scispace - formally typeset
Search or ask a question

Showing papers in "Int'l J. of Communications, Network and System Sciences in 2009"


Journal ArticleDOI
TL;DR: The results demonstrate that the D2D radio, sharing the same resources as the cellular network, can provide higher capacity compared to pure cellular communication where all the data is transmitted through the base station.
Abstract: In this article we propose to facilitate local peer-to-peer communication by a Device-to-Device (D2D) radio that operates as an underlay network to an IMT-Advanced cellular network It is expected that local services may utilize mobile peer-to-peer communication instead of central server based communication for rich multimedia services The main challenge of the underlay radio in a multi-cell environment is to limit the interference to the cellular network while achieving a reasonable link budget for the D2D radio We propose a novel power control mechanism for D2D connections that share cellular uplink resources The mechanism limits the maximum D2D transmit power utilizing cellular power control information of the devices in D2D communication Thereby it enables underlaying D2D communication even in interference-limited networks with full load and without degrading the performance of the cellular network Secondly, we study a single cell scenario consisting of a device communicating with the base station and two devices that communicate with each other The results demonstrate that the D2D radio, sharing the same resources as the cellular network, can provide higher capacity (sum rate) compared to pure cellular communication where all the data is transmitted through the base station

405 citations


Journal ArticleDOI
TL;DR: A novel algorithm for the gateway placement problem in Backbone Wireless Mesh Networks that can guarantee to find a feasible gateway placement satisfying Quality-of-Service (QoS) constraints, including delay constraint, relay load constraint and gateway capacity constraint is presented.
Abstract: This paper presents a novel algorithm for the gateway placement problem in Backbone Wireless Mesh Networks (BWMNs). Different from existing algorithms, the new algorithm incrementally identifies gateways and assigns mesh routers to identified gateways. The new algorithm can guarantee to find a feasible gateway placement satisfying Quality-of-Service (QoS) constraints, including delay constraint, relay load constraint and gateway capacity constraint. Experimental results show that its performance is as good as that of the best of existing algorithms for the gateway placement problem. But, the new algorithm can be used for BWMNs that do not form one connected component, and it is easy to implement and use.

212 citations


Journal ArticleDOI
TL;DR: An incremental network programming mechanism which re programs wireless sensors quickly by transmitting the incremental changes for the new program version using the Rsync algorithm, which was originally made for updating binary files among computationally powerful machines.
Abstract: We present an incremental network programming mechanism which reprograms wireless sensors quickly by transmitting the incremental changes using the Rsync algorithm; we generate the difference of the two program images allowing us to distribute only the key changes. Unlike previous approaches, our design does not assume any prior knowledge of the program code structure and can be applied to any hardware platform. To meet the resource constraints of wireless sensors, we tuned the Rsync algorithm which was originally made for updating binary files among powerful host machines. The sensor node processes the delivery and the decoding of the difference script separately making it easy to extend for multi-hop network programming. We are able to get a speed-up of 9.1 for changing a constant and 2.1 to 2.5 for changing a few lines in the source code.

117 citations


Journal ArticleDOI
TL;DR: In this paper, the authors present a WBAN infrastructure that provides solutions to on-demand, emergency, and normal traffic, and discuss in-body antenna design and low-power MAC protocol for WBANs.
Abstract: Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wireless communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive ambulatory health monitoring for a long period of time, and provide real-time updates of the patient’s status to the physician. They are widely used for ubiquitous healthcare, entertainment, and military applications. This paper reviews the key aspects of WBANs for numerous applications. We present a WBAN infrastructure that provides solutions to on-demand, emergency, and normal traffic. We further discuss in-body antenna design and low-power MAC protocol for a WBAN. In addition, we briefly outline some of the WBAN applications with examples. Our discussion realizes a need for new power-efficient solu-tions towards in-body and on-body sensor networks.

