WorldWideScience

Sample records for voice network access

  1. Delay analysis of an integrated voice and data access protocol with collision detection for multimedia satellite networks

    Science.gov (United States)

    Poon, Charles C. K.; Suda, Tatsuya

    1992-03-01

    The novel multiple-access scheme for multimedia satellite networks presented is based on a combination of FDMA and TDMA, integrating both circuit and packet-switching techniques. While the circuit-switching method is used to transmit such stream-type traffic as real-time voice communications, packet-switching is used to transmit such 'bursty' traffic as interactive data. A ground radio network is assumed for control signaling; the tone sense multiple access/partial collision detection scheme is implemented on this network to enhance the integrated access scheme's performance.

  2. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  3. Transferring Voice using SMS over GSM Network

    CERN Document Server

    Khan, Muhammad Fahad

    2011-01-01

    The paper presents a methodology of transmitting voice in SMS (Short Message Service) over GSM network. Usually SMS contents are text based and limited to 140 bytes. It supports national and international roaming, but also supported by other telecommunication such as TDMA (Time Division Multiple Access), CDMA (Code Division Multiple Access) as well. It can sent/ receive simultaneously with other services. Such features make it favorable for this methodology. For this an application is developed using J2ME platform which is supported by all mobile phones in the world. This algorithm's test is conducted on N95 having Symbian Operating System (OS).

  4. Voice Service Support in Mobile Ad Hoc Networks

    CERN Document Server

    Jiang, Hai; Poor, H Vincent; Zhuang, Weihua

    2007-01-01

    Mobile ad hoc networks are expected to support voice traffic. The requirement for small delay and jitter of voice traffic poses a significant challenge for medium access control (MAC) in such networks. User mobility makes it more complex due to the associated dynamic path attenuation. In this paper, a MAC scheme for mobile ad hoc networks supporting voice traffic is proposed. With the aid of a low-power probe prior to DATA transmissions, resource reservation is achieved in a distributed manner, thus leading to small delay and jitter. The proposed scheme can automatically adapt to dynamic path attenuation in a mobile environment. Simulation results demonstrate the effectiveness of the proposed scheme.

  5. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  6. Space-Based Voice over IP Networks

    Science.gov (United States)

    Nguyen, Sam P.; Okino, Clayton; Walsh, William; Clare, Loren

    2007-01-01

    In human space exploration missions (e.g. a return to the Moon and for future missions to Mars), there will be a need to provide voice communications services. In this work we focus on the performance of Voice over IP (VoIP) techniques applied to space networks, where long range latencies, simplex links, and significant bit error rates occur. Link layer and network layer overhead issues are examined. Finally, we provide some discussion on issues related to voice conferencing in the space network environment.

  7. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  8. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially with the d...... and to the discruption caused by the user mobility during the session. Voice over IP in Wireless Hetetrogeneous Networks thus investigates and proposes cross-layer techniques for realizing time-efficient control mechanisms for VoIP: signaling, mobility and security.......The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  9. Voice communications over packet radio networks

    Science.gov (United States)

    Seah, M. M.

    1985-03-01

    The use of packet virtual circuit technique for voice communications in military radio networks was investigated. The work was concerned with various aspects of networking which include network modeling, communications techniques, traffic analysis and network control. An attempt has been made to develop a simple yet efficient time slot assignment algorithm . This was analyzed under a variety of slot depths and networks topologies using computer simulation. The Erlang' B results were used to provide more insight into the channel characteristics of the packet radio networks. The capabilities of implementing TDMA/CDMA hybrid schemes in the system were scrutinized. A method to estimate the transmission capacity of the inter-node links was found. We demonstrate its effectiveness in controlling local congestion by computer simulation. Graphical results were presented to highlight the behavior of the proposed packet radio networks. We concluded that an appropriate link weight function would provide efficient and reliable network services.

  10. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially......IP communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality...

  11. Delay related issues in integrated voice and data networks

    Science.gov (United States)

    Gruber, J. G.

    1981-06-01

    The described investigation is concerned with the problem of transmitting voice with data in a computer communications network. The motivations for considering mixed voice and data traffic in such a shared network environment include the advent of new voice related applications with the technology now existing to economically support them, and the desire to plan for and design future integrated networks for reasons of economy and flexibility. Attention is given to the problem of variable delays in a shared network environment handling voice traffic. Previous work in packetized voice, as well as various approaches to integrated voice and data transmission, are reviewed. These approaches may be regarded as enhanced versions of circuit, packet, and hybrid switching. The impact of network interfacing and delay considerations for voice traffic is discussed.

  12. The Study of MSADQ/CDMA Protocol in Voice/Data Integration Packet Networks

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new packet medium access protocol, namely, minislot signalingaccess based on distributed queues(MSADQ/CDMA), is proposed in voice and data intergration CDMA networks. The MSADQ protocol is based on distributed queues and collision resolution algorithm. Through proper management of the PN codes, the number of random competition collision reduces greatly, the multiple access interference (MAI) decreases. It has several special access signaling channels to carry the voice and data access request. Each slot is devided into several control minislots (CMSs), in which the Data Terminals (DT) or Voice Terminals (VT) transmit their request. According to the voice and data traffic character, the signaling access structure is proposed. The code assign rules and queue managing rules are also proposed to ensure the QoS requirement of each traffic. Comparisions with other three protocol are developed by simulation, which shows that MSADQ/CDMA protocol occupies less PN codes, but still has very good performance.

  13. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  14. Accessing antiretroviral therapy for children: Caregivers' voices

    Directory of Open Access Journals (Sweden)

    Margaret (Maggie Williams

    2016-12-01

    Full Text Available Despite efforts to scale up access to antiretroviral therapy (ART, particularly at primary health care (PHC facilities, antiretroviral therapy (ART continues to be out of reach for many human immunodeficiency virus (HIV-positive children in sub-Saharan Africa. In resource limited settings decentralisation of ART is required to scale up access to essential medication. Traditionally, paediatric HIV care has been provided in tertiary care facilities which have better human and material resources, but limited accessibility in terms of distance for caregivers of HIV-positive children. The focus of this article is on the experiences of caregivers whilst accessing ART for HIV-positive children at PHC (decentralised care facilities in Nelson Mandela Bay (NMB in the Eastern Cape, South Africa. A qualitative, explorative, descriptive and contextual research design was used. The target population comprised caregivers of HIV-positive children. Data were collected by means of in-depth individual interviews, which were thematically analysed. Guba's model was used to ensure trustworthiness. Barriers to accessing ART at PHC clinics for HIV-positive children included personal issues, negative experiences, lack of support and finance, stigma and discrimination. The researchers recommend standardised programmes be developed and implemented in PHC clinics to assist in providing treatment, care and support for HIV-positive children.

  15. Metropolitan Access Network

    Directory of Open Access Journals (Sweden)

    Slavko Šarić

    2003-11-01

    Full Text Available The optical fibre is the highest quality transmission mediumfor broadband services, and therefore the new access cablenetwork has to be realized to the greatest extent and as closeas possible to the subscriber by means of the optical fibre cables,in accordance with the possibilities of the telecommunicationoperator. The development of digital technology in commutations,supported by the increasingly powerful systems of processorcontrol, development of optical communications andtransport technologies in the framework of SDH concepts, arereflected on the access telecommunication networks of the urbanareas. Urban areas are the most profitable regions in telecommunications.In planning of urban optical networks the fact should betaken as a guideline that only a well-organised urban networkwill allow high quality of service provision of the leased cablesto the end points of business customers.Business customers have greater requirements for the networkreliability, flexibility and maintainability, for the sake ofundisturbed telecommunication traffic.The optical medium based technology- FITL (fiber in theloop, provides almost limitless upgrading of the system regardingthe transmission bandwidths, as well as adaptation to allthe future customers' requirements.Considering the increase in the price of installing the coppercables, the prices of electronics and optical components arecontinuously falling. The application of the optical medium isincreasing and becoming more cost-effective, and due to higherreliability of the optical transmission systems the maintenancecosts are reduced.

  16. Voice and Data Network of Convergence and the Application of Voice over IP

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, J.M.

    2000-11-01

    This paper looks at emerging technologies for converging voice and data networks and telephony transport over a data network using Internet Protocols. Considered are the benefits and drivers for this convergence. The paper describes these new technologies, how they are being used, and their application to Sandia.

  17. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  18. S3: Smart Session Selection for Voice Communications in Next Generation Wireless Network

    Science.gov (United States)

    Chung, Tein-Yaw; Yuan, Fong-Ching; Chen, Yung-Mu; Liu, Baw-Jhiune

    Selecting transparently a proper network connection for voice communication will be a fundamental requirement in future multimode heterogeneous wireless network. This paper presented a smart session selection (S3) scheme to meet this requirement. Instead of selecting a best access network as in conventional Always Best Connected (ABC) paradigm, S3 enables users to select a best network connection, which consists of source and destination access network pair, to satisfy quality constraint and users' preference. To support S3, we develop a user profile to specify network connection priority. Meanwhile IP multimedia subsystem (IMS) is extended to make smart decision for users. Finally, Analytic Hierarchy Process (AHP) is used to recommend a network connection with assistance of user profile and IMS signaling. An example is illustrated to show that AHP can successfully select a good network connection that fulfills the requirement of users.

  19. Messaging and Voice Conferencing through Wi-Fi Network

    OpenAIRE

    Miss. Nayana H S,; Dr. M C Padma

    2014-01-01

    The use of Wi-Fi enabled android phones as IP phones, and their communication within a local wireless LAN is discussed in this paper. This proposed model is a form of telecommunication that allows exchange of data and voice via Wi-Fi network. The phones, which are Wi-Fi enabled and have android operating system, can be used to communicate with each other through the Wi-Fi communication channel. Proposed system incorporates messaging (Text and voice), conferencing (group conver...

  20. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  1. Subsystems for future access networks

    DEFF Research Database (Denmark)

    Caballero Jambrina, Antonio; Tafur Monroy, Idelfonso; Zibar, Darko;

    We present a brief overview of the research activities in the European project “Pan-European Photonics Task Force: Integrating Europe’s Expertise on Photonic Subsystems” (EURO-FOS); an in particular in the area of optical Metro and Access Networks.......We present a brief overview of the research activities in the European project “Pan-European Photonics Task Force: Integrating Europe’s Expertise on Photonic Subsystems” (EURO-FOS); an in particular in the area of optical Metro and Access Networks....

  2. Voice Communications Over Packet Radio Networks.

    Science.gov (United States)

    1985-03-01

    standpoint, the major difference between telephone networks and packet radio networks concerns the availabilty of time slots over each frame. The...mentioning that simulations require large amounts of detailed knowledge about the structure of the system and about patterns of usage . Simulation is...proposed time slot algorithm adopts. Moreover, the proposed time slot scheme may give more uniform usage of time slots in each time frame. In addition

  3. Electrolarynx Voice Recognition Utilizing Pulse Coupled Neural Network

    Directory of Open Access Journals (Sweden)

    Fatchul Arifin

    2010-08-01

    Full Text Available The laryngectomies patient has no ability to speak normally because their vocal chords have been removed. The easiest option for the patient to speak again is by using electrolarynx speech. This tool is placed on the lower chin. Vibration of the neck while speaking is used to produce sound. Meanwhile, the technology of "voice recognition" has been growing very rapidly. It is expected that the technology of "voice recognition" can also be used by laryngectomies patients who use electrolarynx.This paper describes a system for electrolarynx speech recognition. Two main parts of the system are feature extraction and pattern recognition. The Pulse Coupled Neural Network – PCNN is used to extract the feature and characteristic of electrolarynx speech. Varying of β (one of PCNN parameter also was conducted. Multi layer perceptron is used to recognize the sound patterns. There are two kinds of recognition conducted in this paper: speech recognition and speaker recognition. The speech recognition recognizes specific speech from every people. Meanwhile, speaker recognition recognizes specific speech from specific person. The system ran well. The "electrolarynx speech recognition" has been tested by recognizing of “A” and "not A" voice. The results showed that the system had 94.4% validation. Meanwhile, the electrolarynx speaker recognition has been tested by recognizing of “saya” voice from some different speakers. The results showed that the system had 92.2% validation. Meanwhile, the best β parameter of PCNN for electrolarynx recognition is 3.

