Search results for "Computer Science - Networking and Internet Architecture"

showing 10 items of 24 documents

On the role of symmetry in solving maximum lifetime problem in two-dimensional sensor networks

2016

We analyze a continuous and discrete symmetries of the maximum lifetime problem in two dimensional sensor networks. We show, how a symmetry of the network and invariance of the problem under a given transformation group $G$ can be utilized to simplify its solution. We prove, that for a $G$-invariant maximum lifetime problem there exists a $G$-invariant solution. Constrains which follow from the $G$-invariance allow to reduce the problem and its solution to a subset, an optimal fundamental region of the sensor network. We analyze in detail solutions of the maximum lifetime problem invariant under a group of isometry transformations of a two dimensional Euclidean plane.

Networking and Internet Architecture (cs.NI)FOS: Computer and information sciencesMathematical optimizationComputer scienceGroup (mathematics)Computer Networks and CommunicationsSymmetry groupInvariant (physics)TopologySymmetry (physics)Computer Science - Networking and Internet Architecturesymmetry groupEuclidean geometryHomogeneous spaceIsometryInvariant (mathematics)Electrical and Electronic Engineeringwireless sensor networksWireless sensor networkenergy efficiencyInformation SystemsWireless Networks
researchProduct

Efficient Steering Mechanism for Mobile Network-Enabled UAVs

2022

HTTP Adaptive Streaming (HAS) is becoming the de-facto video delivery technology over best-effort networks nowadays, thanks to the myriad advantages it brings. However, many studies have shown that HAS suffers from many Quality of Experience (QoE)-related issues in the presence of competing players. This is mainly caused by the selfishness of the players resulting from the decentralized intelligence given to the player. Another limitation is the bottleneck link that could happen at any time during the streaming session and anywhere in the network. These issues may result in wobbling bandwidth perception by the players and could lead to missing the deadline for chunk downloads, which result …

Networking and Internet Architecture (cs.NI)FOS: Computer and information sciencesOptimization problembusiness.industryComputer scienceDistributed computingComputerApplications_COMPUTERSINOTHERSYSTEMS020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyComputer Science - Networking and Internet ArchitectureMechanism (engineering)0203 mechanical engineeringModels of communication0202 electrical engineering electronic engineering information engineeringCellular networkWirelessConnection steeringQuality of experienceUnmanned Aerial Vehicles (UAVs)Mobile NetworksbusinessGame theory2019 IEEE Global Communications Conference (GLOBECOM)
researchProduct

Priority Levels Based Multi-hop Broadcasting Method for Vehicular Ad hoc Networks

2015

International audience; This paper deals with broadcasting problem in vehicular ad hoc networks (VANETs). This communication mode is commonly used for sending safety messages and traffic information. However, designing an efficient broadcasting protocol is hard to achieve since it has to take into account some parameters related to the network environment, for example, the network density, in order to avoid causing radio interferences. In this paper, we propose a novel Autonomic Dissemination Method (ADM) which delivers messages in accordance with given priority and density levels. The proposed approach is based on two steps: an offline optimization process and an adaptation to the network …

Networking and Internet Architecture (cs.NI)FOS: Computer and information sciencesOptimizationVANETWireless ad hoc networkbusiness.industryComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Autonomic computingQuality of ServiceMessage priority levelAutonomic computingHop (networking)Computer Science - Networking and Internet ArchitectureDensity evaluation[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Electrical and Electronic EngineeringbusinessComputer networkBroadcast
researchProduct

Downlink channel access performance of NR-U: Impact of numerology and mini-slots on coexistence with Wi-Fi in the 5 GHz band

2020

Coexistence between cellular systems and Wi-Fi gained the attention of the research community when LTE License Assisted Access (LAA) entered the unlicensed band. The recent introduction of NR-U as part of 5G introduces new coexistence opportunities because it implements scalable numerology (flexible subcarrier spacing and OFDM symbol lengths), and non-slot based scheduling (mini-slots), which considerably impact channel access. This paper analyzes the impact of NR-U settings on its coexistence with Wi-Fi networks and compares it with LAA operation using simulations and experiments. First, we propose a downlink channel access simulation model, which addresses the problem of the dependency an…

