Decentralized PHY/MAC techniques for the uplink of Multi-Packet Reception (MPR) schemes are of great interest in future wireless communicationsystems (e.g. IEEE 802.11ax). In MPR schemes the average number of success...
详细信息
ISBN:
(纸本)9781538620700
Decentralized PHY/MAC techniques for the uplink of Multi-Packet Reception (MPR) schemes are of great interest in future wireless communicationsystems (e.g. IEEE 802.11ax). In MPR schemes the average number of successful received packets depends on the radio propagation effects, the number of nodes simultaneously transmitting and the capture threshold that characterizes the PHY-layer MPR technology. In this paper we adopt a MPR capture model capable of describing the average number of successful packets simultaneously received. the capture model is then used in an optimal reservation-based medium access control (MAC), designed to operate in a decentralized way through a random access policy. this work describes the PHY/MAC cross-layer design, as well as the rationale required to understand its optimality. While the main objective of the proposed MAC is to achieve the optimal number of simultaneous transmissions that maximize the PHY-layer performance, a cost due to the MAC reservation period must also be considered in the optimization process. A model of the PHY/MAC performance is derived, which allows the optimization of the parameters that regulate the nodes' random access. Different simulation results are described and compared with numerical results obtained withthe proposed PHY/MAC model. the paper ends up discussing possible solutions to implement the proposed methodology in practical wireless networks formed by a high number of competing nodes.
Doppler assisted wireless communication (DAWC) is a narrow band communication technique that leverages a rotating drum conformal antenna for interference mitigation. the different multi-path components that impinge on...
详细信息
ISBN:
(数字)9781728137063
ISBN:
(纸本)9781728137070
Doppler assisted wireless communication (DAWC) is a narrow band communication technique that leverages a rotating drum conformal antenna for interference mitigation. the different multi-path components that impinge on this rotating drum antenna undergo different Doppler shifts giving rise to different spectral characteristics for different multi-path components. the rotation speed of the antenna could be adjusted such that the interfering multi-path components, that has reasonable azimuthal separation to the desired multi-path components, are filtered out by the receiver pulse shaping filter with no extra effort. In this paper, we study the effectiveness of DAWC to suppress co-channel interference (CCI) from a large number of co-channel users, which is a prevailing condition in highly dense cellular communicationsystems like 5G. We further discuss several key challenges associated with DAWC, including the inter-symbol interference (ISI) induced by Doppler effect.
Future communicationnetworks are expected to be highly automated, disburdening human operators of their most complex tasks. However, while first powerful and automated network analysis tools are emerging, existing to...
详细信息
ISBN:
(纸本)9781450360807
Future communicationnetworks are expected to be highly automated, disburdening human operators of their most complex tasks. However, while first powerful and automated network analysis tools are emerging, existing tools provide only limited (and inefficient) support of reasoning about failure scenarios. We present P-Rex, a fast what-if analysis tool, that allows us to test important reachability and policy-compliance properties even under an arbitrary number of failures, in polynomial-time, i.e., without enumerating all failure scenarios (the usual approach today, if supported at all). P-Rex targets networks based on Multiprotocol Label Switching (MPLS) and its Segment Routing (SR) extension and comes with an expressive query language based on regular expressions. It takes into account the actual router tables, and is hence well-suited for debugging. We also report on an industrial case study and demonstrate that P-Rex supports rich queries, performing what-if analyses in less than 70 minutes in most cases, in a 24-router network with over 100,000 MPLS forwarding rules.
In the literature, wireless powered communicationnetworks (WPCNs) are typically assumed to employ dynamic time division multiple access (TDMA), such that the rate and duration for information transmission of each ene...
详细信息
ISBN:
(数字)9781728108780
ISBN:
(纸本)9781728108797
In the literature, wireless powered communicationnetworks (WPCNs) are typically assumed to employ dynamic time division multiple access (TDMA), such that the rate and duration for information transmission of each energy harvesting user (EHU) is adjusted in each TDMA frame. Such implementations are fairly complex, so, in this paper, we propose a simple model for a WPCN employing a static TDMA, where each EHU employs fixed rate transmission over fixed time slot duration. Specifically, we develop a simple communication scheme that maximizes the network throughput by proper selection of the duration of the radio frequency energy broadcasts by the base station (BS), and the optimal information rate and optimal transmission duration of each EHU. the performance of such system depends only on the average gains of the channels between the BS and each EHU, which can be estimated more cost effectively than the instantaneous channel state information.