  4. Cost Vs. Redundancy in FTTH Access Networks

    DEFF Research Database (Denmark)

    Haraldsson, Gustav Helgi; Pedersen, Jens Myrup

    2006-01-01

    This paper studies the feasibility of offering redundancy within the access network by planning an access network using the ear topology. This proposed network is compared to a traditional tree structured access network. The basic idea of the ear topology is to offer two individual fibers from se...

  5. Messaging and Voice Conferencing through Wi-Fi Network

    Directory of Open Access Journals (Sweden)

    Miss. Nayana H S,

    2014-06-01

    Full Text Available The use of Wi-Fi enabled android phones as IP phones, and their communication within a local wireless LAN is discussed in this paper. This proposed model is a form of telecommunication that allows exchange of data and voice via Wi-Fi network. The phones, which are Wi-Fi enabled and have android operating system, can be used to communicate with each other through the Wi-Fi communication channel. Proposed system incorporates messaging (Text and voice, conferencing (group conversation and file sharing services through the Wi-Fi network. When users enters the Wi-Fi network, proposed system displays the list of other users they are having this system on their mobile in that network. Using the system services, user can communicate with other user by exchanging packets to IP address of destination user, with the condition that both communicating person should be in same Wi-Fi network. The proposed system allows communication through Wi-Fi which requires neither any internet connectivity nor any service from the service providers. In this paper, the proposed system shall eliminate the usage of service providers for short-distance calls and decreases the cost that gets accrued in the consumer’s monthly bill. This system allows free conferencing, file sharing and messaging services within the Wi-Fi network that will greatly reduce the communication cost in large organizations.

  6. Information network supports open access

    Energy Technology Data Exchange (ETDEWEB)

    Cauley, G.; Hirsch, P.; Vojdani, A. [Electric Power Research Inst., Palo Alto, CA (United States); Saxton, T.; Cleveland, F.

    1996-07-01

    On March 29, 1995, the US Federal Energy Regulatory Commission (FERC) issued a notice of proposed rulemaking (NOPR) aimed at promoting wholesale competition through nondiscriminatory open transmission access. Industry working groups were formed to define the content of the transmission services information to be communicated over an electronic network and to define the requirements of the network itself.FERC issued final rules on April 24, 1996. At this writing, the transmission services information network (TSIN) is just completing design, and initial implementation should be in place by November 1, 1996. There will be about 20--35 nodes representing all public transmission systems in the US. The network will use the Internet as a base, allowing access by all authorized users anywhere in the world. The tools used will be based on the standard Internet tools such as World-Wide Web (Web) browsers. This provides a low-cost, high-function, consistent interconnected network to provide information to all transmission customers. The network will have good performance and be secure. It will allow transmission customers to have available information on available transmission capacity, cost and tariffs for transmission capacity, and cost of ancillary services. This article outlines the content of the industry reports and the FERC rulings.

  7. Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dae-Young Kim

    2017-01-01

    Full Text Available Recent advances in information communication technology and software have enabled mobile terminals to employ various capabilities as a smartphone. They adopt multiple interfaces for wireless communication and run as a portable computer. Mobile services are also transferred from voice to data. Mobile terminals can access Internet for data services anytime anywhere. By using location-based information, improved mobile services are enabled in heterogeneous networks. In the mobile service environment, it is required that mobile terminals should efficiently use wireless network resources. In addition, because video stream becomes a major service among the data services of mobile terminals in heterogeneous networks, the necessity of the efficient network access control for heterogeneous wireless networks is raised as an important topic. That is, quality of services of the location-based video stream is determined by the network access control. Therefore, this paper proposes a novel network access control in the heterogeneous wireless networks. The proposed method estimates the network status with Naïve Bayesian Classifier and performs network access control according to the estimated network status. Thus, it improves data transmission efficiency to satisfy the quality of services. The efficiency of the proposed method is validated through the extensive computer simulation.

  8. Voice activity detection based on deep neural networks and Viterbi

    Science.gov (United States)

    Bai, Liang; Zhang, Zhen; Hu, Jun

    2017-09-01

    Voice Activity Detection (VAD) is important in speech processing. In the applications, the systems usually need to separate speech/non-speech parts, so that only the speech part can be dealt with. How to improve the performances of VAD in different noisy environments is an important issue in speech processing. Deep Neural network, which proves its efficiency in speech recognition, has been widely used in recent years. This paper studies the present typical VAD algorithms, and presents a new VAD algorithm based on deep neural networks and Viterbi algorithm. The result demonstrates the effectiveness of the deep neural network with Viterbi used in VAD. In addition, it shows the flexibility and the real-time performance of the algorithms.

  9. Adaptive Multiplexing Scheme for Voice Flow Transmission Across Best-Effort IP Networks

    OpenAIRE

    Trad, Abdelbasset; Afifi, Hossam

    2003-01-01

    We investigate the performance limitations in the case of a large number of long distance voice over IP calls originating from different sources and transported through a best-effort IP network. We focus on the potentially negative effects of total protocol header overhead, which is twice the voice payload generated by the high-compression audio codecs. These negative effects range from the inefficient use of bandwidth to the network congestion caused by the large number of short voice packet...

  10. Voice Quality Estimation in Combined Radio-VoIP Networks for Dispatching Systems

    Directory of Open Access Journals (Sweden)

    Jiri Vodrazka

    2016-01-01

    Full Text Available The voice quality modelling assessment and planning field is deeply and widely theoretically and practically mastered for common voice communication systems, especially for the public fixed and mobile telephone networks including Next Generation Networks (NGN - internet protocol based networks. This article seeks to contribute voice quality modelling assessment and planning for dispatching communication systems based on Internet Protocol (IP and private radio networks. The network plan, correction in E-model calculation and default values for the model are presented and discussed.

  11. Formal Specification and Validation of Secure Connection Establishment in a Generic Access Network Scenario

    DEFF Research Database (Denmark)

    Fleischer, Paul; Kristensen, Lars Michael

    2008-01-01

    The Generic Access Network (GAN) architecture is defined by the 3rd Generation Partnership Project (3GPP), and allows telephone services, such as SMS and voice-calls, to be accessed via generic IP networks. The main usage of this is to allow mobile phones to use WiFi in addition to the usual GSM...... network. The GAN specification relies on the Internet Protocol Security layer (IPSec) and the Internet Key Exchange protocol (IKEv2) to provide encryption across IP networks, and thus avoid compromising the security of the telephone networks. The detailed usage of these two Internet protocols (IPSec...

  12. Study the Effect of Base Frequency on the Performance of WiMAX Network Carrying Voice

    Directory of Open Access Journals (Sweden)

    Bassam F.Gumaidah

    2012-08-01

    Full Text Available WiMAX is stand for Worldwide Interoperability for Microwave Access. (WiMAX embodies the IEEE 802.16 family of standards that provide wireless broadband access to residential and commercial Internet subscribers. This technology takes the first position among the technologies these days. WiMAX can offers or adds some qualifications to the wireless technologies like high data rate, long coverage area and offers several types Quality of service to the customers. The long coverage area of WiMAX coming from the high transmit power and from the architecture of the network which is similar to mobile network, wherethe WiMAX base station architecture, is similar to GSM base station, need tower and can be sectorized,etc. One of the feature of WiMAX devises is the wide range of base frequency from 2 to 66 GHz, on both licensed and free licensed spectrum [1] .In this paper the effect of base frequency on the WiMAX network performance will be studied .we concern on three famous frequency (2.4,3.5 and 5.8GHz [2],which most of the WiMAX devises work on them. OPNET MODELER is a simulation program used to simulate the work of networks with different values of base frequency. We use the modeler to study network of 12 WiMAX workstation connect and call each other by one WiMAX base station during 300 second. The results show that the higher the base frequency the higher the Signal to Noise Ratio ,that lead to high throughput ,low packet end to end delay, finally lead to high mean opinion score (MOS which mean good quality of voice. In the same time the results show that increase in the coverage area will lead to drop in Signal to Noise Ratio and MOS which will effect negatively in the quality of voice.

  13. Investigating an accessible and usable epub book via VoiceOver: a case study

    OpenAIRE

    Bartalesi Lenzi, Valentina; Leporini, Barbara

    2013-01-01

    In this paper we investigate the opportunities and limitations for blind and visually impaired people when reading an ePub document via Voice-Over for mobile devices. The ePub format is based on an (x)html structure; organizing and handling its source code is therefore very important in order to guarantee satisfactory interaction with the eBook. In this work we analyze the main accessibility and usability issues when interacting with an ePub document via VoiceOver, in order to evaluate possib...

  14. Energy Consumption of Wireless Network Access Points

    OpenAIRE

    ANDRADE MORELLI, SEBASTIÁN; RUIZ SANCHEZ, EDUARDO; GRANELL ROMERO, EMILIO; Lloret, Jaime

    2013-01-01

    2nd International Conference on Green Communications and Networking, GreeNets 2012; Gandia; Spain; 25 October 2012 through 26 October 2012 The development of low cost technology based on IEEE 802.11 standard permits to build telecommunication networks at low cost, allowing providing Internet access in rural areas in developing countries. The lack of access to the electrical grid is a problem when the network is being developed in rural areas, so that wireless access points should operate u...

  15. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....

  16. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....

  17. Modeling and analysis of voice and data in cognitive radio networks

    CERN Document Server

    Gunawardena, Subodha

    2014-01-01

    This Springer Brief investigates the voice and elastic/interactive data service support over cognitive radio networks (CRNs), in terms of their delay requirements. The increased demand for wireless communication conflicts with the scarcity of the radio spectrum, but CRNS allow for more efficient use of the networks. The authors review packet level delay requirements of the voice service and session level delay requirements of the elastic/interactive data services, particularly constant-rate and on-o? voice tra?c capacities in CRNs with centralized and distributed network coordination. Some gen

  18. Analisis Performansi VOIP (Voice Over Internet Protocol Pada Jaringan Wimax (Worldwide Interoperability For Microwave Access Di Wilayah DKI Jakarta

    Directory of Open Access Journals (Sweden)

    Widhiatmoko Widhiatmoko

    2011-05-01

    Full Text Available VoIP is a system that uses the Internet network to transmit voice packets from one place to another using IP protocols intermediaries. With VoIP technology can be much cheaper call charges, especially for communicating overseas because of voice and data using the same network ie the Internet network. VoIP is a service that is very susceptible to delay while the existing access network is currently providing a significant delay for VoIP. One alternative network that can be used to overcome these problems is to use WiMAX technology because WiMAX can provide speed data services up to 70 Mbps.From the research,  results of one way delay, jitter and packet loss still at the value recommended by ITU-T, which is the maximum value of one way delay measurement is 159.87 ms, for jitter 7.52 ms and for packet loss is 3.175%. The one way delay and packet loss from the measurement used to find the MOS score which is the value for quality of VoIP. MOS value range obtained from the calculation of 3.6 to 4.2, which means VoIP feasible to apply to the WiMAX network. The maximum value can reach 2.8 Mbps throughput to 0.575 Mbps for downlink and uplink. From the research also found that the SQI values that are above the standard value of the device will provide a high SNR value, and the higher SQI values then its RSSI value is also bigger.

