Filters








143 Hits in 5.5 sec

Degradation detection of wireless IP links based on local stationary binomial distribution models

K. Matsumoto, S. Muramatsu, N. Inoue
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.  
The result shows the AI-based method is also effective for the degradation detection of wireless IP links.  ...  A degradation detection problem of link quality in a long-distance 2.4 GHz wireless system is discussed. The time series to be monitored is periodic and non-stationary.  ...  Shinonaga to of KDDI R&D Laboratories, and researchers of Telecommunications Advancement Organization of Japan (TAO) for their encouragement during this work.  ... 
doi:10.1109/saintw.2003.1210176 dblp:conf/saint/MatsumotoMIM03 fatcat:rgwlmegf6jgr3mdqmfovkkzw2y

Modeling TCP SACK performance over wireless channels with semi-reliable ARQ/FEC

Dmitri Moltchanov, Roman Dunaytsev
2009 Wireless networks  
of protocol data units at different layers, the raw data rate of the wireless channel, and the bottleneck link buffer size.  ...  The model allows to evaluate the joint effect of stochastic properties of the wireless channel characteristics and various implementation-specific parameters on TCP performance, which makes it suitable  ...  is given by the binomial distribution.  ... 
doi:10.1007/s11276-009-0231-9 fatcat:uatvjt5t6jddhcutgtoverpl7q

Performance models for wireless channels

Dmitri Moltchanov
2010 Computer Science Review  
The reason is that in wireless networks performance degradation is caused by both incorrect reception of channel symbols at the physical layer and queuing at higher layers.  ...  The aim of this paper is to review performance evaluation models proposed for wireless channels, highlighting their basic ideas, shortcomings, and advantages.  ...  Later, the focus of data-link layer wireless channel modeling was mainly on IEEE 802.11 wireless local area network (WLAN) technologies.  ... 
doi:10.1016/j.cosrev.2010.04.001 fatcat:3exb52jnazf55had23dopocguq

Performance modeling and analysis of window-controlled multimedia flows in wireless/wired networks

Lin Cai, Xuemin Shen, Jon Mark, Jianping Pan
2007 IEEE Transactions on Wireless Communications  
We show analytically the relationship between the sender window size, the wireless link throughput distribution, and the delay distribution.  ...  wireless link.  ...  II presents the system model and the QoS indexes, introduces the TCP-like DCCP protocol, and calculates the wireless link throughput distributions. Based on the system model, in Sec.  ... 
doi:10.1109/twc.2007.348332 fatcat:lczpokor7vcareedq6x6u2h4i4

Link Error Analysis and Modeling for Video Streaming Cross-Layer Design in Mobile Communication Networks

Wolfgang Karner, Olivia Nemethova, Philipp Svoboda, Markus Rupp
2007 ETRI Journal  
This document presents the analysis of the radio link errors based on measurements in live Universal Mobile Telecommunication System (UMTS) radio access networks as well as new link error models originating  ...  Although based on live UMTS network experience, many of the conclusions in this work are of general validity and are not limited to UMTS only.  ...  Acknowledgements We thank Mobilkom Austria AG for technical and financial support of this work.  ... 
doi:10.4218/etrij.07.0107.0102 fatcat:abaw7qz6nnebxejahdsdzaya6m

Cellular traffic offloading onto network-assisted device-to-device connections

Sergey Andreev, Alexander Pyattaev, Kerstin Johnsson, Olga Galinina, Yevgeni Koucheryavy
2014 IEEE Communications Magazine  
Our analysis is based on an advanced system-level simulation toolkit which captures the relevant details of the network environment and on a detailed characterization of dynamic D2D communications based  ...  For example, if D2D peers are non-stationary, the quality of the link may change dramatically over short periods of time, thus making it difficult to guarantee service.  ...  Acknowledgment This work is supported by Intel Corporation, GETA, TISE, and the IoT SRA program of Digile, funded by Tekes. Bibliography  ... 
doi:10.1109/mcom.2014.6807943 fatcat:j7nvoqkbyjaldi6npi2zymwyfm

High-Speed Satellite Mobile Communications: Technologies and Challenges

M. Ibnkahla, Q.M. Rahman, A.I. Sulyman, H.A. Al-Asady, J. Yuan, A. Safwat
2004 Proceedings of the IEEE  
Focusing in particular on the nonlinear downlink channel behavior as well as shadowing and multipath fading, various physical channel models for characterizing the mobile satellite systems are presented  ...  the cellular systems and its QoS frameworks, while achieving, to the extent possible, efficient use of the precious satellite link resources.  ...  Mouftah (University of Ottawa, Ottawa, ON, Canada) for their review.  ... 
doi:10.1109/jproc.2003.821907 fatcat:snyicgivbzfele2b7bq4hvqyuq

