Search results for "Computer network"
showing 10 items of 1634 documents
Development of a big data bank for PV monitoring data, analysis and simulation in COST Action 'PEARL PV'
2019
COST Action entitled PEARL PV aims at analyzing data of monitored PV systems installed all over Europe to quantitatively evaluate the long-term performance and reliability of these PV systems. For this purpose, a data bank is being implemented that can contain vast amounts of data, which will enable systematic performance analyses in combination with simulations. This paper presents the development process of this data bank.
Power allocation for two-cell two-user joint transmission
2012
In this paper, we develop a power allocation scheme for the downlink of a two-cell two-user joint transmission system. The objective is to maximize the sum rate under per-cell power constraints. We study a worst case scenario where the carrier phases between the two base stations are un-synchronized, so that joint transmission must be performed without precoding. The derived power allocation scheme is remarkably simple, i.e., each cell transmits with full power to only one user. Note that joint transmission is still possible, when two cells select the same user for data transmission. Moreover, we prove that, in this scenario, the joint transmission case happens with higher probability when …
Joint Usage of Dynamic Sensitivity Control and Time Division Multiple Access in Dense 802.11ax Networks
2016
It is well known that in case of high density deployments, Wi-Fi networks suffer from serious performance impairments due to hid- den and exposed nodes. The problem is explicitly considered by the IEEE 802.11ax developers in order to improve spectrum efficiency. In this pa- per, we propose and evaluate the joint usage of dynamic sensitivity con- trol (DSC) and time division multiple access (TDMA) for improving the spectrum allocation among overlapping 802.11ax BSSs. To validate the solution, apart from simulation, we used a testbed based on the Wireless MAC Processor (WMP), a prototype of a programmable wireless card.
Reducing Power Consumption of Wireless Networks Through Collaborative DMC Mobile Clusters
2017
Reducing the energy consumption of the wireless network is significantly important to the economic and ecological sustainability of the ICT industry, as high energy consumption may limit the performance of wireless networks and is one of the main network costs. To solve energy consumption problem, especially on the terminal side, a scheme known as distributed mobile cloud (DMC) is considered to be a potential solution. Multiple mobile terminals (MTs) can cooperative to take advantage of good quality links among the MTs to save energy when receiving from the Base Station (BS). In this paper, we aim to find the optimal transmit power to further reduce the energy consumption of DMC. From simul…
Outage Analysis of Relay-Aided Non-Orthogonal Multiple Access with Partial Relay Selection
2018
Non-Orthogonal multiple access (NOMA) holds promise as a spectrally efficient multiple access scheme for 5G communication networks. This work investigates the performance of NOMA in a dual-hop amplify-and-forward (AF) relaying network, which is subject to Nakagami-$m$ fading. Specifically, we obtain a novel closed-form expression of the outage probability for the near and far users when the partial relay selection (PRS) scheme is used for selecting the best among $N$ intermediate relays. The users are considered to employ selection combining technique in order to combine the relayed and the direct transmission signals for an increased reliability of detection. Then, we evaluate the impact o…
Dynamic Spectrum Reservation for CR Networks in the Presence of Channel Failures: Channel Allocation and Reliability Analysis
2018
[EN] Providing channel access opportunities for new service requests and guaranteeing continuous connections for ongoing flows until service completion are two challenges for service provisioning in wireless networks. Channel failures, which are typically caused by hardware and software failures or/and by intrinsic instability in radio transmissions, can easily result in network performance degradation. In cognitive radio networks (CRNs), secondary transmissions are inherently vulnerable to connection breaks due to licensed users' arrivals as well as channel failures. To explore the advantages of channel reservation on performance improvement in error-prone channels, we propose and analyze …
Constraint Hubs Deployment for efficient Machine-Type-Communications
2018
Massive Internet of Things (mIoT) is an important use case of 5G. The main challenge for mIoT is the huge amount of uplink traffic as it dramatically overloads the radio access network (RAN). To mitigate this shortcoming, a new RAN technology has been suggested, where small cells are used for interconnecting different devices to the network. The use of small cells will alleviate congestion at the RAN, reduce the end-to-end (E2E) delay, and increase the link capacity for communications. In this paper, we devise three solutions for deploying and interconnecting small cells that would handle mIoT traffic. A realistic physical model is considered in these solutions. The physical model is based …
An asynchronous covert channel using spam
2012
AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…
Energy-Efficient Context-Aware Resource Allocation for Edge-Computing-Empowered Industrial IoT
2020
Edge computing provides a promising paradigm to support the implementation of industrial Internet of Things (IIoT) by offloading computational-intensive tasks from resource-limited machine-type devices (MTDs) to powerful edge servers. However, the performance gain of edge computing may be severely compromised due to limited spectrum resources, capacity-constrained batteries, and context unawareness. In this chapter, we consider the optimization of channel selection which is critical for efficient and reliable task delivery. We aim at maximizing the long-term throughput subject to long-term constraints of energy budget and service reliability. We propose a learning-based channel selection fr…
The role of the Access Point in Wi-Fi networks with selfish nodes
2009
In Wi-Fi networks, mobile nodes compete for accessing the shared channel by means of a random access protocol called Distributed Coordination Function (DCF), which is long term fair. But recent drivers allow users to configure protocol parameters differently from their standard values in order to break the protocol fairness and obtain a larger share of the available bandwidth at the expense of other users. This motivates a game theoretical analysis of DCF. Previous studies have already modeled access to a shared wireless channel in terms of non-cooperative games among the nodes, but they have mainly considered ad hoc mode operation. In this paper we consider the role of the Access Point (AP…