Search results for "Computer network"

showing 10 items of 1634 documents

Development of a big data bank for PV monitoring data, analysis and simulation in COST Action 'PEARL PV'

2019

COST Action entitled PEARL PV aims at analyzing data of monitored PV systems installed all over Europe to quantitatively evaluate the long-term performance and reliability of these PV systems. For this purpose, a data bank is being implemented that can contain vast amounts of data, which will enable systematic performance analyses in combination with simulations. This paper presents the development process of this data bank.

Computer scienceProcess (engineering)business.industryReliability (computer networking)Performance05 social sciencesPhotovoltaic systemBig dataData analysis050301 educationReliability7. Clean energyReliability engineeringPV systemsPEARL (programming language)Monitoring data0502 economics and businessData bankCost actionbusiness0503 educationcomputer050203 business & managementData monitoringcomputer.programming_language
researchProduct

Power allocation for two-cell two-user joint transmission

2012

In this paper, we develop a power allocation scheme for the downlink of a two-cell two-user joint transmission system. The objective is to maximize the sum rate under per-cell power constraints. We study a worst case scenario where the carrier phases between the two base stations are un-synchronized, so that joint transmission must be performed without precoding. The derived power allocation scheme is remarkably simple, i.e., each cell transmits with full power to only one user. Note that joint transmission is still possible, when two cells select the same user for data transmission. Moreover, we prove that, in this scenario, the joint transmission case happens with higher probability when …

Computer scienceReal-time computingPower allocation02 engineering and technologyData_CODINGANDINFORMATIONTHEORYPrecodingPower budgetTelecomunicacióBase station0203 mechanical engineeringTelecommunications link0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringComunicació i tecnologiabusiness.industryCommunication Systems020302 automobile design & engineering020206 networking & telecommunicationsTransmission systemTransmitter power outputComputer Science Applicationscoordinated multi-point (CoMP)Transmission (telecommunications)Modeling and SimulationSignal Processingimperfect synchronizationbusinessjoint transmissionComputer networkData transmission
researchProduct

Joint Usage of Dynamic Sensitivity Control and Time Division Multiple Access in Dense 802.11ax Networks

2016

It is well known that in case of high density deployments, Wi-Fi networks suffer from serious performance impairments due to hid- den and exposed nodes. The problem is explicitly considered by the IEEE 802.11ax developers in order to improve spectrum efficiency. In this pa- per, we propose and evaluate the joint usage of dynamic sensitivity con- trol (DSC) and time division multiple access (TDMA) for improving the spectrum allocation among overlapping 802.11ax BSSs. To validate the solution, apart from simulation, we used a testbed based on the Wireless MAC Processor (WMP), a prototype of a programmable wireless card.

Computer scienceReal-time computingTime division multiple access050801 communication & media studies02 engineering and technologyFrequency allocation0508 media and communications0202 electrical engineering electronic engineering information engineeringWirelessDense deploymentIEEE 802.11axHidden node problembusiness.industryExposed node problemSettore ING-INF/03 - TelecomunicazioniDynamic sensitivity control05 social sciencesTestbedSpectral efficiencyExposed node problemIEEE 802.11axTDMA020201 artificial intelligence & image processingHidden node problembusinessComputer network
researchProduct

Reducing Power Consumption of Wireless Networks Through Collaborative DMC Mobile Clusters

2017

Reducing the energy consumption of the wireless network is significantly important to the economic and ecological sustainability of the ICT industry, as high energy consumption may limit the performance of wireless networks and is one of the main network costs. To solve energy consumption problem, especially on the terminal side, a scheme known as distributed mobile cloud (DMC) is considered to be a potential solution. Multiple mobile terminals (MTs) can cooperative to take advantage of good quality links among the MTs to save energy when receiving from the Base Station (BS). In this paper, we aim to find the optimal transmit power to further reduce the energy consumption of DMC. From simul…

Computer scienceReal-time computingkulutusmatkaviestinverkot02 engineering and technologyteho (fysiikka)energiansäästöklusteritBase station0203 mechanical engineeringDMCLimit (music)0202 electrical engineering electronic engineering information engineeringtransmit powerElectrical and Electronic EngineeringConsumption (economics)business.industryWireless networkpower consumption020206 networking & telecommunications020302 automobile design & engineeringEnergy consumptionTransmitter power outputComputer Science ApplicationsTerminal (electronics)green communicationsbusinessEnergy (signal processing)Computer networkWireless Personal Communications
researchProduct

Outage Analysis of Relay-Aided Non-Orthogonal Multiple Access with Partial Relay Selection

2018

Non-Orthogonal multiple access (NOMA) holds promise as a spectrally efficient multiple access scheme for 5G communication networks. This work investigates the performance of NOMA in a dual-hop amplify-and-forward (AF) relaying network, which is subject to Nakagami-$m$ fading. Specifically, we obtain a novel closed-form expression of the outage probability for the near and far users when the partial relay selection (PRS) scheme is used for selecting the best among $N$ intermediate relays. The users are considered to employ selection combining technique in order to combine the relayed and the direct transmission signals for an increased reliability of detection. Then, we evaluate the impact o…

