To see the other types of publications on this topic, follow the link: Delay-sensitive communication.

Journal articles on the topic 'Delay-sensitive communication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Delay-sensitive communication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Malak, Derya, Howard Huang, and Jeffrey G. Andrews. "Throughput Maximization for Delay-Sensitive Random Access Communication." IEEE Transactions on Wireless Communications 18, no. 1 (January 2019): 709–23. http://dx.doi.org/10.1109/twc.2018.2885295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aoun, Marc, Paul Beekhuizen, Antonios Argyriou, Dee Denteneer, and Peter van der Stok. "Packet skipping and network coding for delay-sensitive network communication." Performance Evaluation 69, no. 9 (September 2012): 456–69. http://dx.doi.org/10.1016/j.peva.2012.05.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kaleem, Zeeshan, Muhammad Yousaf, Aamir Qamar, Ayaz Ahmad, Trung Q. Duong, Wan Choi, and Abbas Jamalipour. "UAV-Empowered Disaster-Resilient Edge Architecture for Delay-Sensitive Communication." IEEE Network 33, no. 6 (November 2019): 124–32. http://dx.doi.org/10.1109/mnet.2019.1800431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bicen, A. Ozan, V. Cagri Gungor, and Ozgur B. Akan. "Delay-sensitive and multimedia communication in cognitive radio sensor networks." Ad Hoc Networks 10, no. 5 (July 2012): 816–30. http://dx.doi.org/10.1016/j.adhoc.2011.01.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kawabata, Akio, Bijoy Chand Chatterjee, Seydou Ba, and Eiji Oki. "A Real-Time Delay-Sensitive Communication Approach Based on Distributed Processing." IEEE Access 5 (2017): 20235–48. http://dx.doi.org/10.1109/access.2017.2758803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hamidi-Sepehr, Fatemeh, Henry D. Pfister, and Jean-Francois Chamberland. "Delay-Sensitive Communication Over Fading Channels: Queueing Behavior and Code Parameter Selection." IEEE Transactions on Vehicular Technology 64, no. 9 (September 2015): 3957–70. http://dx.doi.org/10.1109/tvt.2014.2365181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Qiong, Xiumei Fan, Wei Wei, and Marcin Wozniak. "Dynamic Scheduling Algorithm for Delay-Sensitive Vehicular Safety Applications in Cellular Network." Information Technology And Control 49, no. 1 (March 25, 2020): 161–78. http://dx.doi.org/10.5755/j01.itc.49.1.24113.

Full text
Abstract:
The vehicular safety applications disseminate the burst messages during an emergency scenario, but effort to reduce delay of communication are hampered by wireless access technology. As conventional VANET (Vehicular ad-hoc network) connected intermittently, the LTE-based framework has been established for the vehicular communication environment. However, resource allocation which affected by many factors, such as power, PRB (physical resource block), channel quality, are challenging to guarantee the safety services QoS in LTE downlink for OFDM. In order to solve the problem of safety message dissemination in LTE vehicular network, we proposed a delay-aware control policy by leveraging cross-layer approach to maximize the system throughput. First, we model the resource allocation problem using the queuing theory based on the MISO. Second, the method casts the problem of throughput and latency for dynamic communication system into a stochastic network optimization problem, and then makes tradeoffs between them by Lyapunov optimization technique. Finally, we use the improved the branch and bound algorithm to search optimal solution in system capacity region for these decomposed subproblems. The simulation results show that our algorithm can guarantee the delay while maximum system throughput
APA, Harvard, Vancouver, ISO, and other styles
8

Karamchandani, Nikhil, and Massimo Franceschetti. "Scaling laws for delay-sensitive traffic in Rayleigh fading networks." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 464, no. 2096 (May 6, 2008): 2187–205. http://dx.doi.org/10.1098/rspa.2007.0330.

Full text
Abstract:
The throughput of delay-sensitive traffic in a Rayleigh fading network is studied by adopting a scaling limit approach. The case of the study is that of a pair of nodes establishing a data stream that has routing priority over all the remaining traffic in the network. For every delay constraint, upper and lower bounds on the achievable information rate between the two endpoints of the stream are obtained as the network size grows. The analysis concerns decentralized schemes , in the sense that all nodes make next-hop decisions based only on local information, namely their channel strength to other nodes in the network and the position of the destination node. This is particularly important in a fading scenario, where the channel strength varies with time and hence pre-computing routes can be of little help. Natural applications are remote surveillance using sensor networks and communication in emergency scenarios.
APA, Harvard, Vancouver, ISO, and other styles
9

Hussain, Abid, Muddesar Iqbal, Sohail Sarwar, Muhammad Safyan, Zia ul Qayyum, Honghao Gao, and Xinheng Wang. "Servicing delay sensitive pervasive communication through adaptable width channelization for supporting mobile edge computing." Computer Communications 162 (October 2020): 152–59. http://dx.doi.org/10.1016/j.comcom.2020.07.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Venkatesh, K., L. N. B. Srinivas, M. B. Mukesh Krishnan, and A. Shanthini. "QoS improvisation of delay sensitive communication using SDN based multipath routing for medical applications." Future Generation Computer Systems 93 (April 2019): 256–65. http://dx.doi.org/10.1016/j.future.2018.10.032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Gawas, Mahadev A., Lucy J. Gudino, and K. R. Anupama. "Congestion-Adaptive and Delay-Sensitive Multirate Routing Protocol in MANETs: A Cross-Layer Approach." Journal of Computer Networks and Communications 2019 (May 29, 2019): 1–13. http://dx.doi.org/10.1155/2019/6826984.

Full text
Abstract:
With a growing demand of multimedia communication over MANETs, to support quality of service (QoS), the MAC standards such as 802.11a/b/g operate with multiple data rates to efficiently utilize the limited resources. Since the wireless channel is shared among the neighbors in MANETs, determining delay-sensitive and congestion-aware routes using the IEEE 802.11 MAC is still a challenging problem. This paper proposes a novel cross-layer approach called congestion-adaptive and delay-sensitive multirate (CADM) routing protocol in MANETs. The CADM protocol exploits the cross-layer interaction between the network layer, MAC, and physical layer. The CADM accesses the correlation between data rate, congestion metric, and MAC delay in delay-sensitive applications to provide enhanced network efficiency in MANETs. The protocol discovers multiple node-disjoint routes and facilitates optimal data rates between the links based on the estimated delay to admit a flow with the certain delay requirement in multirate MANETs. The proposed CADM protocol discovers the route through less congested nodes and also actively handles the congestion if it occurs. The performance of the CADM protocol is comprehensively assessed through the simulation, which highlights the advantages of our cross-layer mechanism.
APA, Harvard, Vancouver, ISO, and other styles
12

Li, Shu De, Yi Chen, and Cai Xia Liu. "Smith Predictor Based on Predicting Induced-Delay." Advanced Materials Research 201-203 (February 2011): 2003–6. http://dx.doi.org/10.4028/www.scientific.net/amr.201-203.2003.

