Search results for "Computer Science::Networking and Internet Architecture"

showing 10 items of 137 documents

A Kalman Filter Approach for Distinguishing Channel and Collision Errors in IEEE 802.11 Networks

2008

In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel waste due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the network congestion level. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feasibility…

Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingPhysical layerchannel estimationThroughputKalman filterNetwork allocation vectorNetwork congestionExtended Kalman filterWLANIEEE 802.11ModulationRobustness (computer science)PHYWireless lanComputer Science::Networking and Internet ArchitectureCommunication channel
researchProduct

A Restricted-Weakly Connected Dominating Set for Role Assignment in a Multichannel MAC for Wireless Mesh Network

2009

International audience; We propose an efficient way of constructing the wireless mesh structure associated with Molecular MAC, a multichannel access method designed for efficient packet forwarding. We base our role assignment on a restricted Weakly Connected Dominating Set structure. After presenting a formal definition of the role assignment problem, we prove its NP-completeness. Then, we propose a centralized 2-approximation algorithm that maximizes the sum of radio link capacities in the molecular structure. Finally, we extend this protocol so that it can operate in a distributed way still providing the same guarantee. This distributed protocol is self-stabilizing thus robust to topology…

Computer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Mesh networking0102 computer and information sciences02 engineering and technologyNetwork topology01 natural sciencesConnected dominating setlaw.invention[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]law0202 electrical engineering electronic engineering information engineeringComputer Science::Networking and Internet ArchitectureWireless mesh network[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryRadio Link ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwarding020206 networking & telecommunicationsOrder One Network Protocol010201 computation theory & mathematicsbusinessAssignment problemComputer network
researchProduct

Remarks on IEEE 802.11 DCF performance analysis

2005

This letter presents a new approach to evaluate the throughput/delay performance of the 802.11 distributed coordination function (DCF). Our approach relies on elementary conditional probability arguments rather than bidimensional Markov chains (as proposed in previous models) and can be easily extended to account for backoff operation more general than DCF's one.

Computer scienceMarkov processThroughputDistributed coordination functionCarrier-sense multiple accesssymbols.namesakeIEEE 802.11Wireless lanComputer Science::Networking and Internet ArchitectureElectrical and Electronic EngineeringThroughput (business)IEEE 802.11Markov chainSettore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science ApplicationsComputer Science::PerformanceModeling and SimulationMultiple access controlPerformance evaluationsymbolsIEEE 802.11; Multiple access control; Performance evaluationbusinessAlgorithmComputer networkIEEE Communications Letters
researchProduct

Outage Analysis of Relay-Aided Non-Orthogonal Multiple Access with Partial Relay Selection

2018

Non-Orthogonal multiple access (NOMA) holds promise as a spectrally efficient multiple access scheme for 5G communication networks. This work investigates the performance of NOMA in a dual-hop amplify-and-forward (AF) relaying network, which is subject to Nakagami-$m$ fading. Specifically, we obtain a novel closed-form expression of the outage probability for the near and far users when the partial relay selection (PRS) scheme is used for selecting the best among $N$ intermediate relays. The users are considered to employ selection combining technique in order to combine the relayed and the direct transmission signals for an increased reliability of detection. Then, we evaluate the impact o…

Computer scienceReliability (computer networking)5G-tekniikkaData_CODINGANDINFORMATIONTHEORY02 engineering and technologylaw.inventionlangaton tiedonsiirto0203 mechanical engineeringRelaylawComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringElectronic engineeringFadingComputer Science::Information Theoryta213partial relay selectionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringselection combiningnon-orthogonal multiple access (NOMA)Telecommunications networkTransmission (telecommunications)Nakagami-fading5G
researchProduct

Context-Aware RF-Energy Harvesting for IoT Networks

2021

Energy Harvesting plays a crucial role in improving the operational lifetime of IoT devices. The deployment of dedicated RF-transmitters helps in sufficient energy propagation to the sensor nodes of IoT networks. Also, energy harvesting using the deployment of such RF-transmitters is a challenging issue. In this work, two methods are proposed for the optimal placement of RF-transmitters for efficient energy harvesting in wireless sensor networks. The proposed context-aware RF-energy harvesting considers different network performance parameters such as energy-hole information, and data routing information. RF-transmitter deployment is achieved using network connectivity information in the fi…

Computer scienceSoftware deploymentDistributed computingNode (networking)Computer Science::Networking and Internet ArchitectureNetwork performanceContext (language use)Routing (electronic design automation)Energy harvestingWireless sensor networkComputer Science::Information TheoryEfficient energy use2021 IEEE 7th World Forum on Internet of Things (WF-IoT)
researchProduct

A Cluster based Sensor-Selection Scheme for Energy-Efficient Agriculture Sensor Networks

2021

Improving the energy-efficiency of remotely deployed sensor nodes in agriculture wireless networks is very challenging due to a lack of access to energy grid. Network clustering and limiting the amount of sensor data are among the various methods to improve the lifetime of these sensor nodes. In this work, an optimal sensor-selection scheme is proposed to improve the Quality of Service in clustered agriculture networks. the proposed method selects a limited number of sensor nodes to be active in each cluster. It considers the estimator performance while selecting limited sensor nodes for environmental monitoring. the optimal sensor-selection process considers the information of remaining en…

Computer scienceWireless networkQuality of serviceDistributed computing020208 electrical & electronic engineeringProcess (computing)Estimator020206 networking & telecommunications02 engineering and technologyComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringGrid energy storageWireless sensor networkEnergy (signal processing)Efficient energy use2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC)
researchProduct

An adaptive cooperative MAC mechanism in multi-hop wireless networks

2010

In this paper, we propose a novel adaptive cooperative MAC mechanism that is specifically designed for two-hop cooperative communications where source and destination cannot hear each other directly. The proposed scheme employs an efficient adaptive relay selection algorithm such that the number of relay nodes is optimized for each cooperative transmission to maximize cooperation benefits and effectively avoid potential collisions with other transmissions. In order to determine the optimal number of relays we apply a training sequence in Hello message exchange, which provides us with a channel status indicator combining both bit-level and flow-level information. Numerical results show that …

Computer scienceWireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputCooperative diversitylaw.inventionHop (networking)RelaylawComputer Science::Networking and Internet ArchitecturebusinessComputer Science::Information TheoryCommunication channelComputer networkThe IEEE symposium on Computers and Communications
researchProduct

A contention-based multiple access protocol in cooperative wireless networks

2010

Cooperative communication has emerged as a promising technique to enhance system performance in wireless networks. This paper proposes a contention-based cooperative multiple medium access control protocol by means of multiple retransmissions of the same packet from different relay nodes. The proposed scheme exploits cooperative communication capability not only from time diversity derived from multiple temporal transmissions but also spatial diversity derived from distributed multiple relays. A Markov chain is introduced to analyze the throughput performance of the proposed cooperative scheme. The performance evaluation of the protocol is validated and compared with non-cooperative ARQ pro…

Computer scienceWireless networkbusiness.industryNetwork packetDistributed computingAutomatic repeat requestComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputAntenna diversityTime diversitylaw.inventionCooperative diversityRelaylawComputer Science::Networking and Internet ArchitectureChannel access methodbusinessComputer Science::Information TheoryCommunication channelComputer networkProceedings of the 6th International Wireless Communications and Mobile Computing Conference
researchProduct

ACT-MAC: An asynchronous cooperative transmission MAC protocol for WSNs

2014

Duty cycling (DC) has been proven to be an efficient mechanism to reduce energy consumption in wireless sensor networks (WSNs). On the other hand, cooperative transmission (CT) enables longer range transmission to hop over an energy-hole node, resulting in more balanced energy consumption among nodes. In the literature, there exist few CT MAC protocols for DC operated WSNs and these protocols rely on fixed cycle length. In this paper, we propose a novel variable cycle length protocol, namely asynchronous cooperative transmission medium access control (ACT-MAC), which contains both features of reducing the unnecessary idle listening by DC and mitigating the energy-hole by making use of CT. T…

Computer sciencebusiness.industryAsynchronous communicationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science::Networking and Internet ArchitectureAccess controlEnergy consumptionbusinessWireless sensor networkEfficient energy useHop (networking)Computer network2014 IEEE International Conference on Communications Workshops (ICC)
researchProduct

Kalman filter estimation of the contention dynamics in error-prone IEEE 802.11 networks

2008

In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel wastes due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the number n of competing stations. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feas…

Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingPhysical layerEstimatorKalman filterNetwork allocation vectorExtended Kalman filterWLANIEEE 802.11Robustness (computer science)PHYComputer Science::Networking and Internet Architecturekalman filterbusinessComputer network
researchProduct