Search results for "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"

showing 10 items of 449 documents

Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation

2018

IP Flow Mobility (IFOM) enables a user equipment to offload data traffic at the IP flow level. Although the procedure of IFOM-based flow offloading has been specified by 3GPP, how many IP flows should be offloaded and when offloading should be performed are not defined. Consequently, IP flows may be routed to a target access network which has a strong signal strength but with backhaul congestion or insufficient access capability. In this paper, we propose two algorithms, referred to as proportional offloading (PO), and proportional and preemption-enabled offloading (PPO), respectively, for IP flow offloading in hybrid cellular and wireless local area networks. The PO algorithm decides an op…

Access networkComputer Networks and CommunicationsComputer sciencebusiness.industryIT service continuityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPreemptionLocal area networkAerospace Engineering020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyBackhaul (telecommunications)0203 mechanical engineeringUser equipmentAutomotive Engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringbusinessMobility managementAlgorithmIEEE Transactions on Vehicular Technology
researchProduct

A Metaheuristic Bandwidth Allocation Scheme for FiWi Networks Using Ant Colony Optimization

2015

Optical-wireless access networks constitute a quite attractive solution to meet the ever-increasing bandwidth requirements of end-users, offering significant benefits such as ubiquitous coverage in the wireless domain and huge bandwidth in the optical domain. However, converging optical and wireless networking technologies, with Passive Optical Networks (PONs) and 4G wireless standards, such as the Worldwide Interoperability for Microwave Access (WiMAX) and the Long Term Evolution (LTE), entails major challenges that need to be addressed. In this context, designing an efficient and fair bandwidth distribution with Quality of Service (QoS) support is a difficult task due to the interdependen…

Access networkDynamic bandwidth allocationWireless networkbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiMAXPassive optical networkBandwidth allocationComputer Networks and CommunicationAutomotive EngineeringBandwidth (computing)Radio resource managementbusinessComputer network
researchProduct

Proxy Mobile IPv6-Based Seamless Handover

2013

A prospective next generation wireless network is expected to integrate harmoniously into an IP-based core network. It is widely anticipated that IP-layer handover is a feasible solution to global mobility. However, the performance of IP-layer handover based on basic Mobile IP (MIP) cannot support real time services very well due to long handover delay. The Internet Engineering Task Force (IETF) Network-based Localized Mobility Management (NETLMM) working group developed a network-based localized mobility management protocol called Proxy Mobile IPv6 (PMIPv6) to reduce the handoff latency of MIPv6. Moreover, PMIPv6 provides the IP with the mobility to support User Equipments (UEs) without it…

Access networkHandoverWireless networkMobile IPbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCore networkbusinessProxy Mobile IPv6Mobility managementIPv6Computer network
researchProduct

Utility-based resource allocations in multi-hop wireless networks

2011

It is well known that CSMA (Carrier Sense Multiple Access) protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. Since ad-hoc networks based on multihop packet deliveries are becoming more and more common in different application and networking scenarios, different medium access control extensions are currently considered for improving the channel utilization efficiency. In this paper, we propose a simple approach based on preallocating temporal slots in which different sets of nodes are allowed to contend for the channel access, which can significantly improve CSMA performance with limited signaling …

Ad-hoc Networks; Distributed Resource Allocation; Game theory; Sensor NetworksSettore ING-INF/04 - Automatica[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Ad-hoc Networksad hoc wireless networks allocations networksSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYSensor NetworksDistributed Resource AllocationGame theory
researchProduct

Mitigating DDoS using weight‐based geographical clustering

2020

Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters …

Anomaly intrusion detectionsComputer Networks and CommunicationsComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDenial-of-service attackFault tolerancecomputer.software_genreClustering techniquesData segmentComputer Science ApplicationsTheoretical Computer ScienceComputational Theory and MathematicsMitigating DDoS attacksCloud burstingData miningCluster analysisWeight based dosingcomputerSoftwareAddress clusteringMitigation techniquesConcurrency and Computation: Practice and Experience
researchProduct

An Effective Wireless Sensor Network Routing Protocol Based on Particle Swarm Optimization Algorithm

2022

Improving wireless communication and artificial intelligence technologies by using Internet of Things (Itoh) paradigm has been contributed in developing a wide range of different applications. However, the exponential growth of smart phones and Internet of Things (IoT) devices in wireless sensor networks (WSNs) is becoming an emerging challenge that adds some limitations on Quality of Service (QoS) requirements. End-to-end latency, energy consumption, and packet loss during transmission are the main QoS requirements that could be affected by increasing the number of IoT applications connected through WSNs. To address these limitations, an effective routing protocol needs to be designed for …

Article SubjectComputer Networks and CommunicationsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Information Systems
researchProduct

A Machine Learning-Based Intelligence Approach for Multiple-Input/Multiple-Output Routing in Wireless Sensor Networks

2022

Computational intelligence methods play an important role for supporting smart networks operations, optimization, and management. In wireless sensor networks (WSNs), increasing the number of nodes has a need for transferring large volume of data to remote nodes without any loss. These large amounts of data transmission might lead to exceeding the capacity of WSNs, which results in congestion, latency, and packet loss. Congestion in WSNs not only results in information loss but also burns a significant amount of energy. To tackle this issue, a practical computational intelligence approach for optimizing data transmission while decreasing latency is necessary. In this article, a Softmax-Regre…

Article SubjectGeneral MathematicsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSQA1-939General EngineeringTA1-2040Engineering (General). Civil engineering (General)VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550MathematicsMathematical Problems in Engineering
researchProduct

Error-Based Interference Detection in WiFi Networks

2017

In this paper we show that inter-technology interference can be recognized by commodity WiFi devices by monitoring the statistics of receiver errors. Indeed, while for WiFi standard frames the error probability varies during the frame reception in different frame fields (PHY, MAC headers, payloads) protected with heterogeneous coding, errors may appear randomly at any point during the time the demodulator is trying to receive an exogenous interfering signal. We thus detect and identify cross-technology interference on off-the-shelf WiFi cards by monitoring the sequence of receiver errors (bad PLCP, bad PCS, invalid headers, etc.) and develop an Artificial Neural Network (ANN) to recognize t…

Artificial Neural NetworkNeuronsMonitoringComputer scienceSettore ING-INF/03 - Telecomunicazioni05 social sciencesReal-time computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS050801 communication & media studies020206 networking & telecommunicationsWireless LAN02 engineering and technologySpectrum managementReceiversZigBee0508 media and communicationsComputer Networks and CommunicationPHYHardware and Architecture0202 electrical engineering electronic engineering information engineeringLong Term EvolutionDemodulationWireless fidelitySafety Risk Reliability and QualityInterference
researchProduct

Preamble Transmission Prediction for mMTC Bursty Traffic : A Machine Learning based Approach

2020

The evolution of Internet of things (IoT) towards massive IoT in recent years has stimulated a surge of traffic volume among which a huge amount of traffic is generated in the form of massive machine type communications. Consequently, existing network infrastructure is facing challenges when handling rapidly growing traffic load, especially under bursty traffic conditions which may more often lead to congestion. By proactively predicting the occurrence of congestion, we can implement necessary means and conceivably avoid congestion. In this paper, we propose a machine learning (ML) based model for predicting successful preamble transmissions at a base station and subsequently forecasting th…

Artificial neural networkComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studies020206 networking & telecommunicationsComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyMachine learningcomputer.software_genrePreambleBase station0508 media and communicationsRecurrent neural networkTransmission (telecommunications)Traffic volume0202 electrical engineering electronic engineering information engineeringArtificial intelligencebusinesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Non-cooperative available bandwidth estimation towards ADSL links

2008

Existing tools for the estimation of the end- to-end available bandwidth require control of both end hosts of the path and this significantly limits their usability. In this paper we present ABwProbe, a single-ended tool for available bandwidth estimation against non-cooperative hosts. Although ABwProbe is general enough to be used on any Internet path, we focus our attention on ADSL links exploring the possibility of measuring the downlink available bandwidth of a non-cooperative ADSL host. We study the effect of cross-traffic on the uplink, finding that only large packets may deteriorate ABwProbe's measurements and we present two techniques to detect and filter the effect of uplink cross-…

Asymmetric digital subscriber lineDynamic bandwidth allocationbusiness.industryNetwork packetComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth throttlingBandwidth allocationDigital subscriber lineADSLTelecommunications linkSymmetric digital subscriber lineBandwidth (computing)businessComputer network
researchProduct