro-burst traffic. In particular, ECN is widely used in data centers to keep persistent queue occupancy low, so that enough buffer space can be available as headroom to absorb micro-burst...
Network providers now want to enable users to define their own flow priorities, and commercial devices already implement this ability. However, it has been shown that directly applying arbitrary user-defined priorities can fundamentally destabilize a network. In this paper, we show that it is possible to apply user-defined priorities while keeping the network stable. We introduce U-BP, a scalable...
Machine-to-Machine (M2M) communication is considered one of the essential elements of the Internet of Things (IoT) for enabling objects to communicate over potentially large distances. It is predicted to be the dominant source of traffic in 5G networks. To enable M2M communications on LTE networks, which is considered the main cellular access technology for M2M communications, several issues need...
Active queue management (AQM) is broadly accepted as the tool of choice for tackling bufferbloat (the accumulation of large queueing delays) in network buffers. CoDel and PIE are considered two of the most promising AQM schemes, but little has been done to adopt them in cellular networks, which are particularly plagued by bufferbloat. This is partly due to the lack of adequate evaluation of their...
In this paper, we address the problem of routing disruption attacks in Cognitive Radio Networks (CRNs). In routing disruption attacks, the malicious node intentionally drop data packets to consume more network resources or degrade routing performance. We propose a trust management model to mitigate such attacks in CRNs. Through monitoring forwarding behaviors of secondary users (SUs), trusts of SUs...
The mobile devices are becoming the important part in our everyday life. These are now one of the basic needs of our daily life. These devices are used to share the data of interest with one another. Data may be in the form of picture or video clip, news etc. But sometimes, data cannot reach to the user who is interested, because of delaying of messages. Sometimes nodes do not want to loose their...
In distributed OpenFlow controller networks, the network flow is managed by set of associated rules that are maintained by switches in their local Ternary Content Addressable Memory (TCAM) and rules are made by concerned controllers, which are local to domains. However, TACM is expensive and consumes high power. The switch inside the forwarding plane has limited TCAM space and is infeasible to maintain...
A mobile adhoc network is an independent system of mobile stations associated by wireless link to form a system. This system can be modeled in the form of an uninformed graph. Adhoc networks are peer to peer, multihope networks were data packets are transmitted to a source to destination through intermediate nodes (which serve as router). The infrastructure is not the main issue to setup MANET and...
Cross-layer design with respect to reference layered architecture is the design of algorithms, protocols and architectures that utilize an available set of interlayer exchanges a superset of the standard interfaces provided by the reference layered architecture. The cross layer approach transports feedback, dynamically via the layer margins to enable the remuneration for e.g. load, latency or other...
This paper addresses the problem of joint routing and backhaul link scheduling in a dense small cell network using 60GHz multi-hop backhaul, coordinated by a local Cloud-RAN central unit. Our objective is to optimally select the backhaul links and paths to be activated in time domain to enhance the cell throughput and to minimize the total delay, considering the backhaul channel conditions and the...
This paper proposes the application of a quantum inspired reinforcement learning technique for spectrum assignment of wireless communication networks. The proposed technique aims to enhance the speed of learning convergence through the dependence of the decision process on a well ranked action desirability table which is updated based on the success or failure of an action. In addition, the exploration...
Machine to machine communication (M2M) or machine type communication (MTC) facilitates communication without any human intervention. These applications will support an enormous number of stations (STAs). To mitigate degradation of the throughput and delay performance in wireless local area networks (WLAN) that employ carrier sense multiple access collision avoidance (CSMA/CA) protocol with request...
Flow of packets plays an important role in the network during sending and receiving process. More the packets received are good for the network users as the speed would be more leading to user satisfaction. A network can be tracked based on the packet flow throughout the network. If greater the capacity, the performance also will be great. Efforts were made to measure the incoming traffic in bits...
The tremendous popularity of smart phones and electronic tablets has spurred the explosive growth of high-rate multimedia wireless services. To alleviate the huge infrastructure investment in the exponential growth of mobile traffic and improve local service flexibility, device-to-device (D2D) communications have been considered for the next generation mobile telecommunications. This has triggered...
Deadline-aware concentration of synchrophasor data from spatially dispersed phasor measurement units (PMUs) is studied, with an objective to find the optimal policy for the wait time of a phasor data concentrator (PDC), such that the deadline-constrained synchrophasor data delivery from PMUs via PDC to control center achieves maximal expected throughput. When the statistical information on the communication...
Modern Data Centers (DCs) host hundreds of thousands of servers running diverse applications and services. The variety of these applications mandates distinct requirements such as latency and throughput. The state-of-the-art TCP protocol fails to meet these requirements, rendering the design of efficient DC transport protocols an urgent need. Since UDP is the most popular protocol besides TCP, it...
This paper describes a fine resolution, good linearity, and high throughput time-to-digital converter (TDC), which has realized in 0.18um CMOS technology. Based on a two-channel Vernier delay line (VDL) structure and an asynchronous pipelined readout circuitry, the TDC can achieve a maximum throughput of 500MS/s, a time resolution of 10ps and a total conversion range of 640ps. The proposed architecture...
How to adjust parameters to adapt to the dynamic network conditions is a main problem in wireless communications. There are not any effective methods to deal with this problem, especially in non-saturation conditions. By analyzing feedback signal of channel, we introduce a linear adjustment rules of CW about idle slot intervals of channel, which can be used in non-saturation conditions. And then,...
The objective of increasing the Energy Efficiency of communication systems must cope with a sustained growth of the market, a greater penetration of broadband services in everyday life, higher data rate services and a large increase of the number of mobile subscriptions. In this scenario, a particular attention has to be devoted to energy saving strategies that may also contribute to the reduction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.