Computer scienceReliability (computer networking)5G-tekniikkaData_CODINGANDINFORMATIONTHEORY02 engineering and technologylaw.inventionlangaton tiedonsiirto0203 mechanical engineeringRelaylawComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringElectronic engineeringFadingComputer Science::Information Theoryta213partial relay selectionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringselection combiningnon-orthogonal multiple access (NOMA)Telecommunications networkTransmission (telecommunications)Nakagami-fading5G
researchProduct

Dynamic Spectrum Reservation for CR Networks in the Presence of Channel Failures: Channel Allocation and Reliability Analysis

2018

[EN] Providing channel access opportunities for new service requests and guaranteeing continuous connections for ongoing flows until service completion are two challenges for service provisioning in wireless networks. Channel failures, which are typically caused by hardware and software failures or/and by intrinsic instability in radio transmissions, can easily result in network performance degradation. In cognitive radio networks (CRNs), secondary transmissions are inherently vulnerable to connection breaks due to licensed users' arrivals as well as channel failures. To explore the advantages of channel reservation on performance improvement in error-prone channels, we propose and analyze …

Computer scienceReliability (computer networking)Real-time computingCognitive radio networks02 engineering and technology0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringDynamic channel reservationElectrical and Electronic EngineeringLicensed shared accessCTMCChannel allocation schemesbusiness.industryWireless networkApplied MathematicsQuality of serviceReservation020206 networking & telecommunications020302 automobile design & engineeringINGENIERIA TELEMATICAComputer Science ApplicationsCognitive radioRetainabilitybusinessComputer networkCommunication channel
researchProduct

Constraint Hubs Deployment for efficient Machine-Type-Communications

2018

Massive Internet of Things (mIoT) is an important use case of 5G. The main challenge for mIoT is the huge amount of uplink traffic as it dramatically overloads the radio access network (RAN). To mitigate this shortcoming, a new RAN technology has been suggested, where small cells are used for interconnecting different devices to the network. The use of small cells will alleviate congestion at the RAN, reduce the end-to-end (E2E) delay, and increase the link capacity for communications. In this paper, we devise three solutions for deploying and interconnecting small cells that would handle mIoT traffic. A realistic physical model is considered in these solutions. The physical model is based …

Computer scienceReliability (computer networking)Wireless communication050801 communication & media studies02 engineering and technology0508 media and communicationsSINR modelTelecommunications link5G mobile communication0202 electrical engineering electronic engineering information engineeringWirelessPath lossFadingElectrical and Electronic EngineeringDelaysRadio access networkConnectivityta213business.industryApplied Mathematics05 social sciences020206 networking & telecommunicationsRelay Node PlacementReliabilityWireless sensor networksComputer Science ApplicationsBackhaul (telecommunications)businessInterferenceWireless sensor network5GWireless Sensor NetworkComputer networkIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
researchProduct

An asynchronous covert channel using spam

2012

AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…

Computer scienceRetransmissionCovert channelAsynchronous covert channelData lossComputer securitycomputer.software_genreSecure communicationModelling and SimulationCommunication sourceRaptor codeStegosystemSpam steganographybusiness.industryE-mail steganographyComputational MathematicsComputational Theory and MathematicsAsynchronous communicationRaptor codesSecure communicationModeling and SimulationKey (cryptography)businessAsynchronous covert channel; E-mail steganography; Raptor codes; Secure communication; Spam steganography; Stegosystem; Modeling and Simulation; Computational Theory and Mathematics; Computational MathematicscomputerComputer networkComputers & Mathematics with Applications
researchProduct

Energy-Efficient Context-Aware Resource Allocation for Edge-Computing-Empowered Industrial IoT

2020

Edge computing provides a promising paradigm to support the implementation of industrial Internet of Things (IIoT) by offloading computational-intensive tasks from resource-limited machine-type devices (MTDs) to powerful edge servers. However, the performance gain of edge computing may be severely compromised due to limited spectrum resources, capacity-constrained batteries, and context unawareness. In this chapter, we consider the optimization of channel selection which is critical for efficient and reliable task delivery. We aim at maximizing the long-term throughput subject to long-term constraints of energy budget and service reliability. We propose a learning-based channel selection fr…

Computer scienceServerReliability (computer networking)Distributed computingResource allocationContext (language use)Lyapunov optimizationEnhanced Data Rates for GSM EvolutionEdge computingEfficient energy use
researchProduct

The role of the Access Point in Wi-Fi networks with selfish nodes

2009

In Wi-Fi networks, mobile nodes compete for accessing the shared channel by means of a random access protocol called Distributed Coordination Function (DCF), which is long term fair. But recent drivers allow users to configure protocol parameters differently from their standard values in order to break the protocol fairness and obtain a larger share of the available bandwidth at the expense of other users. This motivates a game theoretical analysis of DCF. Previous studies have already modeled access to a shared wireless channel in terms of non-cooperative games among the nodes, but they have mainly considered ad hoc mode operation. In this paper we consider the role of the Access Point (AP…

Computer scienceWireless ad hoc networkBidirectional trafficDistributed computingmedia_common.quotation_subjectMechanism designThroughputDistributed coordination functionNash equilibriumWi-fi networks[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEE 802.11Settore ING-INF/04 - Automaticaselfish nodesSelfishnessmedia_commonIEEE 802.11business.industrySettore ING-INF/03 - TelecomunicazioniNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWLAN; selfish nodesWLANbusinessRandom accessComputer network
researchProduct