Search results for "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"

showing 9 items of 449 documents

Analysis of MAC-level throughput in LTE systems with link rate adaptation and HARQ protocols

2015

LTE is rapidly gaining momentum for building future 4G cellular systems, and real operational networks are under deployment worldwide. To achieve high throughput performance, in addition to an advanced physical layer design LTE exploits a combination of sophisticated mechanisms at the radio resource management layer. Clearly, this makes difficult to develop analytical tools to accurately assess and optimise the user perceived throughput under realistic channel assumptions. Thus, most existing studies focus only on link-layer throughput or consider individual mechanisms in isolation. The main contribution of this paper is a unified modelling framework of the MAC-level downlink throughput of …

radio linksaccess protocolscellular radioSettore ING-INF/03 - Telecomunicazionibusiness.industryOrthogonal frequency-division multiplexingComputer science4G mobile communicationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerHybrid automatic repeat requestComputer architectureTelecommunications linkLong Term EvolutionLTE MAC CQI AMC HARQ throughput analysis.Isolation (database systems)Radio resource managementbusinessThroughput (business)Computer networkCommunication channel2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
researchProduct

Optimal Resource Allocation in Multi-Hop Networks: Contention vs. Scheduling

2014

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is actually the most used method in ad-hoc networks for transmitting on a contending medium, even if it shows poor performance in presence of hidden nodes. To increase performance, we propose an algorithm that combines CSMA and TDMA (Time Division Multiple Access) approaches. The adopted solution consists of grouping contending nodes in non-interfering subsets and granting a different numbers of time slots to different groups, while using the CSMA to manage medium access among nodes belonging to the same subset. An optimization procedure to assign the time slots to each subset of nodes and to find an equilibrium between contention …

resource allocation; multi hop neworksSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryDistributed computingMulti-frequency time division multiple accessComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessresource allocationComputer Science Applications1707 Computer Vision and Pattern Recognitionmulti hop neworksHop (networking)Carrier-sense multiple accessScheduling (computing)resource allocation multi hop neworksComputer Networks and CommunicationSettore ING-INF/04 - AutomaticaControl and Systems EngineeringChannel access methodbusinessInformation SystemsComputer network
researchProduct

A Statecharts-Based Approach for WSN Application Development

2020

Wireless Sensor Network (WSN) software development challenges developers in two main ways: through system programming, which requires expertise in hardware and network management

statechartsprogramming frameworklcsh:Twireless sensorComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSsensoriverkotWSN applicationohjelmointiohjelmistokehityslcsh:TechnologyWSNJournal of Sensor and Actuator Networks
researchProduct

How to Improve the Reliability of Chord?

2008

In this paper we focus on Chord P2P protocol and we study the process of unexpected departures of nodes from this system. Each of such departures may effect in losing any information and in classical versions of this protocol the probability of losing some information is proportional to the quantity of information put into this system. This effect can be partially solved by gathering in the protocol multiple copies (replicas) of information. The replication mechanism was proposed by many authors. We present a detailed analysis of one variant of blind replication and show that this solution only partially solves the problem. Next we propose two less obvious modifications of the Chord protoco…

symbols.namesakeTheoretical computer scienceSource codemedia_common.quotation_subjectComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSHash functionsymbolsPareto distributionChord (peer-to-peer)Algorithmmedia_commonMathematics
researchProduct

Two-phase routing in three-dimensional blocked optical tori

2014

The contribution of this paper is an all-optical 3D network architecture. We describe scheduled, two-phase routing for it. The three-dimensional blocked optical torus BOT of block size b consists of b2 × b2 × b2 nodes for the first phase routing. Processors are evenly deployed at the underlying torus so that every bth node consists of a processor. Additionally, a BOT consists of b3 blocks of b × b × b subnetworks for the second phase routing. Routing of each packet is done in two phases. Firstly, packets are routed from source processor to an intermediate target node at the target block. Secondly, packets are routed from the intermediate targets at the target block to the target processor (…

ta113Dynamic Source Routingta213Computer sciencebusiness.industryNetwork packetNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLink-state routing protocolDestination-Sequenced Distance Vector routingRouting (electronic design automation)businessBlock sizeComputer networkBlock (data storage)Proceedings of the 15th International Conference on Computer Systems and Technologies
researchProduct