the proceedings contain 61 papers. the topics discussed include: a prototype of the mobile stethoscope for telemedical application;accuracy of marker location identification for investigation into mechanics of ball;al...
the proceedings contain 61 papers. the topics discussed include: a prototype of the mobile stethoscope for telemedical application;accuracy of marker location identification for investigation into mechanics of ball;algorithms of automated formulation of the operability condition of complex technical systems;analysis of metal defects by distributed cumulative histogram;application of fractional order transfer function with zero and pole in approximation of electromechanical systems high order objects;application of MEMS sensors for the automation of a laboratory stand for the measurement of the flow resistance of porous materials;M2M communication protocol for low bandwidth MEMS sensor networks;and computer investigation of the process of thermoelastic energy dissipation in the electroconductive hollow cylindrical sensor under the radio impulse action.
this paper deals withthe design of protocols for 5G-and-beyond wireless networks. In particular, it considers a Next Generation RAN (NG-RAN), where the Base Band Unit (BBU) functions are split across a Central Unit (...
详细信息
ISBN:
(纸本)9783903176140
this paper deals withthe design of protocols for 5G-and-beyond wireless networks. In particular, it considers a Next Generation RAN (NG-RAN), where the Base Band Unit (BBU) functions are split across a Central Unit (CU) and a Distributed Unit (DU). this paper proposes the use of Programming Protocol independent Packet Parsers (P4) based switches between the CU and DU for processing packets exchanged between the two. We demonstrate the smart hand-over (SMARthO) scheme for a mobile User Equipment (UE) that traverses a known fixed path. the idea is to perform the resource allocation in subsequent macro-cells in advance of the user's movement, by having the P4 switch spoof the behaviour of the UE. Based on an implementation using Mininet and P4BM software switches, it is seen that the proposed method leads to around 18% and 25% reduction in handover time, for two- and three-handover sequences, respectively.
Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. Our paper addresses the issue how cryptographic ...
详细信息
ISBN:
(纸本)9781538654705
Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. Our paper addresses the issue how cryptographic link keys between communicating sensor nodes can be continuously re-secured even in presence of an attacker who can read the memory of captured nodes. Distributed sensor systems enable us to use two different approaches to link key (re-)establishment - secrecy amplification and key extraction from radio channel fading. A secrecy amplification protocol lets a group of neighboring nodes cooperate together to re-secure previously compromised link keys using the non-compromised paths, and previous research showed the ability of secrecy amplification protocols to improve the security of a network from 50% of compromised link keys to 90% of secure keys. Key extraction then exploits radio channel properties to generate secret bits shared between two radio-enabled devices. We propose to combine secrecy amplification and key extraction into a dynamic protocol, where every node will dynamically decide what approach provides a greater benefit, considering the probability of getting the link key re-secured and the resources available. In principle, the more standard traffic messages are exchanged on a given link, the more beneficiary is the usage of key extractions. And less busy links then rely on secrecy amplification(1).
In network security, there are many applications and techniques that can be used to maintain targets of high-level security such as confidentiality, integrity, availability, and nonrepudiation for safe communication b...
详细信息
ISBN:
(数字)9781728152608
ISBN:
(纸本)9781728152615
In network security, there are many applications and techniques that can be used to maintain targets of high-level security such as confidentiality, integrity, availability, and nonrepudiation for safe communication between different sources. this can be done by supporting networks with security systems to thwart any chances of exploitations by any attacker. Intrusion Detection System (IDS) is one of the major systems as it is capable of monitoring all network traffics (ingoing and outgoing) and performs some analysis and inspection to evaluate the behavior of such traffics. IDS can block all suspicious activities that are trying to breach any network based on policies that are demanded by a system administrator. Traditional IDS has some limits and does not provide a complete solution for some kind of problems. IDS searches for potential abnormal activities on the network traffic and sometimes succeeds to find some vulnerability which may result in compromising the network. We, therefore, suggest an efficient application in this paper of Machine Learning (ML) based IDS.
the Licensed Assisted Access (LAA) is shown as a required technology to avoid overcrowding of the licensed bands by the increasing cellular traffic. Proposed by 3GPP, LAA uses a Listen Before Talk (LBT) and backoff me...
详细信息
the paper addresses an algorithm of functioning of an intrusion detection and prevention system module, based on the principles of disguise and modification of the information system parameters. An implementation of a...
详细信息
暂无评论