Search results for "Computer network"

showing 10 items of 1634 documents

An adaptive cooperative MAC mechanism in multi-hop wireless networks

2010

In this paper, we propose a novel adaptive cooperative MAC mechanism that is specifically designed for two-hop cooperative communications where source and destination cannot hear each other directly. The proposed scheme employs an efficient adaptive relay selection algorithm such that the number of relay nodes is optimized for each cooperative transmission to maximize cooperation benefits and effectively avoid potential collisions with other transmissions. In order to determine the optimal number of relays we apply a training sequence in Hello message exchange, which provides us with a channel status indicator combining both bit-level and flow-level information. Numerical results show that …

Computer scienceWireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputCooperative diversitylaw.inventionHop (networking)RelaylawComputer Science::Networking and Internet ArchitecturebusinessComputer Science::Information TheoryCommunication channelComputer networkThe IEEE symposium on Computers and Communications
researchProduct

A contention-based multiple access protocol in cooperative wireless networks

2010

Cooperative communication has emerged as a promising technique to enhance system performance in wireless networks. This paper proposes a contention-based cooperative multiple medium access control protocol by means of multiple retransmissions of the same packet from different relay nodes. The proposed scheme exploits cooperative communication capability not only from time diversity derived from multiple temporal transmissions but also spatial diversity derived from distributed multiple relays. A Markov chain is introduced to analyze the throughput performance of the proposed cooperative scheme. The performance evaluation of the protocol is validated and compared with non-cooperative ARQ pro…

Computer scienceWireless networkbusiness.industryNetwork packetDistributed computingAutomatic repeat requestComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputAntenna diversityTime diversitylaw.inventionCooperative diversityRelaylawComputer Science::Networking and Internet ArchitectureChannel access methodbusinessComputer Science::Information TheoryCommunication channelComputer networkProceedings of the 6th International Wireless Communications and Mobile Computing Conference
researchProduct

Testbed evaluation of optimized REACT over multi-hop paths

2018

REACT is a distributed resource allocation protocol that computes a max-min allocation of airtime for mesh networks. The allocation adapts automatically to changes in local traffic load and in local network views. SALT, a new contention window tuning algorithm, ensures that each node secures the airtime allocated to it by REACT. REACT and SALT are extended to the multi-hop flow scenario with the introduction of a new airtime reservation algorithm. With a reservation in place, multi-hop TCP flows show increased throughput when running over SALT and REACT compared to running over 802.11 DCF. All results are obtained from experimentation on the w-iLab.t wireless network testbed in Belgium.

Computer scienceWireless networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMesh networkingTestbedReservationLocal area network020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyHop (networking)Theoretical Computer Science0203 mechanical engineeringComputer Science0202 electrical engineering electronic engineering information engineeringTraffic loadbusinessComputer network
researchProduct

ErrorSense: Characterizing WiFi Error Patterns for Detecting ZigBee Interference

2014

Recent years have witnessed the increasing adoption of heterogeneous wireless networks working in unlicensed ISM bands, thus creating serious problems of spectrum overcrowding. Although ZigBee, Bluetooth and WiFi networks have been natively designed for working in presence of interference, it has been observed that several performance impairments may occur because of heterogeneous sensitivity to detect or react to the presence of other technologies. In this paper we focus on the WiFi capability to detect interfering ZigBee links. Despite of the narrowband transmissions performed by ZigBee, in emerging scenarios ZigBee interference can have a significant impact on WiFi performance. Therefore…

Computer scienceWireless networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSwlan 802.11 802.15.4 frame error detection wireless coexistenceInterference (wave propagation)law.inventionBluetoothNarrowbandlawSensitivity (control systems)businessHeterogeneous networkComputer networkNeuRFon
researchProduct

MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis

2018

[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …

Computer scienceWireless sensor networks (WSNs)02 engineering and technology01 natural sciencesWake-up radio (WuR)Medium access control (MAC) protocol0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringLatency (engineering)QueueEnergy-efficient communicationbusiness.industryNode (networking)010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumptionINGENIERIA TELEMATICA0104 chemical sciencesComputer Science ApplicationsInternet of Things (IoT)Variable (computer science)Modeling and performance evaluationControl and Systems EngineeringbusinessWireless sensor networkInformation SystemsComputer networkEfficient energy useData transmission
researchProduct