104 citations


Journal ArticleDOI
TL;DR: This article proposes a velocity-adaptive handover scheme that adopts dynamic handover threshold according to different velocity to skip some unnecessary handover stages, reduces handover delay and enhances the network resource utilization.
Abstract: Mobile WiMAX is a wireless networking system based on the IEEE 802.16e standard. In order to support mobile, some kinds of handover schemes must be adopted, and the hard handover is defined as mandatory. Since the data transmission should be paused during the hard handover process, it causes handover delay in mobile communication. The handover delay makes severe degradation in system performance when implemented in real-time applications such as IPTV and VoIP. The existing draft standard considers only the received signal strength when deciding handover initiation. However, the velocity factor also has an important influence on handover initiation and can not be neglected. To deal with these problems, this article proposes a velocity-adaptive handover scheme. This scheme adopts dynamic handover threshold according to different velocity to skip some unnecessary handover stages, reduces handover delay and enhances the network resource utilization. The simulation result and performance analysis validate the efficiency of the proposed scheme.

34 citations


Journal ArticleDOI
TL;DR: This paper compares the use of radio frequency power levels and relative time delays based on ray-tracing as detection methods to estimate the localization of a set of mobile station using the fingerprint technique and shows that more precision can be obtained in the localization process by means of relative delay instead of RF power detection method.
Abstract: This paper proposes efficient techniques that allow the deploying of high precision location applications for indoor scenarios over Wireless Local Area Networks (WLAN). Firstly, we compare the use of radio frequency (RF) power levels and relative time delays based on ray-tracing as detection methods to estimate the localization of a set of mobile station using the fingerprint technique. Detection method play an important role in applications of high frequencies techniques for locations systems based on current and emerging standards such as Wi-Fi (802.11x) and Wi-Max (802.16x). The localization algorithm computes the Eucli- dean distance between the samples of signals received from each unknown position and each fingerprint stored in the database or radio-map obtained using the FASPRI simulation tool. Experimental results show that more precision can be obtained in the localization process by means of relative delay instead of RF power detection method. Secondly, the Euclidean distance has been compared with others similarity distance measures. Finally, an interpolation algorithm between the fingerprinting weighing based on the distances has been implemented in order to eliminate those fingerprints that do not contribute to the improvement in the accuracy. These techniques allow obtaining more precision in the localization of indoor mobile devices over WLAN networks.

23 citations


Journal ArticleDOI
TL;DR: The modeling techniques for advanced photonic transmission systems are described and Simulink is proven to be very effective platform for development of photonic communications systems due its comprehensive blocksets.
Abstract: High speed and ultra-high capacity optical communications have emerged as the essential techniques for backbone global information transmission networks. As the bit rate of the transmission system gets higher and higher 40 Gb/s to 100 Gb/s the modeling of proposed modulation techniques is very important so as to avoid costly practical demonstration. The search for a universal modeling platform for such systems is urgent. Matlab Simulink has become the universal mathematical and modeling tools in most universities and re-search laboratories around the world. This paper thus describes the modeling techniques for advanced photonic transmission systems and Simulink is proven to be very effective platform for development of photonic communications systems due its comprehensive blocksets. The simulation is based mainly on the physical phenomena and understanding of its concepts of communications and photonics. Simulink models are given as examples of various sub-systems of the photonic transmission systems. Some simulated trans-mission performances are demonstrated as examples of final results obtained from Simulink models of the transmission systems.

18 citations


Journal ArticleDOI
TL;DR: The present paper proposes an adaptive strategy for the volatility rate of pheromone trail according to the quality of the solutions found by artificial ants and combines with the setting of other parameters to form a new ACO method.
Abstract: Ant colony optimization (ACO) has been proved to be one of the best performing algorithms for NP-hard problems as TSP. The volatility rate of pheromone trail is one of the main parameters in ACO algorithms. It is usually set experimentally in the literatures for the application of ACO. The present paper first proposes an adaptive strategy for the volatility rate of pheromone trail according to the quality of the solutions found by artificial ants. Second, the strategy is combined with the setting of other parameters to form a new ACO method. Then, the proposed algorithm can be proved to converge to the global optimal solution. Finally, the experimental results of computing traveling salesman problems and film-copy deliverer problems also indicate that the proposed ACO approach is more effective than other ant methods and non-ant methods.

