Issue Information
No abstract is available for this article.
QoS-based radio network dimensioning for LTE networks with heavy real-time traffic
Applications of video streaming and real-time gaming, which generate large amounts of real-time traffic in the network, are expected to gain considerable popularity in Long Term Evolution networks. Maintaining the QoS such as packet delay, packet loss ...
A radio frequency identification application for car theft prevention in parking lot management systems
Currently, there are many parking lot management systems in use; however, most of them are unsuited to the problem of car theft. For example, a thief can drive a jalopy into a parking lot, and because the gate does not have any mechanism to detect ...
Constructing a VANET based on cluster chains
The paper proposes a scheme on constructing a vehicular ad-hoc network based on cluster chains. In the cluster construction algorithm, the distance from a potential cluster head to its neighbor cluster associate node is used as a metric to elect a ...
An energy-saving-centric downlink scheduling scheme for WiMAX networks
This study proposes an energy-saving-centric downlink scheduling scheme to support efficient power utilization and to satisfy the QoS requirements. The base station considers the queue lengths of mobile stations with real-time and non-real-time ...
Multi-hop medium access control protocol for low energy critical infrastructure monitoring networks using wake-up radio
The IEEE 802.15.4K Task Group was formed recently to address the low energy critical infrastructure monitoring networks. The aim is to collect scheduled and event data from a large number of non-mains powered endpoints that are widely dispersed. The ...
A layer2 multipath solution and its performance evaluation for Data Center Ethernets
Data Center Ethernet is likely to be deployed as the communication infrastructure for future data centers, which carries multiple types of traffic with very different characteristics and handling requirements. Conventional Spanning Tree Protocol STP ...
Physical-layer network coding with limited feedback using orthogonal space-time block codes
This paper introduces limited feedback technique into physical-layer network coding PLNC scheme, which is the most spectrally efficient protocol in two-way relay channels, consisted of one relay and two end nodes sources. Decode-and-forward DF and ...
An efficient mixed mode and paired cipher text cryptographic algorithm for effective key distribution
Widely used asymmetric key or public key systems such as RSA, Rabin system, ElGamal system, and elliptical curve system are based on a single hard mathematical problem such as factoring or discrete logarithm. Even if these algorithms are very secure now,...
Characterization and modeling of video popularity
Popularity of videos is a key factor for the design and management of a streaming media system. In this paper, three factors representing clients' access to a media system are investigated to characterize popularity. One of the factors is the commonly ...
A source authentication scheme based on message recovery digital signature for multicast
The source authentication is an important issue for the multicast applications because it can let the receiver know whether the multicast message is sent from a legal source or not. However, the previously related schemes did not provide the ...
A novel signal separation algorithm based on compressed sensing for wideband spectrum sensing in cognitive radio networks
In cognitive radio networks, since cognitive terminals use a shared wideband frequency spectrum for data transmissions, they are susceptible to malicious denial-of-service attacks, where adversaries try to corrupt communication by actively transmitting ...
An optimal solution to resource allocation among soft QoS trafficin wireless network
Optimization theory and nonlinear programming method have successfully been applied into wire-lined networks e.g., the Internet in developing efficient resource allocation and congestion control schemes. The resource e.g., bandwidth allocation in a ...
Performance analysis of Doppler shift effects on OFDM-based and MC-CDMA-based cognitive radios
The present development of high data rate wireless applications has led to extra bandwidth demands. However, finding a new spectrum bandwidth to accommodate these applications and services is a challenging task because of the scarcity of spectrum ...
RA and DA satellite access schemes: a survey and some research results and challenges
This paper surveys the most popular random access RA, demand assignment DA, and hybrids schemes for satellite broadband access networks. In addition, we present some recent research results that we obtained when a reliable transmission control protocol, ...
Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card
Providing a suitable key agreement protocol for session initiation protocol is crucial to protecting the communication among the users over the open channel. This paper presents an efficient and flexible password authenticated key agreement protocol for ...
Performance analysis of cooperative network over Nakagami and Rician fading channels
This paper presents an analysis on the performance of single-relay and multiple fixed-relay cooperative network. The relay nodes operate in amplify-and-forward AF mode and transmit the signal through orthogonal channels. We consider maximal-ratio ...
Distributed compressed sensing in wireless local area networks
In order to improve energy efficiency in the process of gathering data and transmitting information, compressed sensing CS has been applied increasingly in wireless local area networks WLANs. In traditional usages of CS techniques in previous ...
A multi-cell adaptive resource allocation scheme based on potential game for ICIC in LTE-A
Intercell interference coordination in Third Generation Partnership Project long-term evolution-advanced system has received much attention both from the academia and the standardization communities. Moreover, the network architecture of long-term ...
Cooperative transmissions for secondary spectrum access in cognitive radios
In cognitive radio networks CRNs, the primary users PUs and secondary users SUs will interfere with each other, which may severely degrade the performances of both primary and secondary transmissions. In this paper, we propose a two-phase cognitive ...
Extensible optical access network enabling multistage protections and data aggregation based on tangent rings
In this paper, an extensible optical access network architecture is proposed on the basis of multiple tangent single-fiber rings. With the proposed architecture, both multistage protections and data aggregation can be realized. Optical line terminal and ...
A framework of data caching for improving decoding efficiency of opportunistic network coding
Throughput performance of wireless networks can be enhanced by applying network coding NC technique based on opportunistic listening. The packets sent or overheard by a network node should be locally cached for the purpose of possible future decoding. ...
Secure multicast routing protocols in mobile ad-hoc networks
A mobile ad-hoc network MANET is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network. Routing protocols in MANETs define how routes between source and destination nodes are established and maintained. ...
Dynamic connection provisioning with shared protection in IP/WDM networks
Internet protocol IP traffic connections arrive dynamically at wavelength-division multiplexing WDM network edges with low data rates compared with the wavelength capacity, availability, and quality-of-service QoS constraints. This paper introduces a ...
A routing protocol for mobile ad-hoc networks using the profit optimization model
Recently, wireless networks have become one of the major development trends in computer network technology. Because there is no more need of the wired transmission medium, applications have thus diversified. One such growing field of wireless networks ...
Analysis of MANET dynamic source routing and its performance enhancements
Since the inception of the dynamic source routing DSR protocol for mobile ad hoc networks, several enhancements have been proposed, along with other competing routing protocols. All of them provide different degrees of throughput improvement under ...
A novel cooperative transmission scheme based on superposition coding and partial relaying
This paper considered the single relay system and proposed a novel repetition coding decode-and-forward DF cooperative transmission scheme on the basis of superposition coding and partial relaying. In the proposed scheme, the link disparity due to the ...
Cryptanalysis of some user identification schemes for distributed computer networks
User identification plays an important role for access control in networks. Recently, Hsu and Chuang proposed a user identification scheme for distributed computer networks, which can also provide key agreement and user anonymity. However, Tsai pointed ...
Congestion control with dynamic threshold adaptation and cross-layer response for TCP Vegas over IEEE 802.11 wireless networks
Wireless technologies provide mobile access and enable rapid andcost-effective network deployment. But a wireless link is generally accompanied by high interference, transmission errors and a varying latency. The erratic packet losses usually lead to a ...
Second-order statistics of multiuser relay cooperation systems over Nakagami-m fading channels
To attain overall recognition of the effect of Nakagami-m channel parameters on the second-order statistics and to present a guide to the design and configuration of systems, we investigate the average level crossing rate LCR and average fading duration ...