  19. The Design of Passive Optical Networking+Ethernet over Coaxial Cable Access Networking and Video-on-Demand Services Carrying

    Science.gov (United States)

    Ji, Wei

    2013-07-01

    Video on demand is a very attractive service used for entertainment, education, and other purposes. The design of passive optical networking+Ethernet over coaxial cable accessing and a home gateway system is proposed. The network integrates the passive optical networking and Ethernet over coaxial cable to provide high dedicated bandwidth for the metropolitan video-on-demand services. Using digital video broadcasting, IP television protocol, unicasting, and broadcasting mechanisms maximizes the system throughput. The home gateway finishes radio frequency signal receiving and provides three kinds of interfaces for high-definition video, voice, and data, which achieves triple-play and wire/wireless access synchronously.

  20. Need for accessible infertility care in Ghana: the patients’ voice

    Science.gov (United States)

    Osei, Nana Yaw

    2016-01-01

    Abstract According to the Ghana Statistical Service (GSS) infertility and childlessness are the most important reason for divorce in Ghana. The traditional Ghanaian society is pro-natal and voluntary childlessness is very uncommon. Patient groups are almost non-existent in Sub-Saharan Africa, aggravating the situation of childless couples. Due to the lack of enough and affordable high quality infertility services, many women resort to traditional healing, witchcraft and spiritual mediation. Considering the severe sociocultural and economic consequences of childlessness, especially for women, there is an urgent need for accessible and affordable high quality infertility care in Ghana. PMID:27909570

  1. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    CERN Document Server

    Yu, Hong

    2012-01-01

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  2. An Efficient Channel Access Scheme for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Syed Asad Hussain

    2017-01-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs are getting more popularity due to the potential Intelligent Transport Systems (ITS technology. It provides many efficient network services such as safety warnings (collision warning, entertainment (video and voice, maps based guidance, and emergency information. VANETs most commonly use Road Side Units (RSUs and Vehicle-to-Vehicle (V2V referred to as Vehicle-to-Infrastructure (V2I mode for data accessing. IEEE 802.11p standard which was originally designed for Wireless Local Area Networks (WLANs is modified to address such type of communication. However, IEEE 802.11p uses Distributed Coordination Function (DCF for communication between wireless nodes. Therefore, it does not perform well for high mobility networks such as VANETs. Moreover, in RSU mode timely provision of data/services under high density of vehicles is challenging. In this paper, we propose a RSU-based efficient channel access scheme for VANETs under high traffic and mobility. In the proposed scheme, the contention window is dynamically varied according to the times (deadlines the vehicles are going to leave the RSU range. The vehicles with shorter time deadlines are served first and vice versa. Simulation is performed by using the Network Simulator (NS-3 v. 3.6. The simulation results show that the proposed scheme performs better in terms of throughput, backoff rate, RSU response time, and fairness.

  3. Optical access: networks and components (overview)

    Science.gov (United States)

    Mynbaev, Djafar K.

    2004-09-01

    The exponential gtowth of traffic delivered to an individual customer both for business and personal needs puts tremendous pressure on the telecommunications networks. Because the development of the long-haul and metro networks has advanced rapidly and their capacity much eceeds demand, tremendous pressure now falls in the local networks to provide customers with access to the global telecom infrastructure. Building a broadband access network enabling fast delivery of high-volume traffic is the current task of network operators. A brief review of broadband access networks brings us to the conclusion that only wired optical networks can serve as an immediate and future solution to the "last-mile" problem. After discussin goptical access network classification, we focus mainly on passive optical networks (PON) because PON is a major technology today. From the network standpoint, we discuss the principle of PON operation, architectures, topologies, protocols and standards, design issues, and network management and services. We also discuss the main problems with PON and the use of WDM technology. From the hardware standpoint, we consider both active and passive components. We analyze the structure and elements of these components, including their technical characteristics.

  4. 78 FR 14359 - Verizon Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet...

    Science.gov (United States)

    2013-03-05

    ... Employment and Training Administration Verizon Business Networks Services, Inc., Senior Analysts-Order... Networks Services, Inc., Senior Coordinator-Order Management, Voice Over Internet Protocol, Small And... Assistance on January 18, 2013, applicable to workers of Verizon Business Networks Services, Inc.,...

  5. Secure digital voice communications in the Defense Data Network (DDN)

    Science.gov (United States)

    Bernet, M.; Gan, D.; Oesterreicher, C.

    1985-03-01

    This final report has investigated and validated one of the fourteen key features of the future, all-digital World-wide Digital Systems Architecture (WWDSA), namely the enhanced 2.4 Kbps secure voice survivability through the use of packetized voice and the use of packetized voice and the interconnection between the voice survivability through the use of packetized voice and the interconnection between the voice (DSN) phase implementation plan in the report, Secure Voice, as provided by the STU-IIs, can be implemented in the DDN in the late 1980s time-frame with no technical and minimum schedule risk. VIUs are proposed to interconnect, the family of secure voice terminals, called STU-IIs, to the DDN. VIUs contain modan, signalling and supervision (S/S), and processor modules and are supported by the implementation model of the protocol architecture that (with the TAC as processor module) was proposed in the report. An optimum system-level architecture employing the VIUs and the proposed in the implementation plan based on an extensive evaluation.

  6. Standardization of broadband radio access networks

    Science.gov (United States)

    Kruys, Jan; Haine, John

    1998-09-01

    This paper introduces the ETSI Project on Broadband Radio Access Networks (EP-BRAN). BRAN systems will be used for local area applications with limited mobility (HIPERLAN/2); fixed access with area coverage in urban and rural areas (HIPERACCESS); and short range high-speed point-to-point links (HIPERLINK). They will support transport of either IP or ATM protocols, supporting managed quality of service. Such systems are needed to provide access to the future broadband core networks supporting multi-media applications. The paper addresses the motivation and market demand for broadband radio access networks, the objectives and scope of the Project, the operational and technical requirements, the types of networks to be standardized, the scope of the standards, the issue of spectrum and the Project schedule.

  7. Achieving universal access to next generation networks

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    The paper examines investment dimensions of next generation networks in a universal service perspective in a European context. The question is how new network infrastructures for getting access to communication, information and entertainment services in the present and future information society...

  8. Deploying a simple voice over IP network using a simulation tool

    OpenAIRE

    Limbu, Prajil

    2016-01-01

    Voice over IP is a major advancement in the field of IP communications systems technology since the advent of Internet. It is a communication technology which enables a device to transmit and receive voice traffic with the help of an IP-based network such as the Internet. Various types and deployments of Voice over IP are prevailing due to its popularity since its origin. Since its advent, it has managed to evolve and has given a platform to be benefited with its numerous advantages not only ...

  9. Voice Communications over 802.11 Ad Hoc Networks: Modeling, Optimization and Call Admission Control

    Science.gov (United States)

    Xu, Changchun; Xu, Yanyi; Liu, Gan; Liu, Kezhong

    Supporting quality-of-service (QoS) of multimedia communications over IEEE 802.11 based ad hoc networks is a challenging task. This paper develops a simple 3-D Markov chain model for queuing analysis of IEEE 802.11 MAC layer. The model is applied for performance analysis of voice communications over IEEE 802.11 single-hop ad hoc networks. By using the model, we finish the performance optimization of IEEE MAC layer and obtain the maximum number of voice calls in IEEE 802.11 ad hoc networks as well as the statistical performance bounds. Furthermore, we design a fully distributed call admission control (CAC) algorithm which can provide strict statistical QoS guarantee for voice communications over IEEE 802.11 ad hoc networks. Extensive simulations indicate the accuracy of the analytical model and the CAC scheme.

  10. Concept of distributed corporative wireless vehicle voice networks based on radio-over-fiber technique

    Science.gov (United States)

    Bourdine, Anton V.; Bukashkin, Sergey A.; Buzov, Alexander V.; Kubanov, Victor P.; Praporshchikov, Denis E.; Tyazhev, Anatoly I.

    2016-03-01

    This work is concerned on description of the concept of corporative wireless vehicle voice networks based on Radioover- Fiber (RoF) technology, which is integration of wireless and fiber optic networks. The concept of RoF means to transport data over optical fibers by modulating lightwave with radio frequency signal or at the intermediate frequency/baseband that provides to take advantage of the low loss and large bandwidth of an optical fiber together with immunity to electromagnetic influence, flexibility and transparence. A brief overview of key RoF techniques as well as comparative analysis and ability of its application for wireless vehicle voice network realization is presented.

  11. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  12. Personalizing Access to Learning Networks

    DEFF Research Database (Denmark)

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking......-based personalization improves these results further. Rule-based reasoning techniques are supported by formal ontologies we have developed based on standard information models for learning domains; ranking-based recommendations are supported through ensuring minimal sets of predicates appearing in query results. Our...

  13. Scalable Lunar Surface Networks and Adaptive Orbit Access Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innovative network architecture, protocols, and algorithms are proposed for both lunar surface networks and orbit access networks. Firstly, an overlaying...

  14. Survey on Cloud Radio Access Network

    Directory of Open Access Journals (Sweden)

    Reeta Chhatani

    2016-01-01

    Full Text Available The existing wireless network will face the challenge of data tsunami in the near future. Densification of network will deal huge data traffic but will increase the interferences and network cost. At the same time, the existing wireless network is underutilized due to dynamic traffic. To deal with this adverse scenario, a change in the current network architecture is required. Based on virtualization, Cloud Radio Access Network (CRAN was proposed for wireless network. In CRAN the functionality of base station will be distributed into base band unit (BBU and remote radio heads (RRH which will achieve benefits of centralization. This paper presents a survey on CRAN centring on optimized resource allocation, energy efficiency and throughput maximization under fronthaul capacity. The existing solution and future opportunities in CRAN are also summarized.

  15. Peer to peer networking in Ethernet broadband access networks

    OpenAIRE

    Damola, Ayodele

    2005-01-01

    The use of peer-to-peer (P2P) applications is growing dramatically, particularly for sharing content such as video, audio, and software. The traffic generated by these applications represents a large proportion of Internet traffic. For the broadband access network providers P2P traffic presents several problems. This thesis identifies the performance and business issues that P2P traffic has on broadband access networks employing the McCircuit separation technique. A mechanism for managing P2P...

  16. Softward-Defined Networking in Heterogeneous Radio Access Networks

    DEFF Research Database (Denmark)

    Yu, Hao

    2014-01-01

    Integrating diff erent wireless access technologies to provide users with data service will definitely result in a heterogeneous radio access network. Moving from one wireless domain to another causes traffic being switched from one interface to another. This results in a reestablishment of TCP c...

  17. Opportunistic Interference Alignment for Random Access Networks

    OpenAIRE

    Jin, Hu; Jeon, Sang-Woon; Jung, Bang Chul

    2015-01-01

    An interference management problem among multiple overlapped random access networks (RANs) is investigated, each of which operates with slotted ALOHA protocol. Assuming that access points and users have multiple antennas, a novel opportunistic interference alignment~(OIA) is proposed to mitigate interference among overlapped RANs. The proposed technique intelligently combines the transmit beamforming technique at the physical layer and the opportunistic packet transmission at the medium acces...

