Loading...
Search for: wireless-telecommunication-systems
0.009 seconds
Total 184 records

    Toward 5G: Fiwi enhanced lte-a hetnets with reliable low-latency fiber backhaul sharing and wifi offloading

    , Article IEEE/ACM Transactions on Networking ; Volume 25, Issue 2 , 2017 , Pages 690-707 ; 10636692 (ISSN) Beyranvand, H ; Levesque, M ; Maier, M ; Salehi, J. A ; Verikoukis, C ; Tipper, D ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    To cope with the unprecedented growth of mobile data traffic, we investigate the performance gains obtained from unifying coverage-centric 4G mobile networks and capacity-centric fiber-wireless (FiWi) broadband access networks based on data-centric Ethernet technologies with resulting fiber backhaul sharing and WiFi offloading capabilities. Despite recent progress on backhaul-aware 4G studies with capacity-limited backhaul links, the performance-limiting impact of backhaul latency and reliability has not been examined in sufficient detail previously. In this paper, we evaluate the maximum aggregate throughput, offloading efficiency, and in particular, the delay performance of FiWi enhanced... 

    Analytical evaluation of saturation throughput of a cognitive wlan overlaid on a time-scheduled ofdma network

    , Article IEEE Transactions on Mobile Computing ; Volume 16, Issue 3 , 2017 , Pages 634-647 ; 15361233 (ISSN) Rahimzadeh, P ; Ashtiani, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In this paper, we analyze the saturation throughput of a cognitive WLAN overlaid on a primary OFDMA TDD network (e.g., LTE or WiMAX). In this scenario, after the contention among the secondary nodes, the winner node transmits its data packet in the empty resource blocks (RBs) of downlink and uplink subframes of the primary network. Regarding the OFDMA structure as well as time-scheduled resources in the primary network, the time duration of opportunities for the secondary network does not follow simple exponential on-off pattern. To model the dynamic behavior of opportunities for secondary nodes as well as contentions to exploit the opportunities, we propose an analytical model comprised of... 

    Optimum low complexity filter bank for generalized orthogonal frequency division multiplexing

    , Article Eurasip Journal on Wireless Communications and Networking ; Volume 2018, Issue 1 , 2018 ; 16871472 (ISSN) Abbaszadeh, M. H ; Khalaj, B. H ; Haghbin, A ; Sharif University of Technology
    Springer International Publishing  2018
    Abstract
    Generalized frequency division multiplexing (GFDM) is one of the multicarrier modulation candidates proposed for the 5th generation of wireless networks. Among GFDM linear receivers, GFDM MMSE receiver achieves the best error performance for multipath fading channels at the cost of high numerical complexity. Hence, the combination of GFDM match filter (MF) receiver and double-side successive interference cancellation (DSIC) method is used instead. However, there is a significant gap between the error performance of GFDM MMSE and DSIC/MF receivers for the case of employing modern channel coding. Recently, we have proposed a new multicarrier scheme based on GFDM architecture called generalized... 

    Interference management in D2D-enabled heterogeneous cellular networks using matching theory

    , Article IEEE Transactions on Mobile Computing ; 2018 ; 15361233 (ISSN) Shamaei, S ; Bayat, S ; Hemmatyar, A. M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    To support the increasing data traffic demand in wireless communications networks, a multi-tier architecture that consists of multiple small cells is adopted in traditional (macro) cellular networks. Nevertheless, due to the expansion of various wireless devices and services, there is still a need to increase the network capacity in new generation networks such as 5G. Hence, the integration of Device-to-Device (D2D) communication as a promising technology with heterogeneous networks has been proposed. This integration not only increases network capacity but also improves spectral efficiency and alleviates the traffic load of base stations. However, the co/cross-tier interferences between D2D... 

    On medium chemical reaction in diffusion-based molecular communication: a two-way relaying example

    , Article IEEE Transactions on Communications ; 2018 ; 00906778 (ISSN) Farahnak Ghazani, M ; Aminian, G ; Mirmohseni, M ; Gohari, A ; Nasiri Kenari, M ; Sharif University of Technology
    Abstract
    Chemical reactions are a prominent feature of molecular communication (MC) systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and react with each other (physical-layer computation). We propose the use of chemical reactions for the following purposes: (i) to reduce signal-dependent observation noise of receivers by reducing the signal density, (ii) to realize molecular physical-layer network coding (molecular PNC) by... 

    Efficiency enhancement of time-modulated arrays with optimized switching sequences

    , Article IEEE Transactions on Antennas and Propagation ; Volume 66, Issue 7 , July , 2018 , Pages 3411-3420 ; 0018926X (ISSN) Mazaheri, M. H ; Fakharzadeh, M ; Akbari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    The conventional time-modulated arrays (TMAs) have a low radiation efficiency, since each antenna turns off at specific time slots. In this paper, first, the efficiency of TMA is investigated analytically. Next, the optimized switching sequences are proposed to enhance the radiation efficiency of a specific sideband, while preserving the level of the other sidebands. The practical hardware limitations are considered in the switching sequence design. Moreover, a low-cost flexible eight-element printed dipole array operating at 1.2-1.4 GHz is implemented to verify the proposed algorithms. The measured radiation patterns indicate that by applying the proposed sequences, the TMA efficiency... 

    Cell selection for load balancing in heterogeneous networks

    , Article Wireless Personal Communications ; Volume 101, Issue 1 , 2018 , Pages 305-323 ; 09296212 (ISSN) Aghazadeh, Y ; Kalbkhani, H ; Shayesteh, M. G ; Solouk, V ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    The vision of advanced long-term evolution (LTE-A) project is set to ultimate increase of network capacity in heterogeneous networks (HetNets). In HetNets with small cell configuration, a considerable majority of user devices is eventually connected to the macrocell base station (MBS), while small base stations (BSs), such as femtocell access points (FAPs), are still without any user. This results in unbalanced load and reduces the data rate of macrocell user equipment (MUE). In this paper, a method is proposed for load balancing among FAPs, while desired throughput is achieved. The proposed method uses the estimated received signal strength from different BSs and adjusted pilot signals.... 

    Low complexity resource allocation in the relay channels with energy harvesting transmitters

    , Article Ad Hoc Networks ; Volume 77 , 2018 , Pages 108-118 ; 15708705 (ISSN) Mohassel Feghhi, M ; Abbasfar, A ; Mirmohseni, M ; Sharif University of Technology
    Elsevier B.V  2018
    Abstract
    Energy Harvesting (EH) is a novel technique to prolong the lifetime of the wireless Ad-hoc and sensor networks with replenishable nodes. In this sense, it has emerged as a promising technique for Green Communications. On the other hand, cooperative communication with the help of relay nodes improves the performance of wireless communication networks. In this paper, we investigate the cooperation in EH nodes. We consider the optimal power and rate allocation in the full-duplex Gaussian relay channel in which source and relay can harvest energy from their environments. In our model, the energy arrivals at the source and the relay are general stochastic processes with known EH times and amounts... 

    A secure and efficient authentication technique for vehicular Ad-Hoc networks

    , Article IEEE Transactions on Vehicular Technology ; Volume 67, Issue 6 , 2018 , Pages 5409-5423 ; 00189545 (ISSN) Rajabzadeh Asaar, M ; Salmasizadeh, M ; Susilo, W ; Majidi, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Vehicular ad-hoc networks (VANETs) are under active development, thanks in part to recent advances in wireless communication and networking technologies. The most fundamental part in VANETs is to enable message authentications between vehicles and roadside units. Message authentication using proxy vehicles has been proposed to reduce the computational overhead of roadside units significantly. In this message authentication scheme, proxy vehicles that verify multiple messages at the same time improve roadside units' efficiency. In this paper, first we show that the only proxy-based authentication scheme (PBAS) presented for this goal by Liu et al. cannot guarantee message authenticity, and... 

    Capacity-outage joint analysis and optimal power allocation for wireless body area networks

    , Article IEEE Systems Journal ; 2018 ; 19328184 (ISSN) Razavi, A ; Jahed, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Wireless body area networks (WBANs) are characterized by short-range wireless communication between inherently resource-limited sensors that operate in the vicinity of the human body for recording certain physiological signals. One of the main limitations of WBANs is in terms of their available power. Since the nodes are typically battery-driven, an efficient power transmission is essential to guarantee long-lasting communications among nodes without the need for frequent battery replacement or charging. In this study, aiming to improve the WBAN performance, we first investigate the power allocation problem by choosing the ergodic capacity and the outage probability as the desired metrics.... 

    Routing, data gathering, and neighbor discovery in delay-tolerant wireless sensor networks

    , Article 23rd IEEE International Parallel and Distributed Processing Symposium, IPDPS 2009, Rome, 23 May 2009 through 29 May 2009 ; 2009 ; 9781424437504 (ISBN) Nayebi, A ; Sarbazi Azad, H ; Karlsson, G ; IEEE Computer Society Technical Committee on Parallel Processing ; Sharif University of Technology
    2009
    Abstract
    This paper investigates a class of mobile wireless sensor networks that are not connected most of the times. The characteristics of these networks is inherited from both delay tolerate networks (DTN) and wireless sensor networks. First, delay-tolerant wireless sensor networks (DTWSN) are introduced. Then, three main problems in the design space of these networks are discussed: Routing, data gathering, and neighbor discovery. An approach is proposed for deployment of DTWSNs based on the traditional opportunistic broadcast in delay tolerant networks with on-off periods. The delay and the throughput of the routing scheme were investigated in the DTN literature. However, the energy consumption... 

    PPMN: a resilient public peer-to-peer mesh network of IEEE802.16 users

    , Article 2009 International Conference on Signal Processing Systems, ICSPS 2009, Singapore, 15 May 2009 through 17 May 2009 ; 2009 , Pages 488-492 ; 9780769536545 (ISBN) Kavianfar, A ; Habibi, J ; Sharif University of Technology
    2009
    Abstract
    In these days, IEEE802.16 protocol is being developed and in the next years, 802.16 modems will be used in every house to connect to the Internet through base-stations in both urban and rural areas. Since user bandwidth for connection to the Internet is limited, a large fraction of each modem's bandwidth is not used. In this paper, we propose an architecture to construct a public peer-to-peer mesh network using the non-utilized bandwidth of independent 802.16 users. The architecture is composed of a routing algorithm, a forwarding incentive mechanism, and a security-resiliency scheme. Design challenges are discussed in each case. © 2009 IEEE  

    A new power allocation scheme for amplify and forward incremental relaying

    , Article 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2009, Perugia, 21 June 2009 through 24 June 2009 ; 2009 , Pages 494-498 ; 9781424436965 (ISBN) Tabataba, F. S ; Sadeghi, P ; Pakravan, M. R ; Sharif University of Technology
    2009
    Abstract
    In this paper, we present a novel power allocation scheme for amplify and forward incremental relaying (IR) systems with the aim to minimize the overall outage probability at the destination. In our problem formulation, we take into account the outage-dependent activation of the relay when writing the power constraint. We provide a simple closed-form solution to the IR power allocation problem that is based on high signal-to-noise (SNR) approximation of the outage probability assuming maximum ratio combining (MRC) at the destination. We investigate the effectiveness of the proposed solution by comparing the achieved outage probabilities with those obtained through global numerical search. We... 

    Optimal DG placement in distribution systems using cost/worth analysis

    , Article World Academy of Science, Engineering and Technology ; Volume 37 , 2009 , Pages 746-753 ; 2010376X (ISSN) Ahmadigorji, M ; Abbaspour, A ; Rajabi Ghahnavieh, A ; Fotuhi Firuzabad, M ; Sharif University of Technology
    2009
    Abstract
    DG application has received increasing attention during recent years. The impact of DG on various aspects of distribution system operation, such as reliability and energy loss, depend highly on DG location in distribution feeder. Optimal DG placement is an important subject which has not been fully discussed yet. This paper presents an optimization method to determine optimal DG placement, based on a cost/worth analysis approach. This method considers technical and economical factors such as energy loss, load point reliability indices and DG costs, and particularly, portability of DG. The proposed method is applied to a test system and the impacts of different parameters such as load growth... 

    An upper bound on the performance of non-repetitive flooding over CSMA in wireless ad-hoc networks

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Shah Mansouri, H ; Pakravan, M. R ; Sharif University of Technology
    2009
    Abstract
    Although flooding and its variants are widely deployed for broadcasting by different applications, there are limited results on a complete and comprehensive analytical framework describing their behavior in general cases. We have previously published results which provide an upper bound for the performance of flooding when flooded packets have the highest serving priority. In this paper, using a different and simpler approach, we develop an analytical framework for analysis of flooding in general cases where flooding packets do not receive any special priority treatment in the network. The analysis is performed for a static multi-hop ad hoc wireless network using CSMA as its MAC layer. The... 

    The CBK-Neigh protocol for symmetric topology control in ad hoc networks

    , Article Proceedings - 2009 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM 2009, 18 June 2009 through 23 June 2009, Athens, Glyfada ; 2009 , Pages 588-595 ; 9780769536699 (ISBN) Jalalinia, F ; Ghasemi, S ; Sharif University of Technology
    2009
    Abstract
    In this paper, an approach for topology control has been proposed which make use of distance estimation and angle of arrival (AoA) estimation techniques. Every node in the network tries to keep the number of its neighbors to 4 or 3. These neighbors have been selected from the nearest neighbors of each node and are located in different four quarters of axis. The angular difference between these neighbors is between a minimum and maximum value. This protocol guarantees connectivity on the communication graph with high probability and enforces symmetry on the resulting communication graph, thereby easing the operation of higher level protocols. The performance of the protocol when nodes are... 

    A new fractional call admission control scheme in integrated cellular network

    , Article Proceedings of 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, 7 June 2009 through 9 June 2009, Windsor, ON ; 2009 , Pages 332-337 ; 9781424433551 (ISBN) Mortazavi Far, L ; Beigy, H ; Sharif University of Technology
    2009
    Abstract
    This paper presents a new model of call admission control which consists of a few key elements for protecting the network in different conditions of workload in a manner that, calls blocking /dropping are kept under desired level. This model consists of two traffic classes of voice and data. In order to give a priority to handoff call over new call, some parameters in this model are adjusted in a manner that handoff dropping is reduced to the least probability in the target cell and the adjacent cells. Some channels are reserved for voice and data calls in each cell to guarantee the quality of service requirements in the network. Limited fractional guard channel is used to have an optimized... 

    Lightweight secure IP address auto-configuration based on VASM

    , Article Proceedings - International Conference on Advanced Information Networking and Applications, AINA, 26 May 2009 through 29 May 2009, Bradford ; 2009 , Pages 176-180 ; 1550445X (ISSN); 9780769536392 (ISBN) Tajamolian, M ; Taghiloo, M ; Tajamolian, M ; Sharif University of Technology
    2009
    Abstract
    Mobile ad hoc networks allow to create very dynamic communication systems, which are independent from any fixed infrastructure. One of the most important issues regarding the management of an ad hoc network is the configuration of the system according to the way users move. Since a centralized control structure does not exist, we need to determine how the IP addresses must be assigned to the nodes in the network. In this paper we add a security mechanism to VASM protocol based on zero knowledge approach. A hash function has very low running time. So this so this scheme is very light-weight. The VASM protocol uses coordinate value of point in main address sheet for generating addresses. The... 

    Analytical evaluation of average delay and maximum stable throughput along a typical two-way street for vehicular ad hoc networks in sparse situations

    , Article Computer Communications ; Volume 32, Issue 16 , 2009 , Pages 1768-1780 ; 01403664 (ISSN) Javanmard, A ; Ashtiani, F ; Sharif University of Technology
    2009
    Abstract
    Intermittent connectivity is an intrinsic feature of vehicular ad hoc networks (VANETs) in sparse situations. This type of network is in fact an example of delay and disruption tolerant networks (DTNs). In this paper, we focus on a typical two-way street and analytically evaluate the maximum stable throughput and the average delay for packet forwarding along the street. To this end, we map the mobility patterns of the vehicles with different speeds onto suitable parameters of a BCMP queueing network and derive the location density of vehicles. Then, we employ another queueing network in order to model opportunistic multi-hop packet forwarding along the street with respect to the... 

    Energy-efficient speed routing protocol for wireless sensor networks

    , Article 2009 5th Advanced International Conference on Telecommunications, AICT 2009, Venice, Mestre, 24 May 2009 through 28 May 2009 ; 2009 , Pages 267-271 ; 9780769536118 (ISBN) Kordafshari, M. S ; Pourkabirian, A ; Faez, K ; Rahimabadi, A. M ; IARIA ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose an approach for routing in SPEED protocol considering residual energy in routing decisions. Due to the limited energy of a sensor node, energyefficient routing is a very important issue in sensor networks. This approach finds energy-efficient paths for delayconstrained data in real-time traffic. The SPEED protocol does not consider any energy metric in its routing. In our approach, routing is based on a weight function, which is a combination of the three factors: Delay, Energy & Speed. Here, the node with the greatest value in the weight function is to be selected as the next hop forwarding. We increase the network lifetime by considering energy metric in routing...