18 citations


Journal ArticleDOI
TL;DR: An adaptive IEEE 802.11 backoff algorithm to improve QoS is de-veloped and tested in simulations as well as in testbed implementation to provide a better QoS performance.
Abstract: A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that can communicate directly over wireless media, without the need for a preconfigured infrastructure. Several approaches have been suggested to improve Quality of Service (QoS) in IEEE 802.11-based MANETs through modifying some of the IEEE 802.11 Medium Access Control (MAC) algorithms, such as the backoff algorithm that is used to control the packets collision aftermath. In this work, an adaptive IEEE 802.11 backoff algorithm to improve QoS is de-veloped and tested in simulations as well as in testbed implementation. While the Binary Exponential Backoff (BEB) algorithm deployed by IEEE 802.11 reacts based on individual packet transmit trials, the new algo-rithm takes the history of successive packet transmit trials into account to provide a better QoS performance. The new algorithm has been tested against the legacy IEEE 802.11 through simulations using QualNet and a Linux-based testbed comprising a number of stations. The performed tests have shown significant im-provements in performance, with up to 33.51% improvement in delay and 7.36% improvement in packet delivery fraction compared to the original IEEE 802.11.

17 citations


Journal ArticleDOI
TL;DR: The aim of this paper is to analyze the rain attenuation impact on the performance of the respective ground station and some cities of Europe are considered to compare this effect on satellite ground station performance.
Abstract: Low Earth Orbits (LEO) satellites are used for public communication and for scientific purposes. These satellites provide opportunities for investigations for which alternative techniques are either difficult or impossible to apply. Ground stations have to be established in order to communicate with such satellites. Usually these satellites communicate with ground stations at S-band. The communication quality depends on the performance of the satellite ground station, in addition to that of satellite. The performance of the satellite ground stations is expressed through Figure of Merit. The aim of this paper is to analyze the rain attenuation impact on the performance of the respective ground station. Rain attenuation depends on geographical location where the satellite ground station is implemented. In order to compare this effect on satellite ground station performance, some cities of Europe are considered. Finally, the rain attenuation impact on the satellite ground station Figure of Merit for the hypothetical satellite ground station installed in Prishtina is analyzed.

15 citations


Journal ArticleDOI
TL;DR: A three-layer policy based architecture which can be deployed to control network resources intelligently and support QoS sensi-tive applications such as real-time voice and video streams along with standard applications in the Internet is developed.
Abstract: The study of Quality of Service (QoS) has become of great importance since the Internet is used to support a wide variety of new services and applications with its legacy structure. Current Internet architecture is based on the Best Effort (BE) model, which attempts to deliver all traffic as soon as possible within the limits of its abilities, but without any guarantee about throughput, delay, packet loss, etc. We develop a three-layer policy based architecture which can be deployed to control network resources intelligently and support QoS sensi-tive applications such as real-time voice and video streams along with standard applications in the Internet. In order to achieve selected QoS parameter values (e.g. loss, delay and PDV) within the bounds set through SLAs for high priority voice traffic in the Internet, we used traffic engineering techniques and policy based routing supported by Border Gateway Protocol (BGP). Use of prototype and simulations validates function-ality of our architecture.

Journal ArticleDOI
TL;DR: This paper proposes new versions of the original OLSR protocol based on a new mobility parameter, in the goal to enhance and adapt it in the presence of the mobility, with new three criterions for MPRs selection.
Abstract: The performance of a Mobile Ad hoc Network (MANET) is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. The Optimized Link State Routing (OLSR) protocol is a one key of the proactive routing protocols for MANETs. It is based on the multi-point relays (MPRs) technique to reach all nodes in the network with a limited number of broadcasts. In this paper, we propose new versions of the original OLSR protocol based on a new mobility parameter, in the goal to enhance and adapt it in the presence of the mobility. For this objective we define new three criterions for MPRs selection. The first criteria take for selection, just the mobility of nodes at one-hop. The two others criterions are based on both mobility of nodes at one-hop and two-hops.

Journal ArticleDOI
TL;DR: A framework for managing mobility triggers that can deal with a greater variety of triggering events, which may originate from any component of the node’s protocol stack as well as mobility management entities within the network is presented.
Abstract: Modern mobile devices have several network interfaces and can run various network applications. In order to remain always best connected, events need to be communicated through the entire protocol stack in an efficient manner. Current implementations can handle only a handful of low level events that may trigger actions for mobility management, such as signal strength indicators and cell load. In this paper, we present a framework for managing mobility triggers that can deal with a greater variety of triggering events, which may originate from any component of the node’s protocol stack as well as mobility management entities within the network. We explain the main concepts that govern our trigger management framework and discuss its architecture which aims at operating in a richer mobility management framework, enabling the deployment of new applications and services. We address several implementation issues, such as, event collection and processing, storage, and trigger dissemination, and introduce a real implementation for commodity mobile devices. We review our testbed environment and provide experimental results showcasing a lossless streaming video session handover between a laptop and a PDA using mobility and sensor-driven orientation triggers. Moreover, we empirically evaluate and analyze the performance of our prototype. We position our work and implementation within the Ambient Networks architecture and common prototype, centring in particular on the use of policies to steer operation. Finally, we outline current and future work items.

Journal ArticleDOI
TL;DR: Several methods to enhance the generality in WSNs are explained and the suitability of these methods in centralized and de-centralized management scenarios is evaluated.
Abstract: Ignoring the generality in the design of Wireless Sensor Networks (WSNs) applications limits their benefits. Furthermore, the possibilities of future extension and adaptation are also restricted. In this paper, several methods to enhance the generality in WSNs are explained. We have further evaluated the suitability of these methods in centralized and de-centralized management scenarios.

Journal ArticleDOI
TL;DR: Simulation results show that the proposed load-balancing schemes significantly enhance the network performance and outperform one of the most prominent ad hoc routing protocols AODV and previously proposed load balanced ad hoc routed protocols including DLAR and LARA in terms of average delay, packet delivery fraction and jitter.
Abstract: Properties of mobile ad hoc networks (MANET) like dynamic topology and decentralized connectivity make routing a challenging task. Moreover, overloaded nodes may deplete their energy in forwarding others pack-ets resulting in unstable network and performance degradation. In this paper we propose load-balancing schemes that distribute the traffic on the basis of three important metrics -residual battery capacity, average interface queue length and hop count along with the associated weight values. It helps to achieve load bal-ancing and to extend the entire network lifetime. Simulation results show that the proposed load-balancing schemes significantly enhance the network performance and outperform one of the most prominent ad hoc routing protocols AODV and previously proposed load balanced ad hoc routing protocols including DLAR and LARA in terms of average delay, packet delivery fraction and jitter.

Journal ArticleDOI
TL;DR: An Energy Aware Clustered-Based Multipath Routing (EACMR), which forms several clusters, finds energy aware node-disjoint multiple routes from a source to destination and increases the network life time by using optimal routes.
Abstract: With the advance of wireless communication technologies, small-size and high-performance computing and communication devices are increasingly used in daily life. After the success of second generation mobile system, more interest was started in wireless communications. A Mobile Ad hoc Network (MANET) is a wireless network without any fixed infrastructure or centralized control; it contains mobile nodes that are connected dynamically in an arbitrary manner. The Mobile Ad hoc Networks are essentially suitable when infrastructure is not present or difficult or costly to setup or when network setup is to be done quickly within a short period, they are very attractive for tactical communication in the military and rescue missions. They are also expected to play an important role in the civilian for as convention centers, conferences, and elec-tronic classrooms. The clustering is an important research area in mobile ad hoc networks because it im-proves the performance of flexibility and scalability when network size is huge with high mobility. All mo-bile nodes operate on battery power; hence, the power consumption becomes an important issue in Mobile Ad hoc Network. In this article we proposed an Energy Aware Clustered-Based Multipath Routing (EACMR), which forms several clusters, finds energy aware node-disjoint multiple routes from a source to destination and increases the network life time by using optimal routes.

Journal ArticleDOI
TL;DR: The proposed architecture provides FTTX high bandwidth which enables to give out 10Gbit/s per end-user and physical layer modifications are used in the model to provide satisfactory solution for the bandwidth needs.
Abstract: We are developing a novel technology for the next generation optical access network. The proposed architecture provides FTTX high bandwidth which enables to give out 10Gbit/s per end-user. Increasing the subscribers in the future will cause massive congestion in the data transferred along the optical network. Our solution is using the wavelength division multiplexing PON (CWDM-PON) technology to achieve high bandwidth and enormous data transmission at the network access. Physical layer modifications are used in our model to provide satisfactory solution for the bandwidth needs. Thus high data rates can be achieved throughout the network using low cost technologies. Framework estimations are evaluated to prove the intended model success and reliability. Our argument that: this modification will submit a wide bandwidth suitable for the future Internet.

Journal ArticleDOI
TL;DR: Results show that U-BOTH transmission technique can effectively reduce the bit error rate under the path loss model, and the corresponding ranging and local-ization algorithms can accurately compute moving object locations in coal mine environments.
Abstract: Localization has many important applications in wireless sensor networks, such as object searching and tracking, remote navigation, location based routing etc. The distance measurements have been based on a variety of technologies, such as acoustic, infrared, and UWB (ultra-wide band) media for localization pur-poses. In this paper, we propose UWB-based communication protocols for distance estimation and location calculation, namely a new UWB coding method, called U-BOTH (UWB based on Orthogonal Variable Spreading Factor and Time Hopping), an ALOHA-type channel access method and a message exchange protocol to collect location information. U-BOTH is based on IEEE 802.15.4a that was designed for WPANs (wireless personal area networks) using the UWB technology. We place our system in coal mine environ-ments, and derive the corresponding UWB path loss model in order to apply the maximum likelihood esti-mation (MLE) method to compute the distances to the reference sensors using the RSSI information, and to estimate the coordinate of the moving sensor using least squares (LS) method. The performance of the sys-tem is validated using theoretic analysis and simulations. Results show that U-BOTH transmission technique can effectively reduce the bit error rate under the path loss model, and the corresponding ranging and local-ization algorithms can accurately compute moving object locations in coal mine environments.

Journal ArticleDOI
TL;DR: IP Flow is established which is used to select proper features for DDoS detection and can optimize the network traffic simultaneously with defending against DDoS attacks, thus eliminating efficiently the global burst of traffic arising from normal traffic.
Abstract: Distributed Denial-of-Service (DDoS) attacks against public web servers are increasingly common. Countering DDoS attacks are becoming ever more challenging with the vast resources and techniques increasingly available to attackers. It is impossible for the victim servers to work on the individual level of on-going traffic flows. In this paper, we establish IP Flow which is used to select proper features for DDoS detection. The IP flow statistics is used to allocate the weights for traffic routing by routers. Our system protects servers from DDoS attacks without strong client authentication or allowing an attacker with partial connectivity information to repeatedly disrupt communications. The new algorithm is thus proposed to get efficiently maximum throughput by the traffic filtering, and its feasibility and validity have been verified in a real network circumstance. The experiment shows that it is with high average detection and with low false alarm and miss alarm. Moreover, it can optimize the network traffic simultaneously with defending against DDoS attacks, thus eliminating efficiently the global burst of traffic arising from normal traffic.

Journal ArticleDOI
TL;DR: A novel trust model MSL-TM based on the Multinomial Subjective Logic is proposed, which uses multinomial ratings and Dirichlet distribution to compute the expectation of the subjective opinion and accordingly draws the peer’s reputation value and risk value, and finally gets the trust value.
Abstract: In order to deal with the problems in P2P systems such as unreliability of the Service, security risk and attacks caused by malicious peers, a novel trust model MSL-TM based on the Multinomial Subjective Logic is proposed. The model uses multinomial ratings and Dirichlet distribution to compute the expectation of the subjective opinion and accordingly draws the peer’s reputation value and risk value, and finally gets the trust value. The decay of time, rating credibility and the risk value are introduced to reflect the recent behaviors of the peers and make the system more sensitive to malicious acts. Finally, the effectiveness and feasibility of the model is illustrated by the simulation experiment designed with peersim.

Journal ArticleDOI
TL;DR: The BER performance for an optimal circular 16-QAM constellation is theoretically derived and applied in wavelet based OFDM system in additive white Gaussian noise channel and results have met the theoretical calculations.
Abstract: The BER performance for an optimal circular 16-QAM constellation is theoretically derived and applied in wavelet based OFDM system in additive white Gaussian noise channel. Signal point constellations have been discussed in much literature. An optimal circular 16-QAM is developed. The calculation of the BER is based on the four types of the decision boundaries. Each decision boundary is determined based on the space distance d following the pdf Gaussian distribution with respect to the in-phase and quadrature components nI and nQ with the assumption that they are statistically independent to each other. The BER analysis for other circular M-ary QAM is also analyzed. The system is then applied to wavelet based OFDM. The wavelet transform is considered because it offers a better spectral containment feature compared to conventional OFDM using Fourier transform. The circular schemes are slightly better than the square schemes in most SNR values. All simulation results have met the theoretical calculations. When applying to wavelet based OFDM, the circular modulation scheme has also performed slightly less errors as compared to the square modulation scheme.

Journal ArticleDOI
TL;DR: The architecture and implementation of a scalable network traffic moni-toring and analysis system in use at the Obafemi Awolowo University, IleIfe, Nigeria is described and how this system can be replicated in another environment is described.
Abstract: The lack of current network dynamics studies that evaluate the effects of new application and protocol deployment or long-term studies that observe the effect of incremental changes on the Internet, and the change in the overall stability of the Internet under various conditions and threats has made network monitoring challenging. A good understanding of the nature and type of network traffic is the key to solving congestion problems. In this paper we describe the architecture and implementation of a scalable network traffic moni-toring and analysis system. The gigabit interface on the monitoring system was configured to capture network traffic and the Multi Router Traffic Grapher (MRTG) and Webalizer produces graphical and detailed traffic analysis. This system is in use at the Obafemi Awolowo University, IleIfe, Nigeria; we describe how this system can be replicated in another environment.

Journal ArticleDOI
TL;DR: This paper surveyed some MAC protocols for WSN and compared their design tradeoffs to provide a foundation for future MAC design, and to identify important design issues that allow us to improve the overall performances.
Abstract: One of the major constraints in wireless sensor networks (WSNs) is power consumption. In recent years, a lot of efforts have been put into the design of medium access control (MAC) protocols for WSN, in order to reduce energy consumption and enhance the network’s lifetime. In this paper, we surveyed some MAC protocols for WSN and compared their design tradeoffs. The goal is to provide a foundation for future MAC design, and to identify important design issues that allow us to improve the overall performances.

Journal ArticleDOI
TL;DR: In this paper, a hierarchical routing protocol is proposed for flat routing in wireless sensor networks, which can conserve significant energy in its setup phase as well as during its steady state data dissemination phase.
Abstract: Energy conservation is an essential and critical requirement for a wireless sensor network with battery oper-ated nodes intended for long term operations. Prior work has described different approaches to routing protocol designs that achieve energy efficiency in a wireless sensor network. Several of these works involve variations of mote-to-mote routing (flat routing) while some make use of leader nodes in clusters to perform routing (hierarchical routing). A key question then arises as to how the performance of an energy-aware, flat routing protocol compare with that of one based on hierarchical routing. This paper demonstrates a hierarchical routing protocol design that can conserve significant energy in its setup phase as well as during its steady state data dissemination phase. This paper describes the design of this protocol and evaluates its performance against existing energy-aware flat routing protocols. Simulation results show that it exhibits competitive performance against the flat routing protocols.

Journal ArticleDOI
TL;DR: To fully utilize the diversity of multi-radio, a new parallel transmission method for wireless mesh network is proposed which uses the radio diversity to transmit the packets on different radios simultaneously.
Abstract: To fully utilize the diversity of multi-radio, a new parallel transmission method for wireless mesh network is proposed. Compared with conventional packet transmission which follows “one flow on one radio”, it uses the radio diversity to transmit the packets on different radios simultaneously. Three components are presented to achieve parallel-transmission, which are control module, selection module and schedule module. A localized selecting algorithm selects the right radios based on the quality of wireless links. Two kinds of distributed scheduling algorithms are implemented to transmit packets on the selected radios. Finally, a parallel-adaptive routing metric is presented. Simulation results by NS2 show that this parallel-transmission scheme could enhance the average throughput of network by more than 10%.

Journal ArticleDOI
TL;DR: The proposed design reduces the power dissipation of an original Viterbi decoder design by 68.82% and a speed of 145 MHz is achieved.
Abstract: A high speed and low power Viterbi decoder architecture design based on deep pipelined, clock gating and toggle filtering has been presented in this paper. The Add-Compare-Select (ACS) and Trace Back (TB) units and its sub circuits of the decoder have been operated in deep pipelined manner to achieve high transmission rate. The Power dissipation analysis is also investigated and compared with the existing results. The techniques that have been employed in our low-power design are clock-gating and toggle filtering. The synthesized circuits are placed and routed in the standard cell design environment and implemented on a Xilinx XC2VP2fg256-6 FPGA device. Power estimation obtained through gate level simulations indicated that the proposed design reduces the power dissipation of an original Viterbi decoder design by 68.82% and a speed of 145 MHz is achieved.

Journal ArticleDOI
TL;DR: A flexible and fairness-oriented packet scheduling approach for 3GPP UTRAN long term evolution (LTE) type packet radio systems, building on the ordinary proportional fair (PF) scheduling principle and channel quality indicator (CQI) feedback is proposed.
Abstract: In this paper, we propose a flexible and fairness-oriented packet scheduling approach for 3GPP UTRAN long term evolution (LTE) type packet radio systems, building on the ordinary proportional fair (PF) scheduling principle and channel quality indicator (CQI) feedback. Special emphasis is also put on practical feedback reporting mechanisms, including the effects of mobile measurement and estimation errors, reporting delays, and CQI quantization and compression. The performance of the overall scheduling and feedback re-porting process is investigated in details, in terms of cell throughput, coverage and resource allocation fairness, by using extensive quasistatic cellular system simulations in practical OFDMA system environment with frequency reuse of 1. The performance simulations show that by using the proposed modified PF ap-proach, significant coverage improvements in the order of 50% can be obtained at the expense of only 10-15% throughput loss, for all reduced feedback reporting schemes. This reflects highly improved fairness in the radio resource management (RRM) compared to other existing schedulers, without essentially com-promising the cell capacity. Furthermore, we demonstrate the improved functionality increase in radio re-source management for UE’s utilizing multi-antenna diversity receivers.

Journal ArticleDOI
TL;DR: This study is important as performance analyses of cellular system, in presence of handoff, will be important for future generation wireless networks, for example, WiMAX, UMTS.
Abstract: Performance evaluation of handover algorithms has been studied for mobile cellular network. Effects of averaging, hysteresis margin and shadow fading are investigated for different handoff algorithms. Probability of outage, handover delay and average number of handovers are considered as performance metrics. Different handover algorithms considered here are based on relative signal strength with hysteresis, relative signal strength with hysteresis and threshold, absolute signal strength and combined relative and absolute signal strength. Both analytical and simulation methods have been used in this paper. This study is important as performance analyses of cellular system, in presence of handoff, will be important for future generation wireless networks, for example, WiMAX, UMTS.

Journal ArticleDOI
TL;DR: A rank-one updated method for solving symmetric nonlinear equations is proposed and the updated matrix is positive definite whatever line search technique is used.
Abstract: In this paper, a rank-one updated method for solving symmetric nonlinear equations is proposed. This method possesses some features: 1) The updated matrix is positive definite whatever line search technique is used; 2) The search direction is descent for the norm function; 3) The global convergence of the given method is established under reasonable conditions. Numerical results show that the presented method is interesting.

Journal ArticleDOI
TL;DR: A novel switch architecture for packet contention resolution in synchronous OPS network employing the packet circulation in FDLs in a synchronized manner is proposed employing packet queuing control to estimate the blocking probability for the incoming traffic.
Abstract: Packet contention is a key issue in optical packet switch (OPS) networks and finds a viable solution by including optical buffering techniques incorporating fiber delay lines (FDLs) in the switch architecture. The present paper proposes a novel switch architecture for packet contention resolution in synchronous OPS network employing the packet circulation in FDLs in a synchronized manner. A mathematical model for the proposed switch architecture is developed employing packet queuing control to estimate the blocking probability for the incoming traffic. The switch performance is analyzed with a suitable contention resolution algorithm through the computer simulation. The simulation results substantiate the proposed model for the switch architecture.