Search results for "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"
showing 9 items of 449 documents
Analysis of MAC-level throughput in LTE systems with link rate adaptation and HARQ protocols
2015
LTE is rapidly gaining momentum for building future 4G cellular systems, and real operational networks are under deployment worldwide. To achieve high throughput performance, in addition to an advanced physical layer design LTE exploits a combination of sophisticated mechanisms at the radio resource management layer. Clearly, this makes difficult to develop analytical tools to accurately assess and optimise the user perceived throughput under realistic channel assumptions. Thus, most existing studies focus only on link-layer throughput or consider individual mechanisms in isolation. The main contribution of this paper is a unified modelling framework of the MAC-level downlink throughput of …
Optimal Resource Allocation in Multi-Hop Networks: Contention vs. Scheduling
2014
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is actually the most used method in ad-hoc networks for transmitting on a contending medium, even if it shows poor performance in presence of hidden nodes. To increase performance, we propose an algorithm that combines CSMA and TDMA (Time Division Multiple Access) approaches. The adopted solution consists of grouping contending nodes in non-interfering subsets and granting a different numbers of time slots to different groups, while using the CSMA to manage medium access among nodes belonging to the same subset. An optimization procedure to assign the time slots to each subset of nodes and to find an equilibrium between contention …
A Statecharts-Based Approach for WSN Application Development
2020
Wireless Sensor Network (WSN) software development challenges developers in two main ways: through system programming, which requires expertise in hardware and network management
How to Improve the Reliability of Chord?
2008
In this paper we focus on Chord P2P protocol and we study the process of unexpected departures of nodes from this system. Each of such departures may effect in losing any information and in classical versions of this protocol the probability of losing some information is proportional to the quantity of information put into this system. This effect can be partially solved by gathering in the protocol multiple copies (replicas) of information. The replication mechanism was proposed by many authors. We present a detailed analysis of one variant of blind replication and show that this solution only partially solves the problem. Next we propose two less obvious modifications of the Chord protoco…
Two-phase routing in three-dimensional blocked optical tori
2014
The contribution of this paper is an all-optical 3D network architecture. We describe scheduled, two-phase routing for it. The three-dimensional blocked optical torus BOT of block size b consists of b2 × b2 × b2 nodes for the first phase routing. Processors are evenly deployed at the underlying torus so that every bth node consists of a processor. Additionally, a BOT consists of b3 blocks of b × b × b subnetworks for the second phase routing. Routing of each packet is done in two phases. Firstly, packets are routed from source processor to an intermediate target node at the target block. Secondly, packets are routed from the intermediate targets at the target block to the target processor (…
Performance of an asymmetric and asynchronous decode-and-forward FBMC relay system
2014
End-to-end link performance of an asymmetric and asynchronous dual-hop decode-and-forward (DF) relay system built up using a causal multirate filter bank multicarrier (FBMC) technique operated under Rayleigh fading is presented. Three main performance measures namely bit error rate (BER), outage probability and channel capacity are used for this evaluation and approximate closed-form expressions for them are also made available. FBMC setup is modeled in exact form without any approximations while customizing to one of the most efficient subcarrier filter. Simulations are carried out in quasi-static multipath fading channels under symmetric, asymmetric, synchronous and asynchronous condition…
IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security
2018
Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…
Sparsity-aware multiple relay selection in large multi-hop decode-and-forward relay networks
2016
In this paper, we propose and investigate two novel techniques to perform multiple relay selection in large multi-hop decode-and-forward relay networks. The two proposed techniques exploit sparse signal recovery theory to select multiple relays using the orthogonal matching pursuit algorithm and outperform state-of-the-art techniques in terms of outage probability and computation complexity. To reduce the amount of collected channel state information (CSI), we propose a limited-feedback scheme where only a limited number of relays feedback their CSI. Furthermore, a detailed performance-complexity tradeoff investigation is conducted for the different studied techniques and verified by Monte …
Underwater Multirobot Cooperative Intervention MAC Protocol
2020
This work introduces a Medium Access Control (MAC) protocol designed to allow a group of underwater robots that share a wireless communication channel to effectively communicate with each other. The goal of the Underwater Multirobot Cooperative Intervention MAC (UMCI-MAC) protocol presented in this work is to minimize the end to end delay and the jitter. The access to the medium in UMCI-MAC follows a Time Division Multiple Access (TDMA) strategy which is arbitrated by a master, which also has the capability to prioritize the transmission of some nodes over the rest of the network. Two experiments have been carried out with a team of four Autonomous Underwater Vehicles (AUV) in order to comp…