PV-Alert: A fog-based architecture for safeguarding vulnerable road users

2017

International audience; High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emer…

Computer science[SPI] Engineering Sciences [physics]Reliability (computer networking)mobile computingLatency (audio)traffic engineering computingCloud computing02 engineering and technologyFog ComputingComputer securitycomputer.software_genreroad vehicles[SPI]Engineering Sciences [physics]Low Latency0502 economics and businessPedestrian Safety0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureArchitecturewireless LANEdge computing050210 logistics & transportationbusiness.industry05 social sciencesLocation awarenessroad traffic020206 networking & telecommunicationsVehiclesEdge computingsmart phonesVulnerable Road UsersRoadsroad accidentsCrowd sensingAccidentsScalabilitymobile radioSafetybusinessroad safetycomputer
researchProduct

MDP-based Resource Allocation for Uplink Grant-free Transmissions in 5G New Radio

2020

The diversity of application scenarios in 5G mobile communication networks calls for innovative initial access schemes beyond traditional grant-based approaches. As a novel concept for facilitating small packet transmission and achieving ultra-low latency, grant-free communication is attracting lots of interests in the research community and standardization bodies. However, when a network consists of both grant based and grant-free based end devices, how to allocate slot resources properly between these two categories of devices remains as an unanswered question. In this paper, we propose a Markov decision process based scheme which dynamically allocates grant-free resources based on a spec…

Computer sciencebusiness.industry05 social sciences050801 communication & media studies0508 media and communications0502 economics and businessTelecommunications linkResource allocation050211 marketingMobile telephonyMarkov decision processbusiness5GComputer network2020 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Hidden Markov Model Based Machine Learning for mMTC Device Cell Association in 5G Networks

2019

Massive machine-type communication (mMTC) is expected to play a pivotal role in emerging 5G networks. Considering the dense deployment of small cells and the existence of heterogeneous cells, an MTC device can discover multiple cells for association. Under traditional cell association mechanisms, MTC devices are typically associated with an eNodeB with highest signal strength. However, the selected eNodeB may not be able to handle mMTC requests due to network congestion and overload. Therefore, reliable cell association would provide a smarter solution to facilitate mMTC connections. To enable such a solution, a hidden Markov model (HMM) based machine learning (ML) technique is proposed in …

Computer sciencebusiness.industryAssociation (object-oriented programming)Reliability (computer networking)05 social sciences050801 communication & media studiesMachine learningcomputer.software_genreNetwork congestion0508 media and communicationsEnodeB0502 economics and business050211 marketingArtificial intelligenceState (computer science)Hidden Markov modelbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550computer5GData transmissionICC 2019 - 2019 IEEE International Conference on Communications (ICC)
researchProduct

ACT-MAC: An asynchronous cooperative transmission MAC protocol for WSNs

2014

Duty cycling (DC) has been proven to be an efficient mechanism to reduce energy consumption in wireless sensor networks (WSNs). On the other hand, cooperative transmission (CT) enables longer range transmission to hop over an energy-hole node, resulting in more balanced energy consumption among nodes. In the literature, there exist few CT MAC protocols for DC operated WSNs and these protocols rely on fixed cycle length. In this paper, we propose a novel variable cycle length protocol, namely asynchronous cooperative transmission medium access control (ACT-MAC), which contains both features of reducing the unnecessary idle listening by DC and mitigating the energy-hole by making use of CT. T…

Computer sciencebusiness.industryAsynchronous communicationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science::Networking and Internet ArchitectureAccess controlEnergy consumptionbusinessWireless sensor networkEfficient energy useHop (networking)Computer network2014 IEEE International Conference on Communications Workshops (ICC)
researchProduct

Resource sharing optimality in WiFi infrastructure networks

2009

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios. Assuming that a contending node can dynamically change its strategy, by tuning its contention parameters to non-standard values on the basis of channel observations, we prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium condi…

Computer sciencebusiness.industryBidirectional trafficSettore ING-INF/03 - TelecomunicazioniDistributed computingNode (networking)ThroughputDistributed coordination functionShared resourceSettore ING-INF/04 - AutomaticaWireless lanTelecommunications linkMobile telephonybusinessGame theory Mechanism Design WiFi Infrastructure NetworksRandom accessCommunication channelComputer network
researchProduct