Full text
Abstract:
Since communication network is introduced into control system, induced-delay appears. Because of the delay, the performance of networked control system becomes bad, even unsteady. Conventional Smith predictor is sensitive to error in object model and needs delay’s value in advance. Regarding random delay, its application is limited. In this paper, we propose a method based on induced-delay predicted by BP neural network, which use two historical delay values to predict the next one. Smith predictor adjusts its parameters according to that value in time. The simulating results indicate that the precision of delay-predicting can be ensured and the performance of networked control system has been improved.
APA, Harvard, Vancouver, ISO, and other styles
13

Lakhan, Abdullah, Mazhar Ali Dootio, Tor Morten Groenli, Ali Hassan Sodhro, and Muhammad Saddam Khokhar. "Multi-Layer Latency Aware Workload Assignment of E-Transport IoT Applications in Mobile Sensors Cloudlet Cloud Networks." Electronics 10, no. 14 (July 17, 2021): 1719. http://dx.doi.org/10.3390/electronics10141719.

Full text
Abstract:
These days, with the emerging developments in wireless communication technologies, such as 6G and 5G and the Internet of Things (IoT) sensors, the usage of E-Transport applications has been increasing progressively. These applications are E-Bus, E-Taxi, self-autonomous car, E-Train and E-Ambulance, and latency-sensitive workloads executed in the distributed cloud network. Nonetheless, many delays present in cloudlet-based cloud networks, such as communication delay, round-trip delay and migration during the workload in the cloudlet-based cloud network. However, the distributed execution of workloads at different computing nodes during the assignment is a challenging task. This paper proposes a novel Multi-layer Latency (e.g., communication delay, round-trip delay and migration delay) Aware Workload Assignment Strategy (MLAWAS) to allocate the workload of E-Transport applications into optimal computing nodes. MLAWAS consists of different components, such as the Q-Learning aware assignment and the Iterative method, which distribute workload in a dynamic environment where runtime changes of overloading and overheating remain controlled. The migration of workload and VM migration are also part of MLAWAS. The goal is to minimize the average response time of applications. Simulation results demonstrate that MLAWAS earns the minimum average response time as compared with the two other existing strategies.
APA, Harvard, Vancouver, ISO, and other styles
14

Petrov, Tibor, Lukas Sevcik, Peter Pocta, and Milan Dado. "A Performance Benchmark for Dedicated Short-Range Communications and LTE-Based Cellular-V2X in the Context of Vehicle-to-Infrastructure Communication and Urban Scenarios." Sensors 21, no. 15 (July 28, 2021): 5095. http://dx.doi.org/10.3390/s21155095.

Full text
Abstract:
For more than a decade, communication systems based on the IEEE 802.11p technology—often referred to as Dedicated Short-Range Communications (DSRC)—have been considered a de facto industry standard for Vehicle-to-Infrastructure (V2I) communication. The technology, however, is often criticized for its poor scalability, its suboptimal channel access method, and the need to install additional roadside infrastructure. In 3GPP Release 14, the functionality of existing cellular networks has been extended to support V2X use cases in an attempt to address the well-known drawbacks of the DSRC. In this paper, we present a complex simulation study in order to benchmark both technologies in a V2I communication context and an urban scenario. In particular, we compare the DSRC, LTE in the infrastructural mode (LTE-I), and LTE Device-to-Device (LTE-D2D) mode 3 in terms of the average end-to-end delay and Packet Delivery Ratio (PDR) under varying communication conditions achieved through the variation of the communication perimeter, message generation frequency, and road traffic intensity. The obtained results are put into the context of the networking and connectivity requirements of the most popular V2I C-ITS services. The simulation results indicate that only the DSRC technology is able to support the investigated V2I communication scenarios without any major limitations, achieving an average end-to-end delay of less than 100 milliseconds and a PDR above 96% in all of the investigated simulation scenarios. The LTE-I is applicable for the most of the low-frequency V2I services in a limited communication perimeter (<600 m) and for lower traffic intensities (<1000 vehicles per hour), achieving a delay pf less than 500 milliseconds and a PDR of up to 92%. The LTE-D2D in mode 3 achieves too great of an end-to-end delay (above 1000 milliseconds) and a PDR below 72%; thus, it is not suitable for the V2I services under consideration in a perimeter larger than 200 m. Moreover, the LTE-D2D mode 3 is very sensitive to the distance between the transmitter and its serving eNodeB, which heavily impacts the PDR achieved.
APA, Harvard, Vancouver, ISO, and other styles
15

WEI, DAVID S. L., SANGUTHEVAR RAJASEKARAN, KSHIRASAGAR NAIK, and SY-YEN KUO. "EFFICIENT ALGORITHMS FOR SELECTION AND SORTING OF LARGE DISTRIBUTED FILES ON DE BRUIJN AND HYPERCUBE STRUCTURES." International Journal of Foundations of Computer Science 14, no. 06 (December 2003): 1129–46. http://dx.doi.org/10.1142/s0129054103002229.

Full text
Abstract:
In this paper we show the power of sampling techniques in designing efficient distributed algorithms. In particular, we apply sampling techniques in the design of selection algorithms on the hypercube and de Bruijn networks, and show that the message complexity of selecting an item from a set (file) is less sensitive to the cardinality of the set (file). Given a file with n keys, our algorithm performs a selection on a p-node de Bruijn network or hypercube using only O(p log log n) messages and suffering a delay of O(τ log p log log n), with high probability. Our selection scheme outperforms the existing approaches in terms of both message complexity and communication delay. Because of the lesser sensitivity of message complexity and communication delay of our algorithms to the file size, our distributed selection schemes are very attractive in applications where very large database systems are involved. Using our selection algorithms, we also show that both quicksort-based sorting scheme and enumeration sorting scheme can be developed for sorting large distributed files on the hypercube and de Bruijn networks. Both of our sorting algorithms outperform the existing distributed sorting schemes in terms of both message complexity and communication delay.
APA, Harvard, Vancouver, ISO, and other styles
16

Li, Yinfeng, Dingcheng Yang, Yu Xu, Lin Xiao, and Haole Chen. "Throughput Maximization for UAV-Enabled Relaying in Wireless Powered Communication Networks." Sensors 19, no. 13 (July 6, 2019): 2989. http://dx.doi.org/10.3390/s19132989.

Full text
Abstract:
This paper investigates mobile relaying in wireless powered communication networks (WPCN), where an unmanned aerial vehicle (UAV) is employed to help information delivery from multiple sources to destination with communication channels severely blocked. The sources are low-power without energy supply. To support information transmission, the UAV acts as a hybrid access point (AP) to provide wireless power transfer (WPT) and information reception for sources. We set the issue of system throughput maximization as the optimization problem. On the one hand, the system is subject to the information causality constraint due to the dependent processes of information reception and transmission for the UAV. On the other hand, the sources are constrained by a so-called neutrality constraints due to the dependent processes of energy harvesting and energy consumption. In addition, we take account of the access delay issue of all ground nodes. Specifically, two paradigms of delay-tolerant case and delay-sensitive case are presented. However, the formulated problem including optimizations for time slot scheduling, power allocation and UAV trajectory is non-convex and thus is difficult to obtain its optimal solution. To tackle this problem, we apply the successive convex approximation (SCA) technique and propose an iterative algorithm by which a suboptimal solution can be achieved. Simulation results validate our proposed design, and show that the obtained suboptimal solution is high-quality, as compared to benchmark scheme.
APA, Harvard, Vancouver, ISO, and other styles
17

P. Lokhande, Meghana, and Dipti D. Patil. "Network Performance Measurement through Machine to Machine Communication in TeleRobotics System." Tehnički glasnik 15, no. 1 (March 4, 2021): 98–104. http://dx.doi.org/10.31803/tg-20210205092413.

Full text
Abstract:
Machine-to-machine (M2M) communication devices communicate and exchange information with each other in an independent manner to perform necessary tasks. The machine communicates with another machine over a wireless network. Wireless communication opens up the environment to huge vulnerabilities, making it very easy for hackers to gain access to sensitive information and carry out malicious actions. This paper proposes an M2M communication system through the internet in Tele-Robotics and provides network performance security. Tele-robotic systems are designed for surgery, treatment and diagnostics to be conducted across short or long distances while utilizing wireless communication networks. The systems also provide a low delay and secure communication system for the tele-robotics community and data security. The system can perform tasks autonomously and intelligently, minimizing the burden on medical staff and improving the quality and system performance of patient care. In the medical field, surgeons and patients are located at different places and connected through public networks. So the design of a medical sensor node network with LEACH protocol for secure and reliable communication ensures through the attack and without attack performance. Finally, the simulation results show low delay and reliable secure network transmission.
APA, Harvard, Vancouver, ISO, and other styles
18

Barman, Ludovic, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Apostolos Pyrgelis, Bryan Ford, Joan Feigenbaum, and Jean-Pierre Hubaux. "PriFi: Low-Latency Anonymity for Organizational Networks." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 24–47. http://dx.doi.org/10.2478/popets-2020-0061.

Full text
Abstract:
AbstractOrganizational networks are vulnerable to trafficanalysis attacks that enable adversaries to infer sensitive information fromnetwork traffic—even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks.We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdroppers and provides high-performance traffic-analysis resistance. PriFi builds onDining Cryptographers networks (DC-nets), but reduces the high communication latency of prior designs via a new client/relay/server architecture, in which a client’s packets remain on their usual network path without additional hops, and in which a set of remote servers assist the anonymization process without adding latency. PriFi also solves the challenge of equivocation attacks, which are not addressed by related work, by encrypting traffic based on communication history. Our evaluation shows that PriFi introduces modest latency overhead (≈ 100ms for 100 clients) and is compatible with delay-sensitive applications such as Voice-over-IP.
APA, Harvard, Vancouver, ISO, and other styles
19

Rani, Jansi J., S. Anusuya, B. Vidhya, and Benedict M. Tephila. "A Study on Techniques of Underwater Optical Communication." Journal of Computational and Theoretical Nanoscience 16, no. 2 (February 1, 2019): 525–28. http://dx.doi.org/10.1166/jctn.2019.7763.

Full text
Abstract:
In recent years, the higher data rate and a higher degree of accuracy in transmissions have been achieved through wireless communication technology. The underwater communication is one of the trending technologies in wireless communication. The underwater data transmission is carried out by the acoustic waves which produce vibrations of sounds during its transmission. These vibrations have disturbed the creatures present underwater and additionally it may cause some noise. The results of many recent researches have concluded that the vibrations produced by the acoustic waves cause the disturbances in the earth plates and due to which the natural calamities like tsunami, earthquakes etc., have been occurring. The underwater communication is mostly used for military applications and for the transmission of sensitive information within the shortest distance of a particular area. The use of acoustic waves produces a low data rate and increased time delay. In addition to that, these waves are unreliable and complex due to multipath propagations in water. The acoustic waves employ modulation techniques like FSK, PSK and OFDM for the data transmission and consume more energy and power. So lately, the transmission of data in underwater is carried out by using the optical waves. ON–OFF keying technique is most commonly used modulation technique with attractive features such as high data rate, less delay, low power consumption, energy saving, and better accuracy than the other techniques.
APA, Harvard, Vancouver, ISO, and other styles
20

Shakeel, Atif, Riaz Hussain, Adeel Iqbal, Irfan Latif Khan, Qadeer ul Hasan, and Shahzad Ali Malik. "Analysis of Efficient Spectrum Handoff in a Multi-Class Hybrid Spectrum Access Cognitive Radio Network Using Markov Modelling." Sensors 19, no. 19 (September 23, 2019): 4120. http://dx.doi.org/10.3390/s19194120.

Full text
Abstract:
Cognitive radio networks (CRNs) rely on sensing of the licensed spectrum of a primary network to dynamically ascertain underutilized portion of the spectrum, thus affording additional communication opportunities. In a CRN, a single homogeneous spectrum access, such as interweave only deprives the secondary users (SUs) of channel access during handoff, particularly at high primary network traffic. Therefore, providing quality-of-service (QoS) to multi-class SUs with diverse delay requirements during handoff becomes a challenging task. In this paper, we have evolved a Markov-based analytical model to ascertain the gain in non-switching spectrum handoff scheme for multi-class SUs employing hybrid interweave-underlay spectrum access strategy. To satisfy the QoS requirements of the delay-sensitive traffic, we have analyzed the impact of hybrid spectrum access scheme for prioritized multi-class SUs traffic. The results show substantial improvement in spectrum utilization, average system throughput and extended data delivery time compared to conventional CRN using interweave only spectrum access. This demonstrates the suitability of the proposed scheme towards meeting QoS requirements of the delay-sensitive SU traffic while improving the overall performance for delay-tolerant SU traffic as well.
APA, Harvard, Vancouver, ISO, and other styles
21

Hubbard, Nicholas A., Rachel R. Romeo, Hannah Grotzinger, Melissa Giebler, Andrea Imhof, Clemens C. C. Bauer, and John D. E. Gabrieli. "Reward-Sensitive Basal Ganglia Stabilize the Maintenance of Goal-Relevant Neural Patterns in Adolescents." Journal of Cognitive Neuroscience 32, no. 8 (August 2020): 1508–24. http://dx.doi.org/10.1162/jocn_a_01572.

Full text
Abstract:
Maturation of basal ganglia (BG) and frontoparietal circuitry parallels developmental gains in working memory (WM). Neurobiological models posit that adult WM performance is enhanced by communication between reward-sensitive BG and frontoparietal regions, via increased stability in the maintenance of goal-relevant neural patterns. It is not known whether this reward-driven pattern stability mechanism may have a role in WM development. In 34 young adolescents (12.16–14.72 years old) undergoing fMRI, reward-sensitive BG regions were localized using an incentive processing task. WM-sensitive regions were localized using a delayed-response WM task. Functional connectivity analyses were used to examine the stability of goal-relevant functional connectivity patterns during WM delay periods between and within reward-sensitive BG and WM-sensitive frontoparietal regions. Analyses revealed that more stable goal-relevant connectivity patterns between reward-sensitive BG and WM-sensitive frontoparietal regions were associated with both greater adolescent age and WM ability. Computational lesion models also revealed that functional connections to WM-sensitive frontoparietal regions from reward-sensitive BG uniquely increased the stability of goal-relevant functional connectivity patterns within frontoparietal regions. Findings suggested (1) the extent to which goal-relevant communication patterns within reward-frontoparietal circuitry are maintained increases with adolescent development and WM ability and (2) communication from reward-sensitive BG to frontoparietal regions enhances the maintenance of goal-relevant neural patterns in adolescents' WM. The maturation of reward-driven stability of goal-relevant neural patterns may provide a putative mechanism for understanding the developmental enhancement of WM.
APA, Harvard, Vancouver, ISO, and other styles
22

Singh, Bhupendra, and Rajesh Mishra. "Performance Analysis of DCF- Two Way Handshake vs RTS/CTS During Train-Trackside Communication in CBTC based on WLAN802.11b." Recent Advances in Computer Science and Communications 13, no. 3 (August 12, 2020): 345–52. http://dx.doi.org/10.2174/2213275912666190103141939.