  18. Designing Broadband Access Networks with Triple Redundancy

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Knudsen, Thomas Phillip

    2005-01-01

    An architecture is proposed for designing broadband access networks, which offer triple redundancy to the end users, resulting in networks providing connectivity even in case of any two independent node or line failures. Two physically independent connections are offered by fiber, and the last...... provided by some wireless solution. Based on experience with planning Fiber To The Home, the architecture is designed to meet a number of demands, making it practicable and useful in realworld network planning. The proposed wired topology is planar, and suitable for being fitted onto the road network...... without compromising line independency, and it can be implemented stepwise, the first step being based on a simple ring/tree topology. The double ring is used for the distribution network, ensuring 3-connectivity and making it feasible to use for connecting the base stations of the wireless network...

  19. Effective Voice Calls Admission for Authorized User in Inter VOIP Network

    Directory of Open Access Journals (Sweden)

    Subashri T

    2010-10-01

    Full Text Available IP based voice transmission technology is a flexible, simpler and a cost effective implementation of voicetransmission. It provides a real convergence of various networks. This voice transmission technology doesnot support a quality that is equivalent to digitized voice, which is available in the existing PSTN networks.In addition to this, data network vulnerabilities affect the VOIP service causing a drop in the utilization ofvoice communication. In this paper, the quality of service for voice calls is ensured with the integration ofCAC mechanism with the bandwidth link utilization which makes an estimation of the demandedbandwidth. In terms of security, prevention of ARP cache poisoning attack is achieved by use of the signedMAC address response in local area networks. It makes the network confident that the admitted user is anauthorized user and also it verifies that only the authorized users’ information is exchanged over the localarea network. Also an approach that makes it difficult for the hacker’s to hack the data exchanged over thequality channel has been proposed.

  20. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks with c...... with cascaded Erbium-doped fiber amplifiers and a comb laser....

  1. Voci e silenzi in un'esperienza di Student Voice mediata dai social network

    Directory of Open Access Journals (Sweden)

    Valentina Grion

    2015-10-01

    Full Text Available Based on the theoretical framework of Student Voice, this paper presents a research study designed to verify whether a social networking site such as Facebook represents a feasible way for secondary school students to express their voice on school so as to enhance the quality of school education. With this purpose in mind, a private group was set up on Facebook and some questions were posted to activate participation. Moreover, two surveys were administered to gauge students’ confidence with Facebook and explore the reasons behind their overall reticence to participate in the proposed activity. The low levels of response provide the authors with elements for reflecting upon the Student Voice approach and how it might be implemented successfully at school level. They also lead to some considerations about the use of social networking sites in the school context.

  2. Understanding the Voice of the Customer: Practical, Data-Driven Planning and Decision Making for Access Services

    Science.gov (United States)

    Huff-Eibl, Robyn; Miller-Wells, John; Begay, Wendy

    2014-01-01

    This article describes the process and role frontline access and public service staff play in needs assessment and evaluation of user services, specifically in understanding the voice of the customer. Information includes how the University of Arizona Libraries have incorporated daily data collection into the strategic planning process, resources…

  3. Understanding the Voice of the Customer: Practical, Data-Driven Planning and Decision Making for Access Services

    Science.gov (United States)

    Huff-Eibl, Robyn; Miller-Wells, John; Begay, Wendy

    2014-01-01

    This article describes the process and role frontline access and public service staff play in needs assessment and evaluation of user services, specifically in understanding the voice of the customer. Information includes how the University of Arizona Libraries have incorporated daily data collection into the strategic planning process, resources…

  4. Fibre Optic Bus Network For Voice And Data Transmission In A Ship

    Science.gov (United States)

    Jhunjhunwala, Ashok; Sanghi, R. K.; Manjunath, D.

    1987-12-01

    A versatile communication system in a ship with 120 stations, each having voice and data transmission is envisaged. The proposed fibre optic network has a bus topology ideally suited for distribution in ship-like environment. Use has been made of standard ETHERNET chip sets manufactured by INTEL. This makes the stations compact, easier to maintain and inexpensive. The ETHERNET proto-col is primarily designed for packet data transmission. The collision detection and backoff protocol makes the packet transmission probabilistic and is therefore not suitable for voice transmission. This problem is overcome in the present design by a scheme where the required number of voice slots are dynamically allocated. That is, having established a connection for voice communication between stations, fixed slots are assigned for voice transmission and reception. The data transmission continues to use CSMA/CD Protocol. A simple hardware addition to the ETHERNET chip set makes the scheme workable. Drops in the fiber optic bus network is through passive star couplers. Four to eight star couplers are used in the present scheme with repeaters between adjacent star couplers. The repeaters will not be usual repeaters, as ordinary repeaters would cause loops to be formed between adjacent stars, thereby causing data to recirculate. This recirculation is avoided by making the repeater intelligent and also performing the task of detecting collisions between signals originating from stations connected to different star couplers.

  5. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  6. Multiple-Access Quantum Key Distribution Networks

    CERN Document Server

    Razavi, Mohsen

    2011-01-01

    This paper addresses multi-user quantum key distribution networks, in which any two users can mutually exchange a secret key without trusting any other nodes. The same network also supports conventional classical communications by assigning two different wavelength bands to quantum and classical signals. Time and code division multiple access (CDMA) techniques, within a passive star network, are considered. In the case of CDMA, it turns out that the optimal performance is achieved at a unity code weight. A listen-before-send protocol is then proposed to improve secret key generation rates in this case. Finally, a hybrid setup with wavelength routers and passive optical networks, which can support a large number of users, is considered and analyzed.

  7. An access alternative for mobile satellite networks

    Science.gov (United States)

    Wu, W. W.

    1988-05-01

    Conceptually, this paper discusses strategies of digital satellite communication networks for a very large number of low density traffic stations. These stations can be either aeronautical, land mobile, or maritime. The techniques can be applied to international, domestic, regional, and special purpose satellite networks. The applications can be commercial, scientific, military, emergency, navigational or educational. The key strategy is the use of a non-orthogonal access method, which tolerates overlapping signals. With n being either time or frequency partitions, and with a single overlapping signal allowed, a low cost mobile satellite system can be designed with n squared (n squared + n + 1) number of terminals.

  8. Optimizing the next generation optical access networks

    DEFF Research Database (Denmark)

    Amaya Fernández, Ferney Orlando; Soto, Ana Cardenas; Tafur Monroy, Idelfonso

    2009-01-01

    of the optical amplification in the performance of the standardized PON is presented comparing the performance of the EDFA (Erbium Doped Fiber Amplifier) and the distributed Raman amplification. The effect of the Raman amplification in extending the reach of the NG-OAN is analyzed and some requirements......Several issues in the design and optimization of the next generation optical access network (NG-OAN) are presented. The noise, the distortion and the fiber optic nonlinearities are considered to optimize the video distribution link in a passive optical network (PON). A discussion of the effect...

  9. A Multiservice Voice, Data, and Video Network Enabled by Optical Ethernet

    Science.gov (United States)

    Simcoe, Mitchell

    With data now approaching 60% of all aggregate traffic and expected to grow to 90% of all traffic by 2004, networks designed around all-packet architectures are being envisioned. Within this timeframe, a network vision is to deliver voice, video, and data services over a single packet-oriented network. Some entrepreneurial network providers are pursuing this vision in an even earlier timeframe. This article introduces a multiservices voice, data, and multicast video network over an Optical Ethernet architecture for residents of multidwelling units (MDU). This article reviews the network architecture for delivering these services over Optical Ethernet and addresses the challenges of handling service types with different bandwidths and latencies over a common packet-oriented infrastructure. As an example, it addresses the challenge of managing latency-intolerant traffic such as voice over IP over a common architecture as Internet data. Furthermore, it discusses the challenges of delivering over 100 channels of broadcast video as well as video on demand over the same infrastructure.

  10. TCP Performance Enhancement for UMTS Access Network

    DEFF Research Database (Denmark)

    Hu, Liang

    2008-01-01

    We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...... is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel...... scenario (e.g.256 kbps). Besides, the split TCP proxy brings more performance gain for downloading large files than downloading small ones. Finally, an aggressive initial TCP congestion window size at proxy can brings even more performance gain for radio links with high data rates DCH channels with large...

  11. 多用户远程语音交互终端接入设备设计与实现%Design and Implementation of a Multi-user Remote Voice Interactive Terminal Access Equipment

    Institute of Scientific and Technical Information of China (English)

    李红光; 郭英; 苏令华; 张波; 侯文林; 王宁

    2014-01-01

    基于低空飞行航空管制组网话音通信应用背景,从音频接口、模数/数模转换接口和网络接口3个核心处理模块出发,研究了网络化语音接入设备的硬件关键技术。从 C 语言级和汇编级两方面对 G.729A 语音编解码算法进行改进优化,并给出了语音数据的处理流程,以单片TMS320C6455DSP 实时实现了语音4路压缩编码和20路解码处理。采用 TCP/ IP 网络协议实现了多路语音网络通信功能,分析了多路语音串扰问题并设计了相应的解决方案。测试表明,基于该技术实现的设备语音处理延迟小于10 ms,满足多用户语音实时传输要求。%This paper attempts to study the key technology of network voice access devices with focus on core modules,i. e. voice AD/ DA conversion and network interface,according to the background of network voice communication in low altitude air traffic control(ATC). The G. 729A voice encode and decode algo-rithm is optimized both in C and assembly language and flow chart of voice data processing is given. Four channels voice compression coding and twenty channels decode processing are also realized in real-time by single chip TMS320C6455DSP. The network multi-channel voice communication is realized with TCP/ IP and multi-channel voice interpolation is solved with solutions accordingly. The test reveals that less than 10 ms time delay of the voice processing device is achieved,which meets the real-time voice transmission de-mand of multi-subscriber.

  12. The Climate Voices Speakers Network: Collaborating with Nontraditional, National Networks to Develop Climate Literacy on a Local Level

    Science.gov (United States)

    Wegner, K.; Schmidt, C.; Herrin, S.

    2015-12-01

    How can we leverage the successes of the numerous organizations in the climate change communication arena to build momentum rather than reinvent the wheel? Over the past two years, Climate Voices (climatevoices.org) has established a network of nearly 400 speakers and established partnerships to scale programs that address climate change communication and community engagement. In this presentation, we will present how we have identified and fostered win-win partnerships with organizations, such as GreenFaith Interfaith Partners for the Environment and Rotary International, to reach the broader general public. We will also share how, by drawing on the resources from the National Climate Assessment and the expertise of our own community, we developed and provided our speakers the tools to provide their audiences access to basic climate science - contributing to each audience's ability to understand local impacts, make informed decisions, and gain the confidence to engage in solutions-based actions in response to climate change. We will also discuss how we have created webinar coaching presentations by speakers who aren't climate scientists- and why we have chosen to do so.

  13. Optical technologies in extended-reach access networks

    DEFF Research Database (Denmark)

    Wong, Elaine; Amaya Fernández, Ferney Orlando; Tafur Monroy, Idelfonso

    2009-01-01

    The merging of access and metro networks has been proposed as a solution to lower the unit cost of customer bandwidth. This paper reviews some of the recent advances and challenges in extended-reach optical access networks....