Quality of Service Support for Event Detection in Wireless Sensor Networks

Fu Lin, Fei Pei, Dengyi Zhang, Wenhai Li
2011 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing  
I am not sure I possess either of those qualities in  ...  Remerciements It takes a tremendous amount of dedication and perseverance to complete a doctoral dissertation. At least that is what I have been told.  ...  The local decision information may be corrupted through the wireless channel, which may degrade the detection system performance.  ... 
doi:10.1109/wicom.2011.6040377 fatcat:zev7qydmkjgddjagqorodgdyua

Performance Evaluation and Traffic Modeling [chapter]

Hans van den Berg, Thomas M. Bohnert, Orlando Cabral, Dmitri Moltchanov, Dirk Staehle, Fernando Velez
2009 Lecture Notes in Electrical Engineering  
The second part addresses the dynamics on the packet level and focuses on the properties of a single wireless link.  ...  Performance evaluation comes with different facets: the first one is the development of simulation tools and analytic models in order to determine the performance or capacity of mobile and wireless systems  ...  The idea is based on the analytical continuation of the Binomial distribution and the classic M/M/n/0 and M/M/1/k system.  ... 
doi:10.1007/978-0-387-85573-8_3 fatcat:47tdrgbgbrgotefaeg76jodfou

Call admission control for wireless personal communications

Chi Wa Leong, Weihua Zhuang
2003 Computer Communications  
This paper aims at providing a survey on the existing literature related to the works on CAC for future wireless systems, especially in the wireless and combined wireless/wireline domains.  ...  As the concepts of the virtual connection tree (VCT) and cell cluster have been proposed to handle user mobility, both centralized CAC policies for systems using static VCT static cell cluster and distributed  ...  Acknowledgements This work was partially supported by Communications and Information Technology Ontario (CITO) and by Natural Sciences and Engineering Research Council of Canada (NSERC).  ... 
doi:10.1016/s0140-3664(02)00143-3 fatcat:tdh6ebkdmrfm3eucr6wumhop2e

Heterogeneous polydentate mobile chelating node to detect breach in surveillance sensor network

Sudip Misra, Sumit Goswami, Chaynika Taneja, Pushpendu Kar
2021 Security and Privacy  
The conventional wireless sensors, which are small in size and constrained of resources, are used as ground-based sensors or sea-surface sensors and have its known niche area of deployment.  ...  The ground based sensors are typically used to detect trespassing by humans or by wheeled or tracked vehicles. These sensors are classified as "on-route sensors" and "off-route sensors."  ...  Given the apriori probability, distribution of the degrees may be modeled as a Binomial distribution. 50 As N becomes very large and the product NX remains constant, the degree distribution asymptotically  ... 
doi:10.1002/spy2.175 fatcat:vt7hlnozffc2tadybc5dwtfu4a

Traffic characterization of transport level reliable multicasting: Comparison of epidemic and feedback controlled loss recovery

Öznur Özkasap, Mine Çağlar
2006 Computer Networks  
In this study, we focus on traffic characterization of transport level reliable multicasting.  ...  On the other hand, the feedback controlled loss recovery mechanism of SRM triggers self-similarity.  ...  Acknowledgements This work is partially supported by TUBITAK (The Scientific and Technical Research Council of Turkey) and COST (European Cooperation in the field of Scientific and Technical Research)  ... 
doi:10.1016/j.comnet.2005.06.009 fatcat:ppvxxrkfvvcotgkvavsfadr76i

Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing

2008 ChoiceReviews  
Preface We have entered the era of wireless networks. By now, the number of wireless phones has superseded that of wired ones. Wireless LANs are routinely used by millions of nomadic users.  ...  It is now clear that the security solutions devised for wired networks cannot be used as such to protect the wireless ones.  ...  of Chapter 9; and Jun Luo, Jacques Panchard, and Marcin Poturalski who provided detailed feedback on many of the chapters.  ... 
doi:10.5860/choice.46-1524 fatcat:3bkyxjix2vcabcn3f45pqd4vn4

The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network [article]

Stephen F. Bush
1999 arXiv   pre-print
VNC is applied to the configuration of a wireless mobile ATM network.  ...  VNC propagates local prediction results throughout the VNC enhanced system.  ...  In model distribution, individual simulation events are distributed on separate processors.  ... 
arXiv:cs/9905006v1 fatcat:d2yhz5eb65ehppdckzevreqdsm

Client-side routing-agnostic gateway selection for heterogeneous Wireless Mesh Networks

Emmanouil Dimogerontakis, Joao Neto, Roc Meseguer, Leandro Navarro, Luis Veiga
2017 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)  
Citizens develop Wireless Mesh Networks (WMN) in many areas as an alternative or their only way for local interconnection and access to the Internet.  ...  Our proposal was evaluated experimentally with clients and proxies deployed in guifi.net, the largest community wireless network in the world.  ...  The number of nodes learning the desired information at a given round can be modeled through a binomial distribution with p = k/N , where k is the number of nodes that possess such information.  ... 
doi:10.23919/inm.2017.7987301 dblp:conf/im/DimogerontakisN17 fatcat:y6jcejeuxrarxegdnoe3kpnf2q
« Previous Showing results 1 — 15 out of 143 results