Networking and Internet Architecture (cs.NI)FOS: Computer and information sciencesUplink channelSettore ING-INF/03 - TelecomunicazioniComputer Networks and Communicationsbusiness.industryComputer scienceOrthogonal frequency-division multiplexingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS5G NR-U Coexistence IEEE 802.11 LTE LAA Unlicensed bands020206 networking & telecommunications02 engineering and technology91A06 91A10 91A80SubcarrierScheduling (computing)Computer Science - Networking and Internet ArchitectureC.2.0C.2.50202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingC.2.0; C.2.5business5GComputer networkCommunication channelComputer Networks
researchProduct

Energy Efficiency Evaluation of Cellular Networks Based on Spatial Distributions of Traffic Load and Power Consumption

2013

Energy efficiency has gained its significance when service providers' operational costs burden with the rapidly growing data traffic demand in cellular networks. In this paper, we propose an energy efficiency model for Poisson-Voronoi tessellation (PVT) cellular networks considering spatial distributions of traffic load and power consumption. The spatial distributions of traffic load and power consumption are derived for a typical PVT cell, and can be directly extended to the whole PVT cellular network based on the Palm theory. Furthermore, the energy efficiency of PVT cellular networks is evaluated by taking into account traffic load characteristics, wireless channel effects and interferen…

Networking and Internet Architecture (cs.NI)FOS: Computer and information sciencesbusiness.industryComputer scienceApplied MathematicsMonte Carlo method020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyService providerInterference (wave propagation)7. Clean energyComputer Science ApplicationsComputer Science - Networking and Internet Architecture0203 mechanical engineeringPower consumption0202 electrical engineering electronic engineering information engineeringElectronic engineeringCellular networkWirelessElectrical and Electronic EngineeringbusinessCommunication channelEfficient energy use
researchProduct

On Constructing Persistent Identifiers with Persistent Resolution Targets

2016

Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintena…

Networking and Internet Architecture (cs.NI)FOS: Computer and information scienceslcsh:T58.5-58.64lcsh:Information technologyComputer sciencebusiness.industryOverlay network020206 networking & telecommunications02 engineering and technologycomputer.file_formatMaintenance engineeringlcsh:QA75.5-76.95IdentifierMetadataComputer Science - Networking and Internet ArchitectureData accessEncoding (memory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processinglcsh:Electronic computers. Computer sciencebusinessDisseminationBitTorrentcomputerComputer network
researchProduct

Internet of Autonomous Vehicles: Architecture, Features, and Socio-Technological Challenges

2019

Mobility is the backbone of urban life and a vital economic factor in the development of the world. Rapid urbanization and the growth of mega-cities is bringing dramatic changes in the capabilities of vehicles. Innovative solutions like autonomy, electrification, and connectivity are on the horizon. How, then, we can provide ubiquitous connectivity to the legacy and autonomous vehicles? This paper seeks to answer this question by combining recent leaps of innovation in network virtualization with remarkable feats of wireless communications. To do so, this paper proposes a novel paradigm called the Internet of autonomous vehicles (IoAV). We begin painting the picture of IoAV by discussing th…

Networking and Internet Architecture (cs.NI)Signal Processing (eess.SP)FOS: Computer and information sciencesbusiness.industryComputer scienceMultitier architectureNetwork virtualization020206 networking & telecommunications02 engineering and technologyEnergy consumptionData scienceComputer Science ApplicationsComputer Science - Networking and Internet ArchitectureComputer Science - Computers and SocietySalientComputers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringKey (cryptography)FOS: Electrical engineering electronic engineering information engineeringThe InternetElectrical and Electronic EngineeringArchitectureElectrical Engineering and Systems Science - Signal ProcessingbusinessLEAPS
researchProduct

A Spatial-Temporal Correlation Approach for Data Reduction in Cluster-Based Sensor Networks

2019

International audience; In a resource-constrained Wireless Sensor Networks (WSNs), the optimization of the sampling and the transmission rates of each individual node is a crucial issue. A high volume of redundant data transmitted through the network will result in collisions, data loss, and energy dissipation. This paper proposes a novel data reduction scheme, that exploits the spatial-temporal correlation among sensor data in order to determine the optimal sampling strategy for the deployed sensor nodes. This strategy reduces the overall sampling/transmission rates while preserving the quality of the data. Moreover, a back-end reconstruction algorithm is deployed on the workstation (Sink)…

Signal Processing (eess.SP)FOS: Computer and information sciencesAdaptive samplingGeneral Computer ScienceComputer sciencespatial-temporal correlationReal-time computing02 engineering and technologyData loss[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]data reconstructionQA76Computer Science - Networking and Internet Architecture[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]FOS: Electrical engineering electronic engineering information engineering0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceElectrical Engineering and Systems Science - Signal ProcessingNetworking and Internet Architecture (cs.NI)General EngineeringSampling (statistics)020206 networking & telecommunicationsReconstruction algorithmDissipation[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationWireless sensor networks[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]data reduction020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]lcsh:Electrical engineering. Electronics. Nuclear engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]lcsh:TK1-9971Wireless sensor networkData reduction
researchProduct

Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems

2019

Non-orthogonal multiple access (NOMA) is considered to be one of the best candidates for future networks due to its ability to serve multiple users using the same resource block. Although early studies have focused on transmission reliability and energy efficiency, recent works are considering cooperation among the nodes. The cooperative NOMA techniques allow the user with a better channel (near user) to act as a relay between the source and the user experiencing poor channel (far user). This paper considers the link security aspect of energy harvesting cooperative NOMA users. In particular, the near user applies the decode-and-forward (DF) protocol for relaying the message of the source no…

Signal Processing (eess.SP)FOS: Computer and information sciencesComputer scienceDecode-and-forward (DF)050801 communication & media studies5G-tekniikkalaw.inventionNonorthogonal multiple access (NOMA)NomaComputer Science - Networking and Internet Architecturelangaton tiedonsiirto0508 media and communicationsoptimointiRelaylawRobustness (computer science)0502 economics and businessSecrecymedicineFOS: Electrical engineering electronic engineering information engineeringElectrical Engineering and Systems Science - Signal ProcessingtietoturvaNetworking and Internet Architecture (cs.NI)business.industryDeep learningPower-splitting05 social sciencesDeep learningmedicine.diseasekoneoppiminen050211 marketingArtificial intelligencebusinessDecoding methodsEfficient energy useComputer networkCommunication channel
researchProduct

Performance Analysis of Cooperative V2V and V2I Communications Under Correlated Fading

2019

Cooperative vehicular networks will play a vital role in the coming years to implement various intelligent transportation-related applications. Both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications will be needed to reliably disseminate information in a vehicular network. In this regard, a roadside unit (RSU) equipped with multiple antennas can improve the network capacity. While the traditional approaches assume antennas to experience independent fading, we consider a more practical uplink scenario where antennas at the RSU experience correlated fading. In particular, we evaluate the packet error probability for two renowned antenna correlation models, i.e., cons…

Signal Processing (eess.SP)FOS: Computer and information sciencesvehicle-to-infrastructure (V2I)Computer scienceComputer Science - Information TheoryReliability (computer networking)Real-time computingStackelberg gameComputer Science - Networking and Internet Architecturelangaton tiedonsiirto0502 economics and businessTelecommunications linkFOS: Electrical engineering electronic engineering information engineeringStackelberg competitionpeliteoriaFadingfading channelsElectrical Engineering and Systems Science - Signal ProcessingIntelligent transportation systemerror probabilitygamesNetworking and Internet Architecture (cs.NI)liikennetekniikka050210 logistics & transportationVehicular ad hoc networkreliabilityNetwork packetsignal to noise ratioInformation Theory (cs.IT)Mechanical Engineering05 social sciencesvehicle-to-vehicle (V2V)rakenteettomat verkotTransmitter power outputComputer Science Applicationsantenna correlationAutomotive Engineeringälytekniikkavehicular ad hoc networksantennas
researchProduct