With the exponential growth in mobile data traffic taking place currently and projected into the future, mobile operators need cost effective ways to manage the load of their networks. Traditionally, this has been achieved by offloading mobile traffic onto Wi-Fi networks due to their low cost and increasingly ubiquitous deployment. Recently, LTE operating in the unlicensed spectrum has drawn s…
Abstract: Energy is a scarce and most vital resource in a wireless sensor network (WSN). Since space-time block coding requires less transmission energy than SISO technique for the same bit error rate (BER), therefore, it is one of the most practical diversity technique for WSN studies. In this work, we have investigated the energy utilization of a simple multiple-input single-output system usi…
Body area networks (BAN) are being developed to serve the mankind, for detection of diseases and tracking of patients. And ultra wideband (UWB) has become the most preferred candidate for the physical layer of BAN. However, UWB BAN will suffer from the interferences from existing wireless networks. Though a number of mitigation techniques have been developed for UWB they will not be feasible f…
The estimation of tag read and no-read zones is the most important preliminary planning step in radio-frequency identification (RFID) system installations. Today, in the ultra-high frequency band (UHF: 860–960 MHz), this estimation is based on either a free-space or a simplified multipath channel model for the signal propagation in the wireless link between the interrogator and the tag. Using…
In this paper, we present an efficient data channel assignment (DCA) scheme for a mixed cell (i.e., a 3G cell with embedded WLANs). Our effort is essential to increase the data request (i.e., a call) handling capacity in 3G systems, with a ‘low request dropping probability’. In UMTS-first DCA scheme prefers 3G channel in dual coverage and reduces vertical handoffs from 3G to WLAN. But it de…
Modeling and analysis of communication link duration in vehicular ad hoc networks (VANETs) is crucial as it directly affects many performance metrics such as packet delivery ratio, throughput and end-to-end delay. In this paper, we investigate the properties of communication link duration in one-dimensional VANETs for different fading channel conditions. We employ a stochastic microscopic mobil…
Abstract: This paper proposes a mobility management protocol for 6LoWPAN wireless sensor networks. In this protocol, the 6LoWPAN architecture is proposed, and both the hierarchical IPv6 address structure and the address configuration algorithm for 6LoWPAN WSN are presented. Based on the proposed architecture, the intra-network and inter-network mobility handover algorithms are proposed. In the…
We address the multicast problem in a wireless multihop network in the presence of errors. Finding the multicast schedule that minimizes the expected number of transmissions, while accounting for both the wireless broadcast advantage (WBA) and the wireless unreliable transmission (WUT) characteristics, has not been solved optimally before. We formally define the problem and propose an initial a…
Due to the growing importance of deploying femtocell technology in the current mobile network operators, data traffic processing and handover (HO) management in such networks are challenging issues. Consequently, due to the mobility of femto users between indoor and outdoor environments, the HO traffic interplay between macrocell and femtocells should be addressed, by determining accurate HO ra…
Abstract: In this paper, we put forward the methods of footprint shift and separation for the virtual topology model of LEO satellite networks, which can reduce the effects of the Polar Regions and cross-seam inter-satellite-links (ISLs) on the virtual topology and improve the utilization of ISLs. Furthermore, a low-load survivable routing protocol called Virtual Snapshot Routing Protocol is p…
In this paper the integration of an RFID system into a wireless sensor node based on an Arduino board is discussed. The main purpose of the proposed solution is to use the memory of a passive RFID transponder to store the data retrieved by the sensors composing the node. This solution can be employed for remote monitoring operations, when no connection is available and then no remote data colle…
The lifetime of wireless sensor network (WSN)is reduced due to the impact caused by channel fading, interference and unbalanced energy consumption. The node’s energy is wasted due to uneven energy consumption for various processes. Communicating the data from source to sink node will consume more power compared to data sensing and processing etc. The channel fading is mitigated through spatia…
In the recent years, the technological improvements on wireless sensor computational capability and versatility have caused a massive use of battery-supplied Wireless Sensor Network (WSN) in many different monitoring applications. The most relevant factors of reliability of such systems are related to the energetic autonomy and the accuracy of the sampled data delivered to the Fusion Center. T…
Gateway discovery is a fundamental process in interconnecting mobile ad hoc network with the Internet. Traditional gateway discovery algorithms adopt the method of periodically broadcast advertisements with a time interval. However, this method does not fulfill the actual requirements from the source nodes and produces some unnecessary overhead. To solve this problem, this paper adopts a novel …
In order to prolong the lifetime of wireless video sensor networks (WVSNs), many methods for visual target tracking are proposed to reduce the energy cost of batterypowered video sensor nodes. Focus on reducing the amounts of image data for computation and communication, this paper presents an energy-efficient method for distributed target tracking inWVSNs. The major Contributions of the propo…
Probability density function (pdf) of the received signal is necessary for the distributed detection fusion when the unreliable channels between the local sensors and the fusion center are considered. Hitherto study has never been made on the statistical distribution of the demodulated OFDM signal over multipath fading channel. Modeling the OFDM system over the multi-path channel, we derived th…
An important issue affecting cellular networks is to make services available to regions of bad or no reception. Femtocells are considered to be the solution to meet the future needs for better indoor coverage, high data rates and capacity in the cellular networks. Since femtocell access points (FAPs) are usually user deployed, thus blind placement of FAPs is inevitable leading to problems of po…
In this paper, we investigate the resource allocation issues in Orthogonal frequency division multiplexing access-based multicast systems that only allows average channel state information of users to be available at the resource manager. In this system, it is impossible to guarantee successful transmission of every data due to instant deep fading. Hence, in order to achieve efficient and reli…
Wireless sensor–actor networks (WSANs) are applicable in versatile domains ranging from very common to those which demand reliable actions in the event area. The unique characteristics of WSANs and the resourceconstrained nature of the constituent sensor nodes give rise to design energy and delay efficient routing protocols. Many researchers have made considerable efforts to meet these challe…
In the paper, a kind of channel noise produced by nodes accessing channel was considered, and this noise was compared with Middleton Class-A noise. It was assumed that the time, space, frequency of channel accessed by nodes were randomized, hence the channel selection can be described as a random matrix. And the random matrix were approximately calculated and analyzed by Krylov subspace method …
In this paper, we present an efficient resource allocation with user discrimination framework for 5G Wireless Systems to allocate multiple carriers resources among users with elastic and inelastic traffic. Each application running on the user equipment (UE) is assigned an application utility function. In the proposed model, different classes of user groups are considered and users are partition…
The goal of fourth generation (4G) mobile communications system is to seamlessly integrate a wide variety of communication services such as high speed data, video and multimedia traffic as well as voice signals. One of the promising approaches in 4G is the Adaptive Orthogonal Frequency Division Multiplexing (AOFDM) technique. In Multiple Input Multiple Output (MIMO)- OFDM, adaptive transmissio…
n Multi-hop Wireless Networks (MWNs), the end-to-end performance degrades exponentially with hop counts and the degree of traffic aggregation at each hop. Fair allocation of bandwidthamong nodes is one of the challenging problems in MWNs. The IEEE 802.11 distributed coordination function standard stipulates long-term equalization of throughput among stations by giving the same number of transm…
In this paper, a comparative study of the simulated symbol error rate (SER) with the theoretical SER of uncoded communication systems is made for selected modulation schemes with and without fading. Slow fading Weibull and Rayleigh channels are considered in this paper. The modulation schemes considered are (1) Binary Phase Shift Keying, (2) Quadrature Phase Shift Keying, (3) Orthogonal Freque…
This letter considers routing in delay tolerant networks whereby nodes have semi-predictable mobility patterns within a time period. We propose a mobility-based routing protocol (MBRP) where nodes construct a space–time graph dynamically. As the space–time graph may be incomplete, MBRP presents a heuristic that evaluates encountered nodes based on their recorded mobility patterns in order t…
This paper presents a modulator and low power ASK demodulator that uses a new technique. This technique uses the dynamic threshold MOSFET to reduce the threshold voltage of diodes connected MOS transistors as a barrier in the design of the envelope detector. This circuit has been simulated in a 90 nm CMOS technology to satisfy EPC Class 1 Generation 2 standard protocol. The proposed circuit can…
The double codebook structures are proposed and applied in LTE-advanced, which can track both longterm and short-term channel state information. In traditional incoherent estimation, precoding matrix indicators (PMI) estimation is performed on each individual subcarrier and some form of averaging procedure then follows to combine the results from individual narrow-band processing. As a result, …
Abstract With the increasing diversity of network services and applications, caching technologies for content delivery networks (CDNs) and information-centric networking (ICN) have become beneficial to improve the service quality such as communication latency by storing content data on network nodes near to users. Cache performance depends on the memory size at each node as well as the request…
Abstract Many multicast services such as live multimedia distribution and real-time event monitoring require multicast mechanisms that involve network functions (e.g., firewall and video transcoding). Network function virtualization (NFV) is a concept that proposes using virtualization to implement network functions on infrastructure building block (such as high volume servers and virtual mac…
Abstract Advanced communication technology is the enabling factor for distributed sensing and control in smart grid. The performance of communication has a significant effect on the performance of the controllers that manage a power system. This effect is more profound when transient level behavior and critical applications are concerned. In these cases, an important issue is to design contro…
Emerging nanoscale applications, e.g., nanoscale cooperative intelligent drug delivery or multiple intra-body nanosensors for health monitoring, mandate enabling nanomachines to communicate with each other, and hence, form nanonetworks to overcome the limitations of a single nanomachine. Indeed, the human body is a massive nanoscale molecular communications network composed of billions of inter…
Abstract Power systems have been dramatically changing with cutting-edge information technologies. The new power system infrastructure has evolved and has been studied by many institutes and companies. Future power systems are bound up quietly with customer-side activities such as realtime pricing and distributed generators (DGs). To deploy those services on the power system, independent and …
Abstract With the motivation of seamlessly extending wireless sensor networks to the external environment, service-oriented architecture comes up as a promising solution. However, as sensor nodes are failure prone, this consequently renders the whole wireless sensor network to seriously faulty. When a particular node is faulty, the service on it should be migrated into those substitute sen…
Abstract Recent work on Information Centric Networking enables the exploitation of the caching resources of the new generation of routers [Content Routers (CR)]. So far, only a basic Least Recently Used strategy implemented on every CR has been proposed. In this paper, we introduce a cooperative caching strategy in the context of a Content-Centric-Network (CCN). This strategy has been designe…
Abstract Large-scale collaborative e-science requires fast and reliable data transfer with guaranteed performance, which is made possible by reserving bandwidth as needed in advance in high-performance networks. In scientific applications, users typically know the data size, the data available time, and the deadline to finish the data transfer, and they always wish to achieve the earliest pos…
Abstract Traffic classification is an important aspect in network operation and management, but challenging from a research perspective. During the last decade, several works have proposed different methods for traffic classification. Although most proposed methods achieve high accuracy, they present several practical limitations that hinder their actual deployment in production networks. …
Abstract An intermediate node in an inter-flow network coding scheme needs to know exactly which are the previous hop and next hop of a packet before coding. It is difficult to incorporate inter-flow network coding into opportunistic routing (OR) because the next hop of a packet in OR can’t be determined in advance. Coding-aware opportunistic routing (CAR) is proposed in this paper to ad…
Abstract A shared risk link group (SRLG) is a set of links which share a common risk of failure. Routing protocols in Generalized MultiProtocol Label Switching, using distributed SRLG information, can calculate paths avoiding certain SRLGs. For single SRLG failure an end-to-end SRLG-disjoint path pair can be calculated, but to ensure connection in the event of multiple SRLG failures a set …
Abstract Time synchronization is a fundamental requirement for many services provided by distributed systems. For this purpose, several time synchronization protocols have been proposed. However, they either achieve high accuracy by adding further network traffic, even more than common protocols such as network time protocol and precision time protocol, or consume a lot of time in addition…
Abstract Detection of abnormal internet traffic has become a significant area of research in network security. Due to its importance, many predictive models are designed by utilizing machine learning algorithms. The models are well designed to show high performances in detecting abnormal internet traffic behaviors. However, they may not guarantee reliable detection performances for new inc…
Abstract New kinds of services and data flows, such as cloud computing, server virtualization, or quality of service (QoS)-aware Internet services, have led to higher demands on network resources. Thus, they have also led to increased bandwidth consumption and unexpected congestion, especially in backbones. In this article a novel proposal is studied, with the aim of improving the performa…
Abstract RFID technology is the popular technology in recent years and applies to many automatic identification applications such as supply chain management, thief-prevention and so on. Supply chain system with the help of RFID system reduces the cost in business operation. Different members in the supply chain connect to the same RFID tag for acquiring their own data. Members can protect …
Abstract Availability of good quality monitoring data is a vital need for management of today’s data centers. However, effective use of monitoring tools demands an understanding of the monitoring requirements that system administrators most often lack. Instead of a well-defined process of defining a monitoring strategy, system administrators adopt a manual and intuition-based approach. I…
Abstract Conventionally, network migration models study competition between emerging and incumbent technologies by considering the resulting increase in revenue and associated cost of migration. We propose to advance the science in the existing network migration models by considering additional critical factors, including (1) synergistic relationships across multiple technologies, (2) redu…
Abstract Rapid growth in mobile communication and the proliferation of smartphones have drawn significant attention to location-based services (LBSs). One of the most important factors in the vitalization of LBSs is the accurate position estimation of a mobile device. The traditional global positioning system method has a critical weakness in terms of its limited availability, e.g., in ind…
Abstract Information Retrieval (IR) systems aim to retrieve data that satisfies certain requirements and constitute an important service in many types of networks, including Delay/Disruption Tolerant Networks (DTNs). In current DTN based IR systems, the data that satisfies a query is assumed to be stored on a single node. Therefore, once a node receives a query in which it has the correspo…
Abstract A network coding based peer-to-peer (P2P) file sharing system has been proposed in recent years. It uses the random combination of encoded pieces to make the file sharing more effective. Most of the conventional P2P file sharing systems adopt a random (or rarest piece first) transmission policy to avoid too many duplicated pieces and rare pieces occurring in the network. Network c…
Abstract. As interest in howto increase biomass production through biotechnologicalmeans gains traction, focus is turning towards the use of photoautotrophic micropropagation under elevated levels of carbon dioxide (CO2) to maximize plant growth and productivity. The effect of super-elevatedCO2 with cold cathode fluorescent lamps (CCFLs)on the photoautotrophic growth of Oncidesa in vitro has…
Although farmers’ markets offer healthy foods for purchase, many lack the equipment necessary to process convenient, card-based transactions. We assessed the impact of providing wireless terminals to 5 markets on overall sales and redemption of Supplemental Nutrition Assistance Program (SNAP) benefits. Sales increased significantly at 4 of the 5 markets after implementation of the terminals,…