  14. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    rate in the fronthaul. For the analyzed data sets, in deployments where diverse traffic types are mixed (bursty, e.g., web browsing and constant bit rate, e.g., video streaming) and cells from various geographical areas (e.g., office and residential) are connected to the BBU pool, the multiplexing gain......Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  15. Design of real-time voice over internet protocol system under bandwidth network

    Science.gov (United States)

    Zhang, Li; Gong, Lina

    2017-04-01

    With the increasing bandwidth of the network and network convergence accelerating, VoIP means of communication across the network is becoming increasingly popular phenomenon. The real-time identification and analysis for VOIP flow over backbone network become the urgent needs and research hotspot of network operations management. Based on this, the paper proposes a VoIP business management system over backbone network. The system first filters VoIP data stream over backbone network and further resolves the call signaling information and media voice. The system can also be able to design appropriate rules to complete real-time reduction and presentation of specific categories of calls. Experimental results show that the system can parse and process real-time backbone of the VoIP call, and the results are presented accurately in the management interface, VoIP-based network traffic management and maintenance provide the necessary technical support.

  16. Rural telemedicine networks using store-and-forward Voice-over-IP.

    Science.gov (United States)

    Scholl, Jeremiah; Lambrinos, Lambros; Lindgren, Anders

    2009-01-01

    Store and forward Voice-over-IP is a suggested solution for supporting Telemedicine at rural health clinics in developing countries. Solutions described to date are designed to support communication by establishing point-to-point connectivity between two sites. In this paper we present an approach for creating scalable Telemedicine networks based on Delay Tolerant Networking. This holds potential for allowing Telemedicine networks to be created that can enable sharing of Teleconsultation and other medical information among a large number of locations in areas that cannot be served by existing solutions.

  17. Perceptual Evaluation Of Playout Buffer Algorithm For Enhancing Perceived Quality Of Voice Transmission Over Ip Network

    CERN Document Server

    Perwej, Yusuf; 10.5121/ijmnct.2012.2201

    2012-01-01

    Voice over Internet Protocol (VoIP) is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. Voice over Internet Protocol (VoIP) has led human speech to a new level, where conversation across continents can be much cheaper & faster. However, as IP networks are not designed for real-time applications, the network impairments such as packet loss, jitter and delay have a severe impact on speech quality. The playout buffer at the receiver side is used to compensate jitter at a trade-off of delay and loss. We found the characteristics of delay and loss are dependent on IP network and sudden variable delay (spike) often performs both regular and irregular characteristics. Different playout buffer algorithms can have different impacts on the achievement speech quality. It is important to design a playout buffer algorithm which can help achieve an optimum speech quality. In this paper, we investigate to the understanding how network imp...

  18. Optical solutions for unbundled access network

    Science.gov (United States)

    Bacîş Vasile, Irina Bristena

    2015-02-01

    The unbundling technique requires finding solutions to guarantee the economic and technical performances imposed by the nature of the services that can be offered. One of the possible solutions is the optic one; choosing this solution is justified for the following reasons: it optimizes the use of the access network, which is the most expensive part of a network (about 50% of the total investment in telecommunications networks) while also being the least used (telephone traffic on the lines has a low cost); it increases the distance between the master station/central and the terminal of the subscriber; the development of the services offered to the subscribers is conditioned by the subscriber network. For broadband services there is a need for support for the introduction of high-speed transport. A proper identification of the factors that must be satisfied and a comprehensive financial evaluation of all resources involved, both the resources that are in the process of being bought as well as extensions are the main conditions that would lead to a correct choice. As there is no single optimal technology for all development scenarios, which can take into account all access systems, a successful implementation is always done by individual/particularized scenarios. The method used today for the selection of an optimal solution is based on statistics and analysis of the various, already implemented, solutions, and on the experience that was already gained; the main evaluation criterion and the most unbiased one is the ratio between the cost of the investment and the quality of service, while serving an as large as possible number of customers.

  19. Optical networks, last mile access and applications

    Science.gov (United States)

    Leitgeb, E.; Gebhart, M.; Birnbacher, U.

    topology, reliability and availability. The advantages and disadvantages of different FSO technologies, as well as the backbone technology are discussed in this respect. Furthermore, the last mile access using FSO will be investigated for different environment areas (e.g., urban, rural, mountain) and climate zones. The availability of the FSO link is mainly determined by the local atmospheric conditions and distance and will be examined for the last mile. Results of various studies will complete these investigations. Finally, an example for realizing a FSO network for the last mile will be shown. In this example FSO transmitters with light emitting diodes (LED) instead of laser diodes will be described. By using LEDs, problems with laser-and eye safety are minimized. Some multimedia applications (like video-conferences, live TV-transmissions, etc.) will illustrate the range of applications for FSO last mile networks.

  20. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  1. Resource Allocation for Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama

    2016-04-01

    Cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio system. In CRANs, joint signal processing is performed at multiple cloud computing centers (clouds) that are connected to several base stations (BSs) via high capacity backhaul links. As a result, large-scale interference management and network power consumption reduction can be effectively achieved. Unlike recent works on CRANs which consider a single cloud processing and treat inter-cloud interference as background noise, the first part of this thesis focuses on the more practical scenario of the downlink of a multi-cloud radio access network where BSs are connected to each cloud through wireline backhaul links. Assume that each cloud serves a set of pre-known single-antenna mobile users (MUs). This part focuses on minimizing the network total power consumption subject to practical constraints. The problems are solved using sophisticated techniques from optimization theory (e.g. Dual Decomposition-based algorithm and the alternating direction method of multipliers (ADMM)-based algorithm). One highlight of this part is that the proposed solutions can be implemented in a distributed fashion by allowing a reasonable information exchange between the coupled clouds. Additionally, feasible solutions of the considered optimization problems can be estimated locally at each iteration. Simulation results show that the proposed distributed algorithms converge to the centralized algorithms in a reasonable number of iterations. To further account of the backhaul congestion due to densification in CRANs, the second part of this thesis considers the downlink of a cache-enabled CRAN where each BS is equipped with a local-cache with limited size used to store the popular files without the need for backhauling. Further, each cache-enabled BS is connected to the cloud via limited capacity backhaul link and can serve a set of pre-known single antenna MUs. This part

  2. Broadband access technology for passive optical network

    Science.gov (United States)

    Chi, Sien; Yeh, Chien-Hung; Chow, Chi-Wai

    2009-01-01

    We will introduce four related topics about fiber access network technologies for PONs. First, an upstream signal powerequalizer is proposed and designed using a FP-LD in optical line terminal applied to the TDM-PON, and a 20dB dynamic upstream power range from -5 to -25dBm having a 1.7dB maximal power variation is retrieved. The fiber-fault protection is also an important issue for PON. We investigate a simple and cost-effective TDM/WDM PON system with self-protected function. Next, using RSOA-based colorless WDM-PON is also demonstrated. We propose a costeffective CW light source into RSOA for 2.5Gb/s upstream in WDM-PON together with self-healing mechanism against fiber fault. Finally, we investigate a 4Gb/s OFDM-QAM for both upstream and downstream traffic in long-reach WDM/TDM PON system under 100km transmission without dispersion compensation. As a result, we believe that these key access technologies are emerging and useful for the next generation broadband FTTH networks.

  3. Optical-router-based dynamically reconfigurable photonic access network

    NARCIS (Netherlands)

    Roy, R.

    2014-01-01

    The Broadband photonics (BBP) project under the Freeband consortium of projects investigated the design of a dynamically reconfigurable photonic access network. Access networks form a key link in ensuring optimal bandwidth to the end user without which any improvements deeper in the network in the a

  4. Optical-router-based dynamically reconfigurable photonic access network

    NARCIS (Netherlands)

    Roy, Rajeev

    2014-01-01

    The Broadband photonics (BBP) project under the Freeband consortium of projects investigated the design of a dynamically reconfigurable photonic access network. Access networks form a key link in ensuring optimal bandwidth to the end user without which any improvements deeper in the network in the a

  5. Optical-router-based dynamically reconfigurable photonic access network

    NARCIS (Netherlands)

    Roy, R.

    2014-01-01

    The Broadband photonics (BBP) project under the Freeband consortium of projects investigated the design of a dynamically reconfigurable photonic access network. Access networks form a key link in ensuring optimal bandwidth to the end user without which any improvements deeper in the network in the

  6. Transparent settlement model between mobile network operator and mobile voice over Internet protocol operator

    Directory of Open Access Journals (Sweden)

    Luzango Pangani Mfupe

    2014-12-01

    Full Text Available Advances in technology have enabled network-less mobile voice over internet protocol operator (MVoIPO to offer data services (i.e. voice, text and video to mobile network operator's (MNO's subscribers through an application enabled on subscriber's user equipment using MNO's packet-based cellular network infrastructure. However, this raises the problem of how to handle interconnection settlements between the two types of operators, particularly how to deal with users who now have the ability to make ‘free’ on-net MVoIP calls among themselves within the MNO's network. This study proposes a service level agreement-based transparent settlement model (TSM to solve this problem. The model is based on concepts of achievement and reward, not violation and punishment. The TSM calculates the MVoIPO's throughput distribution by monitoring the variations of peaks and troughs at the edge of a network. This facilitates the determination of conformance and non-conformance levels to the pre-set throughput thresholds and, subsequently, the issuing of compensation to the MVoIPO by the MNO as a result of generating an economically acceptable volume of data traffic.

  7. Scalable Lunar Surface Networks and Adaptive Orbit Access

    Science.gov (United States)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  8. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption......Mobile operators are moving towards sharing network capacity in order to reduce capital and operational expenditures, while meeting the increasing demand for mobile broadband data services. Radio access network sharing is a promising technique that leads to reduced number of physical base station...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  9. Quantitative analysis of access strategies to remoteinformation in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach......, network delay characterization) and specific requirements on mismatch probability, traffic overhead, and access delay. Finally, the analysis is applied to the use-case of context-sensitive service discovery....

  10. Quantitative analysis of access strategies to remoteinformation in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach......, network delay characterization) and specific requirements on mismatch probability, traffic overhead, and access delay. Finally, the analysis is applied to the use-case of context-sensitive service discovery....

  11. The hearing voices network: initial lessons and future directions for mental health professionals and Systems of Care.

    Science.gov (United States)

    Styron, Thomas; Utter, Lauren; Davidson, Larry

    2017-02-01

    For more than two decades, the Hearing Voices Network (HVN) has provided alternative approaches to supporting voice hearers, and an emerging body of research is now confirming their value. HVN approaches present unique opportunities and challenges for mental health professionals and systems of care that work with individuals who hear voices. An overview of the HVN is presented, including its history, principles and approaches. HVN approaches are compared and contrasted with traditional mental health treatments. HVN's potential contribution to the transformation of mental health care is discussed. Directions for future research are presented.

  12. Optical coherent technologies in next generation access networks

    Science.gov (United States)

    Iwatsuki, Katsumi; Tsukamoto, Katsutoshi

    2012-01-01

    This paper reviews optical coherent technologies in next generation access networks with the use of radio over fiber (RoF), which offer key enabling technologies of wired and wireless integrated and/or converged broadband access networks to accommodate rapidly widespread cloud computing services. We describe technical issues on conventional RoF based on subcarrier modulation (SCM) and their countermeasures. Two examples of RoF access networks with optical coherent technologies to solve the technical issues are introduced; a video distribution system with FM conversion and wired and wireless integrated wide-area access network with photonic up- and down-conversion.