Performance of an asymmetric and asynchronous decode-and-forward FBMC relay system

2014

End-to-end link performance of an asymmetric and asynchronous dual-hop decode-and-forward (DF) relay system built up using a causal multirate filter bank multicarrier (FBMC) technique operated under Rayleigh fading is presented. Three main performance measures namely bit error rate (BER), outage probability and channel capacity are used for this evaluation and approximate closed-form expressions for them are also made available. FBMC setup is modeled in exact form without any approximations while customizing to one of the most efficient subcarrier filter. Simulations are carried out in quasi-static multipath fading channels under symmetric, asymmetric, synchronous and asynchronous condition…

ta213Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYSubcarrierlaw.inventionChannel capacityAsynchronous communicationRelaylawComputer Science::Networking and Internet ArchitectureElectronic engineeringBit error ratebusinessRelay channelMultipath propagationComputer Science::Information TheoryCommunication channelRayleigh fadingComputer network
researchProduct

IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security

2018

Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…

wireless networksGeneral Computer ScienceComputer sciencenoise (radio technology)ComputerApplications_COMPUTERSINOTHERSYSTEMShäiriötInterference (communication)General Materials Sciencekohinakyberturvallisuusta213Wireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral EngineeringEavesdroppingTransmission (telecommunications)interferenceslcsh:Electrical engineering. Electronics. Nuclear engineeringTransceiverbusinessenergiantuotantolcsh:TK1-9971Energy harvestinglangattomat verkotComputer networkIEEE Access
researchProduct

Sparsity-aware multiple relay selection in large multi-hop decode-and-forward relay networks

2016

In this paper, we propose and investigate two novel techniques to perform multiple relay selection in large multi-hop decode-and-forward relay networks. The two proposed techniques exploit sparse signal recovery theory to select multiple relays using the orthogonal matching pursuit algorithm and outperform state-of-the-art techniques in terms of outage probability and computation complexity. To reduce the amount of collected channel state information (CSI), we propose a limited-feedback scheme where only a limited number of relays feedback their CSI. Furthermore, a detailed performance-complexity tradeoff investigation is conducted for the different studied techniques and verified by Monte …

wireless networksTheoretical computer scienceComputer scienceMultiple relay selectionsComplex networks050801 communication & media studiesfeedback02 engineering and technologyData_CODINGANDINFORMATIONTHEORYchannelslaw.inventionHop (networking)diversityCommunication channels (information theory)[SPI]Engineering Sciences [physics]0508 media and communicationsMSERelaylaw0202 electrical engineering electronic engineering information engineeringComputer Science::Networking and Internet Architecture[ SPI ] Engineering Sciences [physics]Computer Science::Information TheoryLarge DF relay networksLink Access Procedure for Frame Relaycooperative networks05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSRelay control systems020206 networking & telecommunicationsChannel state informationChannel state informationRelay selectionOutage probabilityAlgorithmRelay channel
researchProduct

Underwater Multirobot Cooperative Intervention MAC Protocol

2020

This work introduces a Medium Access Control (MAC) protocol designed to allow a group of underwater robots that share a wireless communication channel to effectively communicate with each other. The goal of the Underwater Multirobot Cooperative Intervention MAC (UMCI-MAC) protocol presented in this work is to minimize the end to end delay and the jitter. The access to the medium in UMCI-MAC follows a Time Division Multiple Access (TDMA) strategy which is arbitrated by a master, which also has the capability to prioritize the transmission of some nodes over the rest of the network. Two experiments have been carried out with a team of four Autonomous Underwater Vehicles (AUV) in order to comp…

wireless networksaccess protocolsGeneral Computer ScienceComputer scienceUnderwater communicationsEnd-to-end delayTime division multiple accessThroughput02 engineering and technologyteleroboticsTelecomunicació0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessGeneral Materials ScienceJitterbusiness.industryNetwork packetWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral Engineering020302 automobile design & engineering020206 networking & telecommunicationsApplication layerunderwater communicationslcsh:Electrical engineering. Electronics. Nuclear engineeringremotely operated vehiclesbusinessCommunications protocolRobotsProtocols de xarxes d'ordinadorslcsh:TK1-9971Underwater acoustic communicationComputer networkCommunication channelIEEE Access
researchProduct