The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a wireless body area networks (WBAN) with integrated sensor hubs, the proposed MAC protocol is a TDMA-based schedule used in active superframe interleaving and beacon shifting defined by the IEEE 802.15.6 standard. It considers the human dynamics and traffic information to meet the different QoS requirements of each sensor, improve bandwidth utilization and reduces packet collisions within networks...
Network Functions Virtualization (NFV) is a new network paradigm that has been strongly promoted from both scientific community and telecom industry, where network functions (NFs) such as firewalls, load balancers, gateways among others, are virtualized, isolated from middleboxes and housed on one or more industry standard computing nodes. One of the main challenges for service providers when they...
With the technology improvements, managing a large amount of multimedia objects such as audio, video, picture or a combination of these has become possible. Multimedia data needs more real time storage and high data transfer than traditional textual and numeric data. In addition to these requirements, significant amount of computation is demanded for multimedia applications to serve many users at...
This paper investigates the resource allocation problem in heterogeneous cognitive radio networks (HCRNs). In this paper, two types of users, i.e., multi-homing and single-network cognitive radio users (CRUs), are considered to coexist in HCRNs. Multi-homing CRUs can access multiple networks simultaneously, while single-network CRUs can be served by only one network at a time. With the aim of maximizing...
Inter-Cell Interference Coordination (ICIC) techniques are proposed as solutions to alleviate the negative impact of interference on system performance, while enhancing the provided Quality of Service (QoS). Typically, the available bandwidth is divided into inner and edge sub-bands. Users are also classified into interior and edge users. The available resources in each zone are exclusively allocated...
Due to the expansion of the unmanned aerial vehicle (UAV) market, there is the issue of spectrum scarcity for unmanned aerial system (UAS). Thus, it needs to allocate the resource effectively in the limited bandwidth considering the network environment. In this paper, we propose the frame structure and the resource allocation algorithm which can maximize the network throughput as well as satisfy the...
This paper evaluates the link-level performance of millimeter wave (mmWave) wireless communication system operating on 39.5 GHz frequency band. A frame structure based on the long term evolution (LTE) is proposed, including resource allocation and reference signal pattern. Some key parameters are carefully set to adapt to the mmWave frequency. Simulation results validate that the performance of mmWave...
The increasing demand for underlaying cellular network has benefit form Device-to-Device (D2D) communication, where one need to apply productive plan for resource allocation to increase system capacity and mitigate interference. The bipartite graph matching strategy is used for optimizing the resource allocation among all other strategies; Kuhn-Munkres (KM) is one of algorithm applied to increase...
Using Ethernet in fronthaul can achieve statistical multiplexing gains based on the new function split. When TWDM-PON is used in Ethernet based fronthaul network, the large granularity of bandwidth requirements and the diversified service types will lead to the bandwidth fragmentation in OLT pooling. To solve this challenge, we develop a mathematical model by establishing the 0–1 relationship matrix...
Network service providers have to cope with the growing on-demand need from end-users as well as the diversity of usage. The softwerization and cloudification of the network components offer an interesting solution to achieve the agility necessary to dynamically match the requirement with the level of resource consumption. This materializes with the deployment of Network Functions Virtualization (NFV)...
Service chaining composed of several different virtual network functions (VNFs) constitutes a use case of Network Functions Virtualization (NFV). In a conventional method, the optimal allocation of VNFs and logical paths was resolved by using integer linear programming. However, because the approach did not consider that the required resources of each service differ, the residual resources of the...
Centralized Radio Access Network (C-RAN) architecture is the enabling technology for the deployment of massive number of antennas essential to meet the requirements of next generation (5G and beyond) mobile systems. In C-RAN the fronthaul links between processing Base Band Units (BBUs) and Remote Antenna Units (RAUs) are conventionally based on fiber optic, although its deployment cost can be excessive...
We propose a wireless virtualization framework based on the Stackelberg game model for resource allocation in downlink orthogonal frequency division multiple access (OFDMA) wireless networks. Specifically, the wireless virtualization model enables an infrastructure provider (InP) to effectively lease radio resources to multiple mobile virtual network operators (MVNOs) through adaptively setting resource...
Centralized Radio Access Network (C-RAN) architecture is considered the only viable solution to handle the complex interference scenarios generated by massive antenna and small cell deployment foreseen for next generation (5G) mobile networks. The fronthaul links used to exchange the signal between Base Band Units (BBUs) and Remote Radio Heads (RRHs) are conventionally based on optical fiber, due...
This work proposes a framework for proactive resource allocation in IaaS clouds to improve the system performance. In this system framework, the over-commit approach is applied to improve resource utilization and to show the performance impact. Although the over-commit approach could obtain better resource utilization, there are still some risks. When the amount of aggregated resources requested by...
Internet of Things (IoT) is combination of things and Internet. Things in IoT communicate via Internet. IoT has several heterogeneous devices and results to many issues. In this work we have proposed agent based job classification and resource allocation in IoT. In the proposed methodology agent uses the Fuzzy Interference System. Agents are defined in two hierarchicy namely at Local Processor Agency...
In this paper we consider the problem of channel allocation for users who access a common channel using OFDMA. The spectrum is divided into subchannels and we assume that the bandwidth of each subchannel is smaller than the coherence bandwidth. This leads to correlations between the channel coefficients for each user. We model these correlated channels as an m-dependent sequence and generate an interference...
Internets of Things (IoT) are network of interconnected devices and communicate through internet. IoT constitutes huge number of heterogeneous devices and is prone to many issues. Devices in IoT senses enormous information that needs lots of network resources. In this work we have designed a Fuzzy Interference System (FIS) for classification of the jobs in to emergent and non-emergent jobs at local...
Network Virtualization is one of the most promising technologies for future networking. Network Virtualization allows multiple virtual networks to coexist on same shared physical infrastructure simultaneously. One of the crucial keys in Network Virtualization is Virtual Network Embedding, which provides a method to allocate physical substrate resource to virtual network requests. In this paper, we...
Device-to-device transmission technology can help base stations achieve high transmission rates and meet high-capacity requirements. It is also a key technology for future markets. Additionally, the coexistence of licensed and unlicensed bands will be relevant to the landscape of the emerging 5th-generation cellular systems. However, there is a shortage of research on efficient transmission during...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.