  13. Service delivery aspects in a reconfigurable photonic access network

    NARCIS (Netherlands)

    Roy, R.; Manhoudt, Gert; van Etten, Wim

    2008-01-01

    We discuss service delivery aspects in a reconfigurable photonic access network. The network is viewed as a stack of logical PONs in which a DWDM overlay is used over TDM PONs operating in their native format. The use of optical routers in the network allows for a dynamic change in the network topol

  14. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  15. Congestion Avoidance in IP Based CDMA Radio Access Network

    Directory of Open Access Journals (Sweden)

    Syed Shakeel Hashmi

    2011-02-01

    Full Text Available CDMA is an important air interface technologies for cellular wireless networks. As CDMAbasedcellular networks mature, the current point-to-point links will evolve to an IP-based Radio AccessNetwork (RAN. mechanisms must be designed to control the IP Radio Access Network congestion.This Paper implements a congestion control mechanism using Router control and channelcontrol method for IP-RAN on CDMA cellular network. The Router control mechanism uses the featuresof CDMA networks using active Queue Management technique to reduce delay and to minimize thecorrelated losses. The Random Early Detection Active Queue Management scheme (REDAQM is to berealized for the router control for data transmission over the radio network using routers as the channel.The channel control mechanism control the congestion by bifurcating the access channel into multiplelayer namely RACH, BCCH and DCH for data accessing. The proposed paper work is realized usingMatlab platform.

  16. On Planning of FTTH Access Networks with and without Redundancy

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Haraldsson, Gustav; Gutierrez Lopez, Jose Manuel

    2010-01-01

    This paper presents a planning analysis of FTTH access network with and without redundancy. Traditionally, access networks are planned only without redundancy, which is mainly due to lowering the cost of deployment. As fiber optics provide a huge amount of capacity, more and more services are being...

  17. 47 CFR 36.213 - Network access services revenues.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Network access services revenues. 36.213 Section 36.213 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES... Income Accounts Operating Revenues § 36.213 Network access services revenues. (a) End User...

  18. A Method for Automated Planning of FTTH Access Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...

  19. On Planning of FTTH Access Networks with and without Redundancy

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Haraldsson, Gustav; Gutierrez Lopez, Jose Manuel;

    2010-01-01

    This paper presents a planning analysis of FTTH access network with and without redundancy. Traditionally, access networks are planned only without redundancy, which is mainly due to lowering the cost of deployment. As fiber optics provide a huge amount of capacity, more and more services are being...

  20. Giving Economically Disadvantaged, Minority Food Pantry Patrons' a Voice: Implications for Equitable Access to Sufficient, Nutritious Food.

    Science.gov (United States)

    Greer, Anna E; Cross-Denny, Bronwyn; McCabe, Michelle; Castrogivanni, Brianna

    2016-01-01

    This study provides economically disadvantaged, minority food pantry patrons (hereafter, patrons) a meaning-ful voice by examining their experiences trying to obtain sufficient, nutritious food. Five focus groups were conducted using a semistructured discussion guide. Atlast.ti software was used to manage and analyze the data. Patrons reported that pantry staff who preserved their dignity by showing compassion were highly valued. Stigma and shame associated with pantry use were major concerns. Patrons suggested environmental and policy changes to improve their food acquisition experiences. These findings suggest that multilevel interventions addressing food access, food distribution policies, and patron-staff interactions are warranted.

  1. Free-space optics technology employed in an UMTS release 4 bearer independent core network access part

    Science.gov (United States)

    Bibac, Ionut

    2005-08-01

    The UMTS Bearer Independent Core Network program introduced the 3rd Generation Partnership Program Release 4 BICN architecture into the legacy UMTS TDM-switched network. BICN is the application of calI server archltecture for voice and circuit switched data, enabling the provisioning of traditional circuit-switched services using a packet-switched transport network. Today"s business climate has made it essential for service providers to develop a comprehensive networking strategy that means introduction of RCBICN networks. The R4-BICN solution to the evolution of the Core Network in UMTS will enable operators to significantly reduce the capital and operational costs of delivering both traditional voice sewices and new multimedia services. To build the optical backbone, which can support the third generation (3G) packetized infrastructure, the operators could choose a fibre connection, or they could retain the benefits of a wireless connectivity by using a FSO - Free Space Optical lmk, the only wireless technology available that is capable of achieving data rates up to 2.4 Gbit/s. FSO offers viable alternatives for both core transmission networks and for replacing microwaves links in NodeB - RNC access networks. The paper and presentation aim to demonstrate the manner in which FSO products and networks are employed into R4-BICN design solutions.

  2. Load-Aware Radio Access Selection in Future Generation Satellite-Terrestrial Wireless Networks

    Directory of Open Access Journals (Sweden)

    M. Ali

    2012-03-01

    Full Text Available In the telecommunication networks the introduction of Next Generation Wireless Networks (NGWN has been described as the most significant change in wireless communication. The convergence of different access networks in NGWN allows generalized mobility, consistency and ubiquitous provision of services to mobile users. The general target of NGWN is to transport different types of information like voice,data, and other media like video in packets form like IP. The NGWNs offer significant savings in costs to the operators along with new and interesting services to the consumers. Major challenges in NGWN are efficient resource utilization, maintaining service quality, reliability and the security. This paper proposes a solution for seamless load aware Radio Access Technology (RAT selection based on interworking of different RATs in NGWN. In this paper novel load balancing algorithms have been proposed which have been simulated on the target network architecture for TCP data services. The IEEE 802.21 Media Independent Handover (MIH is utilized in load balancing specifically for mobility management, which enable low handover latency by reducing the target network detection time. The proposed method considers the network type, signal strength, data rate and network load as primary decision parameters for RAT selection process and consists of two different algorithms, one located inthe mobile terminal and the other at the network side. The network architecture, the proposed load balancing framework and RAT selection algorithms were simulated using NS2. Different attributes like load distribution in the wireless networks and average throughput to evaluate the effects of load balancing in considered scenarios.

  3. Ensuring quality of service for multimedia services in two-step reservation MAC protocol for PLC access networks

    Science.gov (United States)

    Hrasnica, Halid; Lehnert, Ralf

    2004-09-01

    Recent and future communications networks have to provide QoS guarantees for a rapidly growing number of various telecommunication services, which can be ensured by application of an efficient MAC layer. Various communication technologies, such as cellular networks and PLC (PowerLine Communications) access networks, apply reservation MAC protocols, providing a good network utilization and realization of different QoS guarantees. In this investigation, we analyze possibilities for provision of QoS guarantees for various telecommunications services with a two-step reservation MAC protocol using per-packet reservation principle, which is proposed for application in broadband PLC access networks. Particularly, performance of the reservation procedure is analyzed to provide priority mechanisms which are necessary for realization of various telecommunications services ensuring the required QoS guarantees. Since the telephony, realized by the packet voice service, has the strongest QoS requirements among various telecommunications services, we analyze possibility for its realization within the two-step MAC protocol. It can be concluded that the packet voice can be efficiently implemented. However, with application of a combined reservation domains for various service classes, network performance could be further improved.

  4. Carrying Network Accessing Architecture and Strategy Based on Business Differentiation

    Directory of Open Access Journals (Sweden)

    Yanyan Han

    2013-07-01

    Full Text Available Due to the abilities of real-time sensing and information sharing, Wireless Sensor Network (WSN has been applied in more and more fields. Basing on the emergence of Internet of Things (IoT, the issue about heterogeneous network integration is becoming more important. We first analyze the new businesses that arise recently for cell phone users as well as the potential effect on carrying network. After that we mainly discuss the influence on traditional carrying network for WSN accessing and taking concurrent businesses as the study case, common access architecture from WSN to carrying network is constructed, which makes use of business differentiation. Furthermore, we propose the idea of tortuous access from WSN to the gateway in the carrying network to avoid congested paths with simulation and verification. Finally, we conclude the possible impacts for the integration of these two networks and present possible solutions.

  5. Optimization and Performance Analysis of High Speed Mobile Access Networks

    CERN Document Server

    Weerawardane, Thushara

    2012-01-01

    The design and development of cost-effective mobile broadband wireless access networks is a key challenge for many mobile network operators. The over-dimensioning or under-dimensioning of an access network results in both additional costs and customer dissatisfaction.   Thushara Weerawardane introduces new transport technologies and features for High Speed Packet Access (HSPA) and Long-Term Evolution (LTE) networks. Using advanced scientific methods, he proposes new adaptive flow control and enhanced congestion control algorithms, then defends them with highly-developed analytical models derived from Markov chains. For faster analysis, compared to long-lasting detailed simulations, these models provide optimum network performance and ensure reliable quality standards for end users during transport network congestion. Further, the author investigates and analyzes LTE transport network performance by introducing novel traffic differentiation models and buffer management techniques during intra-LTE handovers.

  6. Effects of network node consolidation in optical access and aggregation networks on costs and power consumption

    Science.gov (United States)

    Lange, Christoph; Hülsermann, Ralf; Kosiankowski, Dirk; Geilhardt, Frank; Gladisch, Andreas

    2010-01-01

    The increasing demand for higher bit rates in access networks requires fiber deployment closer to the subscriber resulting in fiber-to-the-home (FTTH) access networks. Besides higher access bit rates optical access network infrastructure and related technologies enable the network operator to establish larger service areas resulting in a simplified network structure with a lower number of network nodes. By changing the network structure network operators want to benefit from a changed network cost structure by decreasing in short and mid term the upfront investments for network equipment due to concentration effects as well as by reducing the energy costs due to a higher energy efficiency of large network sites housing a high amount of network equipment. In long term also savings in operational expenditures (OpEx) due to the closing of central office (CO) sites are expected. In this paper different architectures for optical access networks basing on state-of-the-art technology are analyzed with respect to network installation costs and power consumption in the context of access node consolidation. Network planning and dimensioning results are calculated for a realistic network scenario of Germany. All node consolidation scenarios are compared against a gigabit capable passive optical network (GPON) based FTTH access network operated from the conventional CO sites. The results show that a moderate reduction of the number of access nodes may be beneficial since in that case the capital expenditures (CapEx) do not rise extraordinarily and savings in OpEx related to the access nodes are expected. The total power consumption does not change significantly with decreasing number of access nodes but clustering effects enable a more energyefficient network operation and optimized power purchase order quantities leading to benefits in energy costs.

  7. Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks

    OpenAIRE

    Fouli, Kerim; Sergeev, Ivan; Maier, Martin; Casse, Jerome; Medard, Muriel

    2012-01-01

    We investigate network coding (NC) in access point-to-multi-point (PMP) broadcast networks. Characterized by a shared unicast upstream channel and a time-shared broadcast downstream channel, PMP networks are widely deployed in optical and wireless access networks. We develop a queuing-theoretic model of NC at the medium access control (MAC) sublayer and analyze the impact of NC on packet delay. Our analysis is validated through discrete-event simulation and demonstrates significant delay adva...

  8. Wi-Fi Networks Security and Accessing Control

    Directory of Open Access Journals (Sweden)

    Tarek S. Sobh

    2013-06-01

    Full Text Available As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi AP under attack specially rogue AP and/or ad-hoc client. It provides a solution for detecting and preventing this attack. In addition, it provides the required user permissions to allow/block access of the files on the user of ad-hoc client. The experiments include the rogue AP attack are maintained and the effectiveness of the proposed solution are tested.

  9. Parenting and social capital: Accessing help and support from informal social networks

    Directory of Open Access Journals (Sweden)

    Gillies Val

    2004-01-01

    Full Text Available This paper explores the resources and support that parents in the UK are able to access through their social networks, and analyses how these networks are organized and sustained. Concern over a perceived demise in community relations and trust have driven many recent UK family policy initiatives and have underpinned proposals to increase parenting support services. However drawing on data from the project "Resources in Parenting: Access to Capitals" it will be suggested that parents remain tightly connected to a social network from which they derive help, advice and reassurance. Based on data from 35 in-depth interviews with parents from 24 households across a range of social backgrounds, the paper will provide an insight into the levels of practical, financial and emotional help received by mothers and fathers from family members, friends and acquaintances. Particular attention will be given to significance of gender and class in enabling and delimiting access to various kinds of assistance. In contrast to commonly voiced claims about the fracturing of traditional support systems it will be argued that parenting is characterized by resourceful engagement with a variety of personal and social relationships.