Full text
Abstract:
Background: Wireless Local Area Network (WLAN) is used primarily in CBTC because of easy availability of commercial WLAN equipment. In present scenario, WLAN Medium Access Control (MAC) protocol is a well-known protocol which is used to satisfy real-time traffic and delay- sensitive applications. The bidirectional train-trackside communication is the fundamental key of train control in CBTC. Methods: DCF describes two basic techniques used for packet transmission: First technique is a Two Way Handshake (TWH) mechanism and another is Four Way Handshake (FWH) mechanisms. RTS/CTS FWH protocol specified by IEEE802.11b is introduced to rectify the Hidden Node Problem (HNP) encounters in TWH protocol. That is why the TWH mechanism of DCF technique suffers from higher average packet delay time when this protocol is applied to CBTC. DCF- Four Way Handshake (FWH), Request To Send (RTS) and Clear To Send (CTS) delay model is proposed to develop Communication Based Train Control (CBTC) system. Results: FWH is applied in CBTC to overcome the packet delay and throughput limitations of Two Way Handshake (TWH) mechanism of distributed coordination function (DCF) based technique. An experiment is designed to simulate and compare the performance of RTS/CTS delay model against TWH mechanism of DCF. Conclusion: It was found that the Average packet delay is slightly higher and throughput is lesser in RTS/CTS in comparison to TWH method. By comparing the performance of these two medium access mechanism in CBTC it was found that for multiple retransmissions with various data rates the RTS/CTS model had better packet delay time than TWH.
APA, Harvard, Vancouver, ISO, and other styles
23

Waheed, Abdul, Munam Ali Shah, Abid Khan, Carsten Maple, and Ikram Ullah. "Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs." Sensors 21, no. 8 (April 12, 2021): 2718. http://dx.doi.org/10.3390/s21082718.

Full text
Abstract:
Computation offloading is a process that provides computing services to vehicles with computation sensitive jobs. Volunteer Computing-Based Vehicular Ad-hoc Networking (VCBV) is envisioned as a promising solution to perform task executions in vehicular networks using an emerging concept known as vehicle-as-a-resource (VaaR). In VCBV systems, offloading is the primary technique used for the execution of delay-sensitive applications which rely on surplus resource utilization. To leverage the surplus resources arising in periods of traffic congestion, we propose a hybrid VCBV task coordination model which performs the resource utilization for task execution in a multi-hop fashion. We propose an algorithm for the determination of boundary relay vehicles to minimize the requirement of placement for multiple road-side units (RSUs). We propose algorithms for primary and secondary task coordination using hybrid VCBV. Extensive simulations show that the hybrid technique for task coordination can increase the system utility, while the latency constraints are addressed.
APA, Harvard, Vancouver, ISO, and other styles
24

Montoya, Germán A., and Yezid Donoso. "Delay-Sensitive Optimization Models and Distributed Routing Algorithms for Mobile Wireless Sensor Networks." International Journal of Computers Communications & Control 11, no. 6 (October 17, 2016): 819. http://dx.doi.org/10.15837/ijccc.2016.6.2745.

Full text
Abstract:
Communication disruptions caused by mobility in wireless sensor networks introduce undesired delays which affect the network performance in delay sensitive applications in MWSN. In order to study the negative effects caused by mobility, we propose two mathematical models to find the minimum cost path between a source node and a destination node considering the nodes position changes across time. Our mathematical models consider the usage of buffers in the nodes to represent the fact of storing a message if there is not an appropriate forwarding node for transmitting it. In order to contrast our mathematical models results we have designed two kinds of algorithms: the first one takes advantage of the closest neighbours to the destination node in order to reach it as fast as possible from the source node. The second one simply reaches the destination node if a neighbour node is precisely the destination node. Finally, we compare the delay performance of these algorithms against our mathematical models to show how efficient they are for reaching a destination node. This paper is an extension of [10].a The mathematical model proposed in [10] is improved by adding two new binary variables with the aim of make it more readable and compact mathematically. This means a post-processing algorithm is added only for evaluating if a solution is at the first network state.
APA, Harvard, Vancouver, ISO, and other styles
25

Nisar, Kashif. "Voice Priority Queue Scheduling System Models for VoIP over WLANs." International Journal of Information Communication Technologies and Human Development 5, no. 1 (January 2013): 36–59. http://dx.doi.org/10.4018/jicthd.2013010103.

Full text
Abstract:
The Voice over Internet Protocol (VoIP) is a delay sensitive traffic due to real-time applications on networks. The assessment of voice flow quality in the VoIP is an essential requirement for technical and commercial motivation. The packets of VoIP streaming may experience drops because of the competition among the different kinds of traffic flow over the network. A VoIP application is also sensitive to delay and requires the voice packets to arrive on time from the sender to the receiver side without any delay over WLAN. The scheduling system model for VoIP traffic is an unresolved problem. In this research paper, the author proposes a new Voice Priority Queue (VPQ) scheduling system models and algorithms for the VoIP over WLANs to solve scheduling issues over IP-based networks. They present new contributions, through the three stages of the VPQ. The VPQ scheduling algorithm is provided as an essential technique in the VoIP communication networks to guarantee the QoS requirements. The design of the VPQ is managed by the limited bandwidth utilization and has been proven to have an efficient performance over WLANs.
APA, Harvard, Vancouver, ISO, and other styles
26

Michailidis, Emmanouel T., Stelios M. Potirakis, and Athanasios G. Kanatas. "AI-Inspired Non-Terrestrial Networks for IIoT: Review on Enabling Technologies and Applications." IoT 1, no. 1 (July 31, 2020): 21–48. http://dx.doi.org/10.3390/iot1010003.

Full text
Abstract:
During the last few years, various Industrial Internet of Things (IIoT) applications have emerged with numerous network elements interconnected using wired and wireless communication technologies and equipped with strategically placed sensors and actuators. This paper justifies why non-terrestrial networks (NTNs) will bring the IIoT vision closer to reality by providing improved data acquisition and massive connectivity to sensor fields in large and remote areas. NTNs are engineered to utilize satellites, airships, and aircrafts, which can be employed to extend the radio coverage and provide remote monitoring and sensing services. Additionally, this paper describes indicative delay-tolerant massive IIoT and delay-sensitive mission-critical IIoT applications spanning a large number of vertical markets with diverse and stringent requirements. As the heterogeneous nature of NTNs and the complex and dynamic communications scenarios lead to uncertainty and a high degree of variability, conventional wireless communication technologies cannot sufficiently support ultra-reliable and low-latency communications (URLLC) and offer ubiquitous and uninterrupted interconnectivity. In this regard, this paper sheds light on the potential role of artificial intelligence (AI) techniques, including machine learning (ML) and deep learning (DL), in the provision of challenging NTN-based IIoT services and provides a thorough review of the relevant research works. By adding intelligence and facilitating the decision-making and prediction procedures, the NTNs can effectively adapt to their surrounding environment, thus enhancing the performance of various metrics with significantly lower complexity compared to typical optimization methods.
APA, Harvard, Vancouver, ISO, and other styles
27

Duan, Yilong, Longfu Luo, Yong Li, and Yijia Cao. "The Communication System and its Impacts on Line Current Differential Protection in Distributed Feeder Automation." Energies 13, no. 6 (March 11, 2020): 1298. http://dx.doi.org/10.3390/en13061298.

Full text
Abstract:
As one of the core technologies of distributed feeder automation (DFA), line current differential protection (LCDP) can locate faults quickly and accurately and have the ability to cope with multi-directional flow. However, LCDP algorithm has high requirements for communication speed, and is sensitive to communication quality. In order to apply the LCDP algorithm to a real project, the communication system and its impacts on LCDP need to be studied in depth. In this paper, the design method of a communication system for LCDP, including communication mode, topology, communication protocol, and synchronization, is analyzed in detail. For better parameter determination, the communication models are investigated, and the impact of time delay, data loss, and jitter on LCDP are discussed. Further, the distribution network based on a real project is built in a cyber-physical co-simulation environment, and the impact of electrical fails and communication fails on LCDP are studied. The results show that the design method and parameters determination method proposed in this paper are effective.
APA, Harvard, Vancouver, ISO, and other styles
28

Lee, Kyu-Hwan, and Kyoung Youl Park. "Overall Design of Satellite Networks for Internet Services with QoS Support." Electronics 8, no. 6 (June 17, 2019): 683. http://dx.doi.org/10.3390/electronics8060683.

Full text
Abstract:
The satellite network is useful in various applications because of its coverage, broadcast capability, costs independent of the distance, and easy deployment. Recently, thanks to the advanced technologies in the satellite communication, the high throughput satellite system with mesh connections has been applied to the Internet backbone. In this paper, we propose a practical overall design of the satellite network to provide Internet services with quality of service (QoS) support via the satellite network. In the proposed design, we consider two service types such as delay-tolerance and delay-sensitive services allowing the long propagation delay of the satellite link. Since it is crucial to evaluate the user satisfaction in the application layer for various environments to provide the QoS support, we also define the performance metrics for the user satisfaction and derive the major factors to be considered in the QoS policy. The results of the performance evaluation show that there are factors such as the traffic load and burstiness in the QoS policy for the delay-tolerance service with volume-based dynamic capacity in the satellite network. For the delay-sensitive service with rate-based dynamic capacity, it is additionally indicated that it is important for the estimation of effective data transmission rate to guarantee the QoS. Furthermore, it is shown that the small data size has an effect on the slight reduction of the QoS performance in the satellite network.
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Yao. "Analysis Methodology for Evaluation of Time-Delay Impact on Network-Based System for Droop-Controlled AC Microgrid." Electronics 8, no. 4 (March 28, 2019): 380. http://dx.doi.org/10.3390/electronics8040380.

Full text
Abstract:
Potential performance improvements can be obtained by introducing communication techniques in the power electronic systems. However, network-induced time-delay could bring negative consequences of degrading performance or destabilizing the system in many cases. To investigate and handle the impacts of time-delay, a suit of analytical methodology is proposed, where both delay-insensitive and delay-sensitive control strategies of network-based system have their theoretical methods and different problem-solving paths. The former is to predict the maximum allowable boundaries of time-delay for releasing more network resources, and the latter is to use the controller-altering method for changing its original instability, respectively. The proposed methodology is concretely applied in network-based system of droop-controlled AC (Alternating Current) microgrid in islanded mode. Two different current-sharing strategies are mathematically analyzed and given to verify their validity. Experimental results also show the effectiveness of the proposed methodology in droop-controlled AC microgrid system, which provides theoretical guidance on how to use network-based control for the other power electronic systems.
APA, Harvard, Vancouver, ISO, and other styles
30

Huang, Yi, Xinqiang Ma, Youyuan Liu, and Zhigang Yang. "Effective Capacity Maximization in beyond 5G Vehicular Networks: A Hybrid Deep Transfer Learning Method." Wireless Communications and Mobile Computing 2021 (February 10, 2021): 1–12. http://dx.doi.org/10.1155/2021/8899094.

Full text
Abstract:
How to improve delay-sensitive traffic throughput is an open issue in vehicular communication networks, where a great number of vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) links coexist. To address this issue, this paper proposes to employ a hybrid deep transfer learning scheme to allocate radio resources. Specifically, the traffic throughput maximization problem is first formulated by considering interchannel interference and statistical delay guarantee. The effective capacity theory is then applied to develop a power allocation scheme on each channel reused by a V2I and a V2V link. Thereafter, a deep transfer learning scheme is proposed to obtain the optimal channel assignment for each V2I and V2V link. Simulation results validate that the proposed scheme provides a close performance guarantee compared to a globally optimal scheme. Besides, the proposed scheme can guarantee lower delay violation probability than the schemes aiming to maximize the channel capacity.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Wei Quan, Zu Xun Song, and Xiao Fei Mao. "A Protocol of ISA-MAC Using FH-TH Associat with Concatenated Coding." Applied Mechanics and Materials 602-605 (August 2014): 3721–26. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3721.

Full text
Abstract:
Nowadays, there are so many requirements for time-sensitive in designing Ad Hoc network. However, the existing protocols of MAC, such as ALOHA、CSMA、IEEE802.11 etc. which use the “back-off” to avoid collision, or use the “hand shaking” to order the channel bring the time-delay to MAC. The paper promote a MAC protocol named ISA-MAC which adopts FH-TH combine concatenated coding to relieve channel-collision, improve the efficiency of communication and provide the ability “sending at anytime”.
APA, Harvard, Vancouver, ISO, and other styles
32

Choi, WoongChul, and SeokMin Lee. "A Novel GTS Mechanism for Reliable Multihop Transmission in the IEEE 802.15.4 Network." International Journal of Distributed Sensor Networks 8, no. 1 (January 1, 2012): 796426. http://dx.doi.org/10.1155/2012/796426.

Full text
Abstract:
The IEEE 802.15.4 standard provides Guaranteed Time Slot (GTS) mechanism for reliable transmission. GTS mechanism is suitable for transmitting time-sensitive data because it allocates time slots to a specific node. However, the GTS mechanism in the standard can be used only for one-hop communication. This paper proposes and implements a multihop GTS mechanism for reliable transmission in multihop networks. Simulation results using NS-2 show that low delay and high delivery ratio can be achieved using the proposed mechanism.
APA, Harvard, Vancouver, ISO, and other styles
33

Deng, Xuelei, Yunfeng Dong, and Chao Zhang. "Real-Time Optimal Negotiation Mode Selection Based on Three-Way Decision for Decentralized Remote Sensing Satellite Cluster." International Journal of Aerospace Engineering 2021 (July 30, 2021): 1–13. http://dx.doi.org/10.1155/2021/2159674.

Full text
Abstract:
The mission planning for multisatellite is a complex optimization problem, which is sensitive to time delay caused by communication and decision. Different modes are suitable for different situations. Therefore, we design the workflows of three modes: the independence mode, the MAS mode, and the ground-based mode. And then, a real-time mode selection method based on the three-way decision is proposed to choose the best mode onboard. The experiments proved the effectiveness and advantage of our proposed method.
APA, Harvard, Vancouver, ISO, and other styles
34

Al Guqhaiman, Ahmed Al, Oluwatobi Akanbi, Amer Aljaedi, Adel R. Alharbi, and C. Edward Chow. "DAMAC: A Delay-Aware MAC Protocol for Ad Hoc Underwater Acoustic Sensor Networks." Sensors 21, no. 15 (August 2, 2021): 5229. http://dx.doi.org/10.3390/s21155229.

Full text
Abstract:
In a channel shared by several nodes, the scheduling algorithm is a key factor to avoiding collisions in the random access-based approach. Commonly, scheduling algorithms can be used to enhance network performance to meet certain requirements. Therefore, in this paper we propose a Delay-Aware Media Access Control (DAMAC) protocol for monitoring time-sensitive applications over multi-hop in Underwater Acoustic Sensor Networks (UASNs), which relies on the random access-based approach where each node uses Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) to determine channel status, switches nodes on and off to conserve energy, and allows concurrent transmissions to improve the underwater communication in the UASNs. In addition, DAMAC does not require any handshaking packets prior to data transmission, which helps to improve network performance in several metrics. The proposed protocol considers the long propagation delay to allow concurrent transmissions, meaning nodes are scheduled to transmit their data packets concurrently to exploit the long propagation delay between underwater nodes. The simulation results show that DAMAC protocol outperforms Aloha, BroadcastMAC, RMAC, Tu-MAC, and OPMAC protocols under varying network loads in terms of energy efficiency, communication overhead, and fairness of the network by up to 65%, 45%, and 726%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
35

Liu, Anfeng, Wei Chen, and Xiao Liu. "Delay optimal opportunistic pipeline routing scheme for cognitive radio sensor networks." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771877253. http://dx.doi.org/10.1177/1550147718772532.

Full text
Abstract:
In order to solve the problem of spectrum scarcity in wireless sensor networks, cognitive radio technology can be introduced into wireless sensor networks, giving rising to cognitive radio sensor networks. Delay-sensitive data applications in cognitive radio sensor networks require efficient real-time communication. Opportunistic pipeline routing is a potential technology to reduce the delay, which can use nodes outside the main forwarding path forward data opportunistically when the transmission fails. However, the energy efficiency of cognitive radio sensor networks with opportunistic pipeline routing is low, and the data transmission delay can be further optimized. In view of this situation, we propose the delay optimal opportunistic pipeline routing scheme named Variable Duty Cycle for Opportunistic Pipeline Routing (VDCOPR). In the Variable Duty Cycle for Opportunistic Pipeline Routing scheme, the nodes employ high duty cycle in the area far from the sink, and low duty cycle in the area near to the sink, which can achieve the balance of energy consumption and reduce the data transmission delay while not affecting network lifetime. The theoretical analysis and experimental results show that, compared with previous opportunistic pipeline routing, energy consumption of network is relatively balanced and the data transmission delay can be reduced by 36.6% in the Variable Duty Cycle for Opportunistic Pipeline Routing scheme.
APA, Harvard, Vancouver, ISO, and other styles
36

Pushpan, Sangeetha, and Bhanumathi Velusamy. "Fuzzy-Based Dynamic Time Slot Allocation for Wireless Body Area Networks." Sensors 19, no. 9 (May 7, 2019): 2112. http://dx.doi.org/10.3390/s19092112.

Full text
Abstract:
With the advancement in networking, information and communication technologies, wireless body area networks (WBANs) are becoming more popular in the field of medical and non-medical applications. Real-time patient monitoring applications generate periodic data in a short time period. In the case of life-critical applications, the data may be bursty. Hence the system needs a reliable energy efficient communication technique which has a limited delay. In such cases the fixed time slot assignment in medium access control standards results in low system performance. This paper deals with a dynamic time slot allocation scheme in a fog-assisted network for a real-time remote patient monitoring system. Fog computing is an extended version of the cloud computing paradigm, which is suitable for reliable, delay-sensitive life-critical applications. In addition, to enhance the performance of the network, an energy-efficient minimum cost parent selection algorithm has been proposed for routing data packets. The dynamic time slot allocation uses fuzzy logic with input variables as energy ratio, buffer ratio, and packet arrival rate. Dynamic slot allocation eliminates the time slot wastage, excess delay in the network and attributes a high level of reliability to the network with maximum channel utilization. The efficacy of the proposed scheme is proved in terms of packet delivery ratio, average end to end delay, and average energy consumption when compared with the conventional IEEE 802.15.4 standard and the tele-medicine protocol.
APA, Harvard, Vancouver, ISO, and other styles
37

Hou, Yanzhao, Nan Hu, Qimei Cui, and Xiaofeng Tao. "Performance analysis of scalable video transmission in machine-type-communication caching network." International Journal of Distributed Sensor Networks 15, no. 1 (January 2019): 155014771881585. http://dx.doi.org/10.1177/1550147718815851.

Full text
Abstract:
In this article, different from the traditional Device-to-Device caching wireless cellular networks, we consider the scalable video coding performance in cache-based machine-type communication network, where popular videos encoded by scalable video coding method can be cached at machine-type devices with limited memory space. We conduct a comprehensive analysis of the caching hit probability using stochastic geometry, which measures the probability of requested video files cached by nearby local devices and the user satisfaction index, which is essential to delay sensitive video streams. Simulation results prove the derivation of the performance metrics to be correct, using Random cache method and Popularity Priority cache method. It is also demonstrated that scalable video coding–based caching method can be applied according to different user requirements as well as video-type requests, to achieve a better performance.
APA, Harvard, Vancouver, ISO, and other styles
38

Du, Bo, Haiyan Wang, and Maoxing Liu. "An information diffusion model in social networks with carrier compartment and delay." Nonlinear Analysis: Modelling and Control 23, no. 4 (August 10, 2018): 568–82. http://dx.doi.org/10.15388/na.2018.4.7.

Full text
Abstract:
With the wide applications of the communication networks, the topic of information networks security is getting more and more attention from governments and individuals. This paper is devoted to investigating a malware propagation model with carrier compartment and delay to describe the process of malware propagation in mobile wireless sensor networks. Based on matrix theory for characteristic values, the local stability criterion of equilibrium points is established. Applying the linear approximation method of nonlinear systems, we study the existence of Hopf bifurcation at the equilibrium points. At the same time, we identify some sensitive parameters in the process of malware propagation. Finally, numerical simulations are performed to illustrate the theoretical results.
APA, Harvard, Vancouver, ISO, and other styles
39

Yitayih, Kebebew Ababu, and Mulugeta Libsie. "Towards Developing Enhanced Cluster-Based QoS-Aware Routing in MANET." Journal of Computer Networks and Communications 2020 (January 11, 2020): 1–10. http://dx.doi.org/10.1155/2020/5481916.

Full text
Abstract:
Creating dynamic communication infrastructures between mobile devices and satisfying the desires for time-sensitive multimedia applications have introduced new challenges in the design of protocols for mobile ad hoc networks. In this paper, to stream time-sensitive applications using mobile ad hoc network (MANET), we have selected the Optimal Link State Routing (OLSR) protocol. However, the protocol has high overhead because each node selects a set of multipoint relay (MPR) nodes. Therefore, we have proposed quality of service (QoS) supporting the MPR selection approach and a new lower maintenance clustering approach for minimizing the overhead of the network. As a result, the proposed approach showed a better result in the average end-to-end delay, packet delivery ratio, routing load, and throughput.
APA, Harvard, Vancouver, ISO, and other styles
40

Gobinath, T., and A. Tamilarasi. "Emergency Node Based Fault Tolerance in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 504. http://dx.doi.org/10.14419/ijet.v7i2.24.12147.

Full text
Abstract:
In Wireless Sensor Network (WSN), fault occur due to node failure, malicious attack and link failure. Link failure causes the loss of sensitive data in a network leads to the emergency situation and influence generated and incoming data resulting in high probability of erroneous data, false packet transmission, wrong decision making and rigorous communication interruption. It leads to increase of traffic overhead and faulty node count in the network. In order to avoid this problem Emergency Node(EN) based process is proposed. Simulation clearly shows that the proposed method increased the packet delivery ratio and decreased the average delay, Energy consumption in WSN.
APA, Harvard, Vancouver, ISO, and other styles
41

Karakaya, Murat. "Deadline-Aware Energy-Efficient Query Scheduling in Wireless Sensor Networks with Mobile Sink." Scientific World Journal 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/834653.

Full text
Abstract:
Mobile sinks are proposed to save sensor energy spent for multihop communication in transferring data to a base station (sink) in Wireless Sensor Networks. Due to relative low speed of mobile sinks, these approaches are mostly suitable for delay-tolerant applications. In this paper, we study the design of a query scheduling algorithm for query-based data gathering applications using mobile sinks. However, these kinds of applications are sensitive to delays due to specified query deadlines. Thus, the proposed scheduling algorithm aims to minimize the number of missed deadlines while keeping the level of energy consumption at the minimum.
APA, Harvard, Vancouver, ISO, and other styles
42

Bekmezci, Ilker, and Fatih Alagöz. "Delay Sensitive, Energy Efficient and Fault Tolerant Distributed Slot Assignment Algorithm for Wireless Sensor Networks under Convergecast Data Traffic." International Journal of Distributed Sensor Networks 5, no. 5 (October 1, 2009): 557–75. http://dx.doi.org/10.1080/15501320802300123.

Full text
Abstract:
The scarcest resource for most of the wireless sensor networks (WSNs) is energy and the major factor in energy consumption for WSNs is communication. Not only transmission, but also reception is the source of energy consumption. The lore to decrease energy consumption is to turn off the radio circuit when it is not needed. This is why TDMA is advantageous over contention based methods. A time slot assignment algorithm is an essential part of TDMA based systems. Although centralized time slot assignment protocols are preferred in many WSNs, a centralized approach is not scalable. In this article, a new energy efficient, delay sensitive, and fault tolerant distributed time slot assignment algorithm, referred to as ft_DTSM, is proposed for sensor networks under convergecast traffic pattern. ft_DTSM aims at operating with low delay and low energy under faulty nodes assumption. Instead of random access based periods, it assigns slots with the help of tiny request slots. While traditional slot assignment algorithms do not allow assigning the same slot within two hop neighbors, because of the hidden node problem, ft_DTSM can assign, if the assignment is suitable for convergecast traffic. Simulation results have shown that both delay and energy consumption performances of ft_DTSM is superior to existing distributed slot assignment protocols for WSNs. ft_DTSM can also distribute the slots so that the network can continue its operation against a single point of failure. Although ft_DTSM has a somewhat longer execution time, its scalability characteristic may provide application specific time durations.
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Ning, Shukai Chen, Jianjun Zhu, and Daniel Jian Sun. "A Platoon-Based Adaptive Signal Control Method with Connected Vehicle Technology." Computational Intelligence and Neuroscience 2020 (June 1, 2020): 1–10. http://dx.doi.org/10.1155/2020/2764576.

Full text
Abstract:
One important objective of urban traffic signal control is to reduce individual delay and improve safety for travelers in both private car and public bus transit. To achieve signal control optimization from the perspective of all users, this paper proposes a platoon-based adaptive signal control (PASC) strategy to provide multimodal signal control based on the online connected vehicle (CV) information. By introducing unified phase precedence constraints, PASC strategy is not restricted by fixed cycle length and offsets. A mixed-integer linear programming (MILP) model is proposed to optimize signal timings in a real-time manner, with platoon arrival and discharge dynamics at stop line modeled as constraints. Based on the individual passenger occupancy, the objective function aims at minimizing total personal delay for both buses and automobiles. With the communication between signals, PASC achieves to provide implicit coordination for the signalized arterials. Simulation results by VISSIM microsimulation indicate that PASC model successfully reduces around 40% bus passenger delay and 10% automobile delay, respectively, compared with signal timings optimized by SYNCHRO. Results from sensitivity analysis demonstrate that the model performance is not sensitive to the number fluctuation of bus passengers, and the requested CV penetration rate range is around 20% for the implementation.
APA, Harvard, Vancouver, ISO, and other styles
44

Leivadeas, Aris, George Kesidis, Mohamed Ibnkahla, and Ioannis Lambadaris. "VNF Placement Optimization at the Edge and Cloud †." Future Internet 11, no. 3 (March 9, 2019): 69. http://dx.doi.org/10.3390/fi11030069.

Full text
Abstract:
Network Function Virtualization (NFV) has revolutionized the way network services are offered to end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). NFV is often complemented with the Cloud Computing paradigm to provide networking functions to enterprise customers and end-users remote from their premises. NFV along with Cloud Computing has also started to be seen in Internet of Things (IoT) platforms as a means to provide networking functions to the IoT traffic. The intermix of IoT, NFV, and Cloud technologies, however, is still in its infancy creating a rich and open future research area. To this end, in this paper, we propose a novel approach to facilitate the placement and deployment of service chained VNFs in a network cloud infrastructure that can be extended using the Mobile Edge Computing (MEC) infrastructure for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying the Service Providers’ goal of low deployment costs.
APA, Harvard, Vancouver, ISO, and other styles
45

R, Valanarasu, and Christy A. "COMPREHENSIVE SURVEY OF WIRELESS COGNITIVE AND 5G NETWORKS." Journal of Ubiquitous Computing and Communication Technologies 01, no. 01 (September 13, 2019): 23–32. http://dx.doi.org/10.36548/jucct.2019.1.003.

Full text
Abstract:
The tremendous progress in the wireless mobile communication devices and the continuous growth in the data rates and the usage with the entailment of enhanced performance in the network in the terms of the throughput, delay, energy utilization, data capacity, bandwidth utilization and the cost have led to the emergence of the 5G networks. The flexible transmission empowered by the cognitive radio networks make them prominent in the transmission of the applications that are significant and sensitive to latency. The paper surveys the details of the 5G network, the cognitive radio networks and the impacts in the network by having the cognitive radio in the 5G mobile wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
46

A.A. Adas, A. A. Adas. "Simulation of Cryptographic Algorithms in IPSec on Ad-Hoc Networks." journal of King Abdulaziz University Engineering Sciences 28, no. 1 (January 3, 2017): 31–46. http://dx.doi.org/10.4197/eng.28-1.3.

Full text
Abstract:
This paper focuses on secure data communication between nodes in Ad-Hoc networks by employing IPSec (Internet Protocol Security). In wireless communication, Ad-Hoc network is a new paradigm since, which is used for highly sensitive and emergency operations. Ad-Hoc network is considered a number of mobile nodes that are connected through wireless interfaces and moves arbitrarily. Ensuring security is one of the main issues due to its infrastructure less solutions. This research aims for IPSec protocol that provides security for an Ad-Hoc networking in a various applications. IPSec incorporates security model, i.e. AES (Advanced Encryption Standard) into its framework. In this work, we consider the problem of incorporating security mechanisms to securing data communication for Ad-Hoc networks. We look at AODV routing protocol (Ad-Hoc On-Demand Distance Vector) in detail and it is used for secure routing. Simulation of IPSec protocol is simulated using NS-3 simulator. Results from NS-3 simulator is compared with AH, ESP, and AES in terms of Quality of Service parameters throughput, average processing time and average end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
47

Shah, Peer Azmat, Halabi B. Hasbullah, Ibrahim A. Lawal, Abubakar Aminu Mu’azu, and Low Tang Jung. "A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/506028.

Full text
Abstract:
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO).
APA, Harvard, Vancouver, ISO, and other styles
48

Alam, Md Moktarul, Islam Md Rafiqul, Khairayu Badron, Farah Dyana A. R., Hassaan Dao, M. Rofiqul Hassan, and Ali Kadhim Lwas. "Investigation of time diversity gain for earth to satellite link using rain rate gain." Bulletin of Electrical Engineering and Informatics 8, no. 3 (September 1, 2019): 951–59. http://dx.doi.org/10.11591/eei.v8i3.1512.

Full text
Abstract:
The utilization of satellites for communication systems has expanded considerably in recent years. C and Ku-bands of frequencies are already congested because of high demand. Future directions of satellite communications are moving towards Ka and V-bands. Earth to satellite communications are moving towards higher frequency bands in future which are more sensitive to environment. Rain causes severe degradation in performances at higher frequency bands specially in tropical regions. Several mitigation techniques are proposed to design reliable system. Time diversity is one of the potential candidate for it. However, time diversity analysis requires measured rain attenuation data. For future high frequency link design those data are not available at most of the places. This thesis proposes a method to utilize 1-minute rain rate to analyze time diversity technique at any desired frequency. This paper proposes a method to utilize 1-minute rain rate to analyse time diversity rain rate gain. In proposed method, it is assumed that rain rate gain with delay can represent rain attenuation gain with delay for same period of time at same location. The characteristics of rain rate and rain attenuation almost same because the attenuation causes due to rain. One year measured rain rate in Malaysia is used to predict rain rate gain. The measured gain at 12.225 GHz signal is compared with that predicted by ITU-R based on rain rate measurement and is found good agreement. Hence it is recommended that the time diversity gain can be predicted using measured rain rate for any desired frequencies.
APA, Harvard, Vancouver, ISO, and other styles
49

Yu, Bocheng, Xingjun Zhang, Francesco Palmieri, Erwan Creignou, and Ilsun You. "A Deep Learning Approach for Maximum Activity Links in D2D Communications." Sensors 19, no. 13 (July 3, 2019): 2941. http://dx.doi.org/10.3390/s19132941.

Full text
Abstract:
Mobile cellular communications are experiencing an exponential growth in traffic load on Long Term Evolution (LTE) eNode B (eNB) components. Such load can be significantly contained by directly sharing content among nearby users through device-to-device (D2D) communications, so that repeated downloads of the same data can be avoided as much as possible. Accordingly, for the purpose of improving the efficiency of content sharing and decreasing the load on the eNB, it is important to maximize the number of simultaneous D2D transmissions. Specially, maximizing the number of D2D links can not only improve spectrum and energy efficiency but can also reduce transmission delay. However, enabling maximum D2D links in a cellular network poses two major challenges. First, the interference between the D2D and cellular communications could critically affect their performance. Second, the minimum quality of service (QoS) requirement of cellular and D2D communication must be guaranteed. Therefore, a selection of active links is critical to gain the maximum number of D2D links. This can be formulated as a classical integer linear programming problem (link scheduling) that is known to be NP-hard. This paper proposes to obtain a set of network features via deep learning for solving this challenging problem. The idea is to optimize the D2D link schedule problem with a deep neural network (DNN). This makes a significant time reduction for delay-sensitive operations, since the computational overhead is mainly spent in the training process of the model. The simulation performed on a randomly generated link schedule problem showed that our algorithm is capable of finding satisfactory D2D link scheduling solutions by reducing computation time up to 90% without significantly affecting their accuracy.
APA, Harvard, Vancouver, ISO, and other styles
50

Gedel, Ibrahim Alhassan, and Nnamdi Nwulu. "Infrastructure Sharing for 5G Deployment: A Techno-Economic Analysis." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 02 (January 26, 2021): 137. http://dx.doi.org/10.3991/ijim.v15i02.16749.

Full text
Abstract:
<p>Fifth-generation wireless (5G) mobile communication technology has been classified as a high wireless standard that is capable of handling internet of things, machine-to-machine, and device-to-device communication. Consequently, there is a need to meet the very sensitive requirements of 5G, which include high coverage density, high speed, high capacity and low end-to-end delay. Of crucial importance is 5G’s passive infrastructure. This paper therefore presents a techno-economic analysis of the current telecommunication infrastructure, as well as investigating and determining the suitable passive infrastructure for 5G technology deployment. The paper outlines all the passive infrastructure elements and proposes a mathematical model to calculate the capital expenditure, operational expenditure, total cost of investment (TCI) or total cost of ownership (TCO) and net present value (NPV). Experiments are performed using market prices from the national communication authority, the mobile network operators and the tower company of Ghana. Furthermore, a sensitivity analysis is performed to identify the variables that increase the TCO or TCI, NPV and return on investment, and to propose the most economical passive infrastructure architecture for easy implementation of 5G technology in Ghana and Africa.</p>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography