... of data relaying failure, a relay mechanism with predefined relaying nodes are introduced and evaluated against the relay mechanism proposed in IEEE 802.15.6 standard A predefined relaying node ... 45 OR-BAN: AnOpportunisticRelayProtocolwithDynamicSchedulinginWirelessBodyAreaNetwork 47 4.1 Review of IEEE 802.15.6 Relay Mechanism 48 4.1.1 Simulation ... This page intentionally left blank Chapter Introduction 1.1 Background of WirelessBodyAreaNetwork A wirelessbodyareanetwork (WBAN) is a network consists of wearable wireless computing devices...
... Gitlin, “Incentive scheduling for cooperative relayin WWAN/WLAN two-hop -relay network, ” in IEEE Wireless Communications and Networking Conference (WCNC ’05), vol 3, pp 1696–1701, New Orleans, ... pp 1126–1131, 2003 [4] J N Laneman and G W Wornell, “Energy-efficient antenna sharing and relaying for wireless networks,” in IEEE Wireless Communications and Networking Conference (WCNC ’00), vol ... framework based on a two-stage dynamic programming algorithm for link scheduling and joint rate and power control inwireless data packet relay networks with fading channels This approach captures...
... Recent technological advances in integrated circuits and wireless communications have led to the development of WirelessBodyArea Networks (WBANs) Wirelessbodyarea networks may be a viable ... M, Fontaine R, Boissy P: Wearable wirelessbodyarea sensor networks for increased telepresence in geriatric telerehabilitation applications IEEE Engineering in Medicine and Biology Magazine 2007, ... patients during real life physical therapy, time and motion measures with estimates of active time (i.e the time during which a patient is active physically) obtained with a wirelessbodyarea network...
... inwireless networks including [11] and [12] were discussed only in the link or/and physical layer Conclusion We proposed a TCP window-size delegation method for downlink TXOP Exchange in WLANs ... = α · Wid /2 in Equation In Figure 8, window-size delegation increases an increasing slope of Wci (x) inan interval of linear to (1 + a)-fold from Wi(x) If we want to control window-size delegation ... scalability of our method with a wirelessnetworkin a WLAN access link is the bottleneck as illustrated in Figure 10 The parameters regarding the wireless link completely follow the standard of IEEE 802.11a,...
... the dominant factor in designing and implanting a wireless sensor network MAC protocols in WSN aim to reduce power consumption and delay Due to vast nature of mechanisms and techniques used in these ... Yuce, Analysis of a multi-access scheme and asynchronous transmit-only UWB for wirelessbodyarea networks, in 31st Annual International Conference of the IEEE Engineering in Medicine and Biology ... wirelessbodyarea sensor network for remote patient monitoring, in 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2008, Vancouver, Canada, August...
... drugs, and these concessions are in turn passed on to the PLHA A pertinent question for NGOs in such settings would be in regard to costs incurred by the organization and the PLHA for HAART/OI management ... Setting Freedom Foundation is an Indian NGO with many centers that provide care and support for PLHA This study was conducted in Bangalore, India (capital of Karnataka state and one of the high-prevalence ... observations concur with findings from other international studies African studies indicated that unaffordability prevents PLHA from taking HAART.[20] (Although Indian generics are available in foreign...
... the relays in the decoding subset and the involved power consumption can be neglected in comparison with that destined to (3), we focus our study in the analysis of the decoding and retransmission ... Berlin, Germany, September 2005 [25] R Bosisio, G Primolevo, O Simeone, and U Spagnolini, “Fair scheduling and orthogonal linear precoding/decoding in broadcast MIMO systems,” in Proceedings ... all, relays belonging to the decoding subset send a signalling message to the destination (i.e., BS) indicating that they are able to relay the message This signalling message can be, for instance,...
... studies the minimum-length scheduling problem only for time-invariant wireless networks Since the wireless channel in reality is time-varying, in the second part of this paper, we Pantelidou and Ephremides ... optimal SINR-based schedulingin multihop wireless networks IEEE/ACM Transactions on Networking, 18(6) (2010) Pantelidou and Ephremides EURASIP Journal on Wireless Communications and Networking 2011, ... link schedulingwith power control and SINR constraints IEEE Trans Inf Theory 52(11) (2006) S Kompella, JE Wieselthier, A Ephremides, A cross-layer approach to optimal wireless link scheduling...
... of Medicine and Medical Sciences, Chemical Engineering Communications, International Journal of Energy and Technology, Progress in Computational Fluid Dynamics, Indian Journal of Pure and Applied ... plate with variable suction and internal heat generation Int J Appl Math and Mech 2008; 4(5), 1-8 Das S S., Satapathy A., Das J K and Panda J.P Mass transfer effects on MHD flow and heat transfer ... porous medium with suction and heat source Natural convection unsteady magnetohydrodynamic mass transfer flow past an infinite vertical porous plate in presence of suction and heat sink was studied...
... household intervention for making plans, setting priorities and evaluating innovations in order to improve household farming and its incomes By those participatory approaches, the SWG, farmers and ... for sustainable use and management of agricultural and natural resources to increase production and incomes in the coastal rainfed areas However, the FARM Programme was soon stopped and farmers ... agricultural land of the village belongs to rainfed lowland and extremely influenced by saline water intrusion in the dry season Rice farming is a major production activity but low yield and low income...
... during each packet transmission and finding out the minimum available bandwidth along the path, and using the information to inject the data into the network accordingly To compute the transmission ... RTO Dyer and Boppana [38] analysed the performance of TCP over three routing protocols which included two on-demand routing protocols named DSR [24] and AODV [32], and an adaptive distance vector ... sending and receiving nodes which are within their interference range This interference has been reported in [8] and causes performance degradation of the network To further clarify these interference...
... Journal on Wireless Communications and Networking [11] A Perrig, R Szewczyk, V Wen, D Culler, and J D Tygar, “SPINS: security protocols for sensor networks,” in Proceedings of the 7th Annual International ... Advances in Cryptology, pp 471–486, Spring, Berlin, Germany, 1992 [9] B Lai, S Kim, and I Verbauwhede, “Scalable session key construction protocol for wireless sensor networks,” in Proceedings ... http://discovery.csc.ncsu.edu/ software/TinyECC/ [6] R Anderson, H Chan, and A Perrig, “Key infection: smart trust for smart dust,” in Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP...
... fusion in distributed sensor networks,” IEEE Transactions on Knowledge and Data Engineering, vol 16, no 6, pp 740–753, 2004 [17] W B Heinzelman, A P Chandrakasan, and H Balakrishnan, An application-specific ... Transactions on Speech and Audio Processing, vol 5, no 3, pp 288–292, 1997 [11] H Yang and B Sikdar, “A protocol for tracking mobile targets using sensor networks,” in Proceedings of the IEEE International ... A Mainwaring, D Culler, J Polastre, R Szewczyk, and J Anderson, Wireless sensor networks for habitat monitoring,” in Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks...
... Wang, V Srinivasan, and K.-C Chaing, “Using mobile relays to prolong the lifetime of wireless sensor networks,” in Proceedings of the 11th Annual International Conference on Mobile Computing and ... density, the network scale, and so on, and it may be worth investigating further (2) The number of the points selected in the square hopping mechanism In our square hopping mechanism, the energy ... IEEE Transactions on Mobile Computing, vol 4, no 5, pp 458–473, 2005 K Akkaya, M Younis, and M Bangad, “Sink repositioning for enhanced performance inwireless sensor networks,” Computer Networks,...
... Balakrishnan, and R Morris, “Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks,” in Proc 7th Annual International Conference on Mobile Computing and Networking ... leading to dynamic modulation scaling (DMS), or by changing the code rate (dynamic code scaling, DCS) From a network point of view, the “lazy scheduling concept translates in trading off bandwidth ... over IP Her main research interests related to mobile and wireless communication networks are adaptive QoS routing inwireless ad hoc networks, personal networks, bodyarea networks, wireless access...
... corresponding to an incoming link, M wavelength multiplexers each corresponding to an outgoing link, and W M × M optical switches each corresponding to a wavelength The incoming signal on a link is ... vector with varying bandwidth levels for different time ranges within the duration of a transfer was evaluated A transport protocol called varying bandwidth transport protocol which works in conjunction ... transport networks A WDM optical mesh network consists of wavelength routing nodes interconnected by point-to-point optical fiber links inan arbitrary topology In these networks, a message can...
... communication with end devices is increasingly wireless From wireless wide area networks (WWAN), wireless metropolitan area networks (WMANs) and wireless local area networks (WLANs) to wireless personal area ... proposed wireless technologies Table 1.1: WirelessNetwork Standards WirelessWirelessWirelessWirelessWireless Networks Wide Area Networks (WWANs) Metropolitan Area Networks (WMAN) Local Area Networks ... life With increasing demand for multimedia transmission and unrestrained roam, all the existing wireless networks should be updated Hence, many standards for wireless networking are now taking...
... Routing Protocols Routing protocols are used to find and maintain routes between source and destination nodes Two main classes of routing protocols are table-based and on-demand protocols In table-based ... model wireless interferences when analyzing the problem of multipath load balancing in a single-channel wirelessnetwork To simplify the analysis, assume that all the nodes in the wirelessnetwork ... in a wirelessnetwork will be smaller than that for a wired network, using the same number of paths In order to analyze the problem of multipath load balancing for a single-channel wireless network, ...
... building km community Communication range Fig 2.6 Standards comparison WAN (Wide Area Network) MAN (Metropolitan Area Network) LAN (Local Area Network) PAN (Persona l Area Network) PAN MAN WAN Standards ... researchers and engineers working in communications and networking with a comprehensive and detailed introduction to game theory, as relevant to wireless and communication networks After introducing ... Mérouane Debbah, Dr Ekram Hossain, Dr Jianwei Huang, Dr Ninoslav Marina, Dr Guan-Ming Su, Dr Yan Sun, Dr Husheng Li, Dr Beibei Wang, Dr Charles Pandana, Dr Zhu Ji, Dr Rong Zheng, Dr Xinbing Wang,...
... access control, networking/routing, transport) of the networkprotocol stack Wireless Personal Area Networks: Performance, Interconnections and Security with IEEE 802.15.4 J Misic and V B Misic ... coordinator of either type As a result, an FFD can talk to any device in the network, be it an RFD or another FFD, whereas an RFD can only talk to an FFD; in fact, an RFD may only associate with ... itself with the cluster, in which case it performs an orphan scan Orphan scanning, which both FFDs and RFDs must be capable of, is performed by switching to the appropriate RF channel and issuing an...