  10. Fiber Access Networks: Reliability Analysis and Swedish Broadband Market

    Science.gov (United States)

    Wosinska, Lena; Chen, Jiajia; Larsen, Claus Popp

    Fiber access network architectures such as active optical networks (AONs) and passive optical networks (PONs) have been developed to support the growing bandwidth demand. Whereas particularly Swedish operators prefer AON, this may not be the case for operators in other countries. The choice depends on a combination of technical requirements, practical constraints, business models, and cost. Due to the increasing importance of reliable access to the network services, connection availability is becoming one of the most crucial issues for access networks, which should be reflected in the network owner's architecture decision. In many cases protection against failures is realized by adding backup resources. However, there is a trade off between the cost of protection and the level of service reliability since improving reliability performance by duplication of network resources (and capital expenditures CAPEX) may be too expensive. In this paper we present the evolution of fiber access networks and compare reliability performance in relation to investment and management cost for some representative cases. We consider both standard and novel architectures for deployment in both sparsely and densely populated areas. While some recent works focused on PON protection schemes with reduced CAPEX the current and future effort should be put on minimizing the operational expenditures (OPEX) during the access network lifetime.

  11. Access Network Selection Based on Fuzzy Logic and Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Mohammed Alkhawlani

    2008-01-01

    Full Text Available In the next generation of heterogeneous wireless networks (HWNs, a large number of different radio access technologies (RATs will be integrated into a common network. In this type of networks, selecting the most optimal and promising access network (AN is an important consideration for overall networks stability, resource utilization, user satisfaction, and quality of service (QoS provisioning. This paper proposes a general scheme to solve the access network selection (ANS problem in the HWN. The proposed scheme has been used to present and design a general multicriteria software assistant (SA that can consider the user, operator, and/or the QoS view points. Combined fuzzy logic (FL and genetic algorithms (GAs have been used to give the proposed scheme the required scalability, flexibility, and simplicity. The simulation results show that the proposed scheme and SA have better and more robust performance over the random-based selection.

  12. Performance improvement for applying network virtualization in fiber-wireless (FiWi) access networks

    Institute of Scientific and Technical Information of China (English)

    Qing-long DAI; Guo-chu SHOU; Yi-hong HU; Zhi-gang GUO

    2014-01-01

    Fiber-wireless (FiWi) access networks, which are a combination of fiber networks and wireless networks, have the advantages of both networks, such as high bandwidth, high security, low cost, and flexible access. However, with the increasing need for bandwidth and types of service from users, FiWi networks are still relatively incapable and ossified. To alleviate bandwidth tension and facilitate new service deployment, we attempt to apply network virtualization in FiWi networks, in which the network’s control plane and data plane are separated from each other. Based on a previously proposed hierarchical model and service model for FiWi network virtualization, the process of service implementation is described. The performances of the FiWi access networks applying network virtualization are analyzed in detail, including bandwidth for links, throughput for nodes, and multipath flow transmission. Simulation results show that the FiWi network with virtualization is superior to that without.

  13. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  14. An economic analysis on optical Ethernet in the access network

    Science.gov (United States)

    Kim, Sung Hwi; Nam, Dohyun; Yoo, Gunil; Kim, WoonHa

    2004-04-01

    Nowadays, Broadband service subscribers have increased exponentially and have almost saturated in Korea. Several types of solutions for broadband service applied to the field. Among several types of broadband services, most of subscribers provided xDSL service like ADSL or VDSL. Usually, they who live in an apartment provided Internet service by Ntopia network as FTTC structure that is a dormant network in economical view at KT. Under competitive telecom environment for new services like video, we faced with needing to expand or rebuild portions of our access networks, are looking for ways to provide any service that competitors might offer presently or in the near future. In order to look for new business model like FTTH service, we consider deploying optical access network. In spite of numerous benefits of PON until now, we cannot believe that PON is the best solution in Korea. Because we already deployed optical access network of ring type feeder cable and have densely population of subscribers that mainly distributed inside 6km from central office. So we try to utilize an existing Ntopia network for FTTH service under optical access environment. Despite of such situations, we try to deploy PON solution in the field as FTTC or FTTH architecture. Therefore we analyze PON structure in comparison with AON structure in order to look for optimized structure in Korea. At first, we describe the existing optical access networks and network architecture briefly. Secondly we investigate the cost of building optical access networks by modeling cost functions on AON and PON structure which based on Ethernet protocol, and analyze two different network architectures according to different deployment scenarios: Urban, small town, rural. Finally we suggest the economic and best solution with PON structure to optimize to optical access environment of KT.

  15. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...... interfacing and signal routing. Equipment and infrastructure simplification was recognized as the path towards more efficient metropolitan and access networks providing a spectrum of high-bandwidth services to large number of users. Several approaches have been proposed and developed in order to enable...

  16. Voice Analysis for Telediagnosis of Parkinson Disease Using Artificial Neural Networks and Support Vector Machines

    Directory of Open Access Journals (Sweden)

    Saloni

    2015-05-01

    Full Text Available Parkinson is a neurological disease and occurs due to lack of dopamine neurons. These dopamine neurons manage all body movements. Parkinson patients have difficulty in doing all daily routine activities, and also have disturbed vocal fold movements. Using voice analysis disease can be diagnosed remotely at an early stage with more reliability and in an economic way. In this paper, we have used 23 features dataset, all the features are analyzed and 15 features are selected from the total dataset. As in Parkinson tremor is present in the voice box muscles, so the variation in the period and amplitude of consecutive vocal cycles is present. The feature dataset selected consist of jitter, shimmer, harmonic to noise ratio, DFA, spread1 and PPE. Various classifiers are used and their comparison is done to find out which classifier is perfect in this environment. It is concluded that support vector classifiers as the best one with an accuracy of 96%. In the neural network classifiers with different transfer functions, there is tradeoff among the performance parameters.

  17. A Unified Access Model for Interconnecting Heterogeneous Wireless Networks

    Science.gov (United States)

    2015-05-01

    with each other via a central controller. The 2 access technologies used were 802.11 ( WiFi ) and a Carrier-Sense Multiple Access (CSMA) protocol ...wireless subnets could communicate with each other. 3. Results and Discussion Using the 3-VM LTE/ WiFi configuration, we placed a User Datagram Protocol ...control plane protocols . A network model that can abstract disparate MAC layers in heterogeneous networks and interconnect them using a unified and

  18. Usability evaluation of the South African National Accessibility Portal interactive voice response system

    CSIR Research Space (South Africa)

    Greeff, M

    2008-10-01

    Full Text Available One of the most prominent problems that persons with disabilities face in South Africa, is access to relevant disability related information. To address this need the South African National Accessibility Portal (NAP Portal) was developed...

  19. VIDEO CONTENTS PRIOR STORING SERVER FOR OPTICAL ACCESS NETWORK

    Directory of Open Access Journals (Sweden)

    Tony Tsang

    2015-03-01

    Full Text Available One of the most important multimedia applications is Internet protocol TV (IPTV for next-generation networks. IPTV provides triple-play services that require high-speed access networks with the functions of multicasting and quality of service (QoS guarantees. Among optical access networks, Ethernet passive optical networks (EPONs are regarded as among the best solutions to meet higher bandwidth demands. In this paper, we propose a new architecture for multicasting live IPTV traffic in optical access network. The proposed mechanism involves assigning a unique logical link identifier to each IPTV channel. To manage multicasting, a prior storing server in the optical line terminal (OLT and in each optical network unit (ONU is constructed. In this work, we propose a partial prior storing strategy that considers the changes in the popularity of the video content segments over time and the access patterns of the users to compute the utility of the objects in the prior storage. We also propose to partition the prior storage to avoid the eviction of the popular objects (those not accessed frequently by the unpopular ones which are accessed with higher frequency. The popularity distribution and ageing of popularity are measured from two online datasets and use the parameters in simulations. Simulation results show that our proposed architecture can improve the system performance and QoS parameters in terms of packet delay, jitter and packet loss

  20. Efficient wavelet-based voice/data discriminator for telephone networks

    Science.gov (United States)

    Quirk, Patrick J.; Tseng, Yi-Chyun; Adhami, Reza R.

    1996-06-01

    A broad array of applications in the Public Switched Telephone Network (PSTN) require detailed information about type of call being carried. This information can be used to enhance service, diagnose transmission impairments, and increase available call capacity. The increase in data rates of modems and the increased usage of speech compression in the PSTN has rendered existing detection algorithms obsolete. Wavelets, specifically the Discrete Wavelet Transform (DWT), are a relatively new analysis tool in Digital Signal Processing. The DWT has been applied to signal processing problems ranging from speech compression to astrophysics. In this paper, we present a wavelet-based method of categorizing telephony traffic by call type. Calls are categorized as Voice or Data. Data calls, primarily modem and fax transmissions, are further divided by the International Telecommunications Union-Telephony (ITU-T), formerly CCITT, V-series designations (V.22bis, V.32, V.32bis, and V.34).

  1. Accessing stored knowledge of familiar people from faces, names and voices: a review.

    Science.gov (United States)

    Hanley, John Richard

    2014-01-01

    Recent findings from neuropsychology and experimental psychology appear incompatible with the claim that feelings of familiarity about known people require activation of amodal person identity nodes. Evidence suggests that there are modality-specific effects after the point at which faces, names and voices have been found familiar. It therefore appears that activation of distinct modality-specific face, name and voice processing systems can signal that a known person is familiar. There is no convincing evidence, however, of modular effects on the way that information about familiar people is represented in semantic memory. Instead, semantic information about people appears to be stored separately from other forms of knowledge such as knowledge of objects. Anatomical evidence suggests that amodal person-specific semantic knowledge is stored in the right anterior temporal lobe where it has close connections with modality specific recognition systems. Failures to retrieve names in proper name anomia may be caused by impairments to the links between semantic knowledge in the right anterior temporal lobe and lexical representations in the left temporal pole.

  2. A Method for Upper Bounding on Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup;

    2004-01-01

    This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management....

  3. Robust and Flexible Wavelength Division Multiplexed Optical Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    Future wavelength division multiplexed (WDM) access networks should be as flexible as possible. One flexibility is port wavelength-agnosticism at the optical network unit (ONU) interface, achieved via tunable laser. At the same time such systems needs to be robust against crosstalk impairments...

  4. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...

  5. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...

  6. Communication in Change - Voice over IP in Safety and Security Critical Communication Networks

    Science.gov (United States)

    Zeilinger, Heimo; Sevcik, Berndt; Turek, Thomas; Zucker, Gerhard

    During the last decade communication technology has changed rapidly. Due to its decreasing costs and rising expansion, IP (Internet Protocol) technology has found its way to areas that have long been the domain of public-switched telephone networks (PSTN). Voice over IP (VoIP) applications are widely used not only for phone calls or common Internet conferences, but also tend to be used for safety critical communication applications. Hence security and safety topics arise, which pose new challenges in this area of research. The authors are convinced that new issues on the network layer as well as on the application layer require detailed analysis. Hence this paper gives an overview on latest developments in this area, and states the authors’ view on this topic. Thereby safety and security issues are faced from different abstraction layers. On the one hand the network layer and on the other hand the application layer focusing on middleware systems in the area of service oriented architectures (SOAs).

  7. Performance management of multiple access communication networks

    Science.gov (United States)

    Lee, Suk; Ray, Asok

    1993-12-01

    This paper focuses on conceptual design, development, and implementation of a performance management tool for computer communication networks to serve large-scale integrated systems. The objective is to improve the network performance in handling various types of messages by on-line adjustment of protocol parameters. The techniques of perturbation analysis of Discrete Event Dynamic Systems (DEDS), stochastic approximation (SA), and learning automata have been used in formulating the algorithm of performance management. The efficacy of the performance management tool has been demonstrated on a network testbed. The conceptual design presented in this paper offers a step forward to bridging the gap between management standards and users' demands for efficient network operations since most standards such as ISO (International Standards Organization) and IEEE address only the architecture, services, and interfaces for network management. The proposed concept of performance management can also be used as a general framework to assist design, operation, and management of various DEDS such as computer integrated manufacturing and battlefield C(sup 3) (Command, Control, and Communications).

  8. Reliability Demands in FTTH Access Networks

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Knudsen, Thomas Phillip; Madsen, Ole Brun

    2005-01-01

    In this paper reliability and bandwidth demands of existing, new and expected classes of applications running over Fiber To The Home (FTTH) networks to private users and small enterprises are analysed and discussed. Certain applications such as home security and telemedicine are likely to require...... high levels of reliability in the sense that the demands for network availability are high; even short times without connectivity are unacceptable. To satisfy these demands, physical redundancy in the networks is needed. It seems to be the case that - at least in the short term - most reliability......-critical applications do not require much bandwidth. This implies that redundancy do not need to be by fiber, but can be ensured by e.g. coax, copper or wireless solutions. However, implementing these solutions need careful planning to ensure the physical redundancy. In the long term, it is more likely that physical...

  9. Reliability Demands in FTTH Access Networks

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Knudsen, Thomas Phillip; Madsen, Ole Brun

    2004-01-01

    In this paper reliability and bandwidth demands of existing, new and expected classes of applications running over Fiber To The Home (FTTH) networks to private users and small enterprises are analyzed and discussed. Certain applications such as home security and telemedicine are likely to require...... high levels of reliability in the sense that the demands for network availability are high; even short times without connectivity are unacceptable. To satisfy these demands, physical redundancy in the networks is needed. It seems to be the case that - at least in the short term - most reliability......-critical applications do not require much bandwidth. This implies that redundancy do not need to be by fiber, but can be ensured by e.g. coax, copper or wireless solutions. However, implementing these solutions need careful planning to ensure the physical redundancy. In the long term, it is more likely that physical...

  10. Packet transport network in metro

    Science.gov (United States)

    Huang, Feng; Yi, Xiaobo; Zhang, Hanzheng; Gong, Ping

    2008-11-01

    IP packet based services such as high speed internet, IP voice and IP video will be widely deployed in telecom network, which make transport network evolution to packet transport network. Characteristics of transport network and requirements of packet transport network are analyzed, T-MPLS/MPLS-TP based PTN technology is given and it will be used in metro (access, aggregation and core) network.

  11. Metro Access Convergence for Broadband Future Low Energy Consumption Networks

    Directory of Open Access Journals (Sweden)

    G. M.T. Beleffi

    2011-01-01

    Full Text Available Problem statement: In study the impact of the optical technologies and infrastructures on the reduction of the carbon footprint maintaining high level of broadband to the end user is discussed. Approach: Authors analyze the main energy consumers in Core, Metro and Access Networks as well as the topology and the performaces of the EU FP7 SARDANA Project, a long reach full optical metro access convergent network. This permit to have a clear and innovative view on the topic of the green networks comparing commercial and on the edge solutions for the critical access segment. Three scenarios have been assumed with different uplink bandwidths: unlimited uplink in the CO, limited uplink of 400 Gbit sec-1 and strong limitation of 100 Gbit sec-1. Additionally, three different sizes of the access network with 100, 1,000 and 10,000 subscribers connected to a single CO have been considered. Results: Increasing the number of users and reducing the uplink bandwidth, the difference in energy efficiency between TDM and PONs and P-t-P FTTH networks increases. Conclusion: Authors conclude that in general, a SARDANA like network provides very good energy efficiency for both limited and unlimited uplink and for small and large networks.

  12. Optimal access to large databases via networks

    Energy Technology Data Exchange (ETDEWEB)

    Munro, J.K.; Fellows, R.L.; Phifer, D. Carrick, M.R.; Tarlton, N.

    1997-10-01

    A CRADA with Stephens Engineering was undertaken in order to transfer knowledge and experience about access to information in large text databases, with results of queries and searches provided using the multimedia capabilities of the World Wide Web. Data access is optimized by the use of intelligent agents. Technology Logic Diagram documents published for the DOE facilities in Oak Ridge (K-25, X-10, Y-12) were chosen for this effort because of the large number of technologies identified, described, evaluated, and ranked for possible use in the environmental remediation of these facilities. Fast, convenient access to this information is difficult because of the volume and complexity of the data. WAIS software used to provide full-text, field-based search capability can also be used, through the development of an appropriate hierarchy of menus, to provide tabular summaries of technologies satisfying a wide range of criteria. The menu hierarchy can also be used to regenerate dynamically many of the tables that appeared in the original hardcopy publications, all from a single text database of the technology descriptions. Use of the Web environment permits linking many of the Technology Logic Diagram references to on-line versions of these publications, particularly the DOE Orders and related directives providing the legal requirements that were the basis for undertaking the Technology Logic Diagram studies in the first place.

  13. Network selection strategy in heterogeneous multi-access environment

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Network selection mechanisms play a vital role in ensuring quality of service in the heterogeneous multi-access environment. In this article we develop a network selection scheme for an integrated cellular/wireless local area network (WLAN) system to guarantee mobile users being always best connected (ABC). The proposed scheme comprises three parts, with the first detecting the availability of WLAN, while the second applying an analytic hierarchy process (AHP) to decide the relative weights of evaluative criteria set according to user preferences, network condition and service applications, the third normalizing parameters and calculating decision-making index. Simulations conducted in a heterogeneous system with UMTS and wireless LAN reveal that the proposed network selection technique can effectively decide the optimum network through making trade-offs among network condition, user preference, and service application, while avoiding frequent handoffs.

  14. Energy-Efficient Design and Optimization of Wireline Access Networks

    CERN Document Server

    Bhaumik, Sourjya; Narlikar, Girija; Wilfong, Gordon

    2011-01-01

    Access networks, in particular, Digital Subscriber Line (DSL) equipment, are a significant source of energy consumption for wireline operators. Replacing large monolithic DSLAMs with smaller remote DSLAM units closer to customers can reduce the energy consumption as well as increase the reach of the access network. This paper attempts to formalize the design and optimization of the "last mile" wireline access network with energy as one of the costs to be minimized. In particular, the placement of remote DSLAM units needs to be optimized. We propose solutions for two scenarios. For the scenario where an existing all-copper network from the central office to the customers is to be transformed into a fiber-copper network with remote DSLAM units, we present optimal polynomial-time solutions. In the green-field scenario, both the access network layout and the placement of remote DSLAM units must be determined. We show that this problem is NP-complete. We present an optimal ILP formulation and also design an effici...

  15. Modeling Access Control Policy of a Social Network

    Directory of Open Access Journals (Sweden)

    Chaimaa Belbergui

    2016-06-01

    Full Text Available Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information, privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.

  16. Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks

    Directory of Open Access Journals (Sweden)

    M. Mazhar U. Rathore

    2015-07-01

    Full Text Available VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN. In some countries, like Pakistan, the commercial usage of VoIP is prohibited. Internet service providers (ISPs and telecommunication authorities are interested in detecting VoIP calls to either block or prioritize them. So detection of VoIP calls is important for both types of authorities. Signature-based, port-based, and pattern-based VoIP detection techniques are inefficient due to complex and confidential security and tunneling mechanisms used by VoIP. In this paper, we propose a generic, robust, efficient, and practically implementable statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice flows using threshold values of flow statistical parameters. We have made a comparison with existing techniques and evaluated our system with respect to accuracy and efficiency. Our system has 97.54% direct rate and .00015% false positive rate.

  17. Analysis of Voice Solution on TD-LTE Network%TD-LTE语音解决方案分析

    Institute of Scientific and Technical Information of China (English)

    张香云; 李佳俊; 李轶群

    2015-01-01

    LTE voice solution is one of the key points in the LTE network,in the LTE FDD and TD-LTE merged network,there are four voice solutions in TD-LTE network when VoLTE has been deployed in LTE FDD. It mainly analyzes the advantages and disad-vantages of the above solution. Combined with network evolution demands of China Unicom,it provides the strategic advices for the deployment of TD-LTE voice services.%LTE语音解决方案是业界关注的重点之一,在LTE FDD与TD-LTE融合组网情况下,当LTE FDD网络已经部署VoLTE时,TD-LTE网络存在4种语音解决方案。分析并研究了4种方案的优缺点,结合中国联通网络发展现状和演进需求,为TD-LTE语音业务部署提供建议。

  18. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  19. An evaluation of Access Tier local area network switches.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Olsberg, Ronald R.

    2004-06-01

    This reports tabulates the Test and Evaluation results of the Access Class Switch tests conducted by members of Department 9336. About 15 switches were reviewed for use in the enterprise network as access tier switches as defined in a three tier architecture. The Access Switch Tier has several functions including: aggregate customer desktop ports, preserve and apply QoS tags, provide switched LAN access, provide VLAN assignment, as well as others. The typical switch size is 48 or less user ports. The evaluation team reviewed network switch evaluation reports from the Tolly Group as well as other sources. We then used these reports as a starting point to identify particular switches for evaluation. In general we reviewed the products of dominant equipment manufacturers. Also, based on architectural design requirements, the majority of the switches tested were of relatively small monolithic unit variety.

  20. A Fuzzy Logic Based Power Control for Wideband Code Division Multiple Access Wireless Networks

    Directory of Open Access Journals (Sweden)

    T. Ravichandran

    2012-01-01

    Full Text Available Problem statement: Resource management is one of the most important engineering issues in 3G systems where multiple traffic classes are supported each being characterized by its required Quality of Service (QoS parameters. Call Admission Control (CAC is one of the resource management functions, which regulates network access to ensure QoS provisioning. Efficient CAC is necessary for the QoS provisioning in WCDMA environment. The effective functioning of WCDMA systems is influenced by the power control utility. Approach: In this study, we propose to design a fuzzy logic based power control for Wideband Code Division Multiple Access Wireless Networks. This proposed technique is aimed at multiple services like voice, video and data for multiclass users. The fuzzy logic technique is used to estimate the optimal admissible users group inclusive of optimum transmitting power level. This technique reduces the interference level and call rejection rate. Results: By simulation results, we demonstrate that the proposed technique achieve reduced energy consumption for a cell with increased throughput. Conclusion: The proposed technique minimizes the power consumption and call rejection rate.

  1. Photonic devices for next-generation broadband fiber access networks

    Science.gov (United States)

    Kazovsky, Leonid G.; Yen, She-Hwa; Wong, Shing-Wa

    2011-01-01

    Next-generation optical access networks will deliver substantial benefits to consumers including a dedicated high-QoS access to bit rates of hundreds of Megabits per second. They must include the following features such as: reduced total cost of ownership, higher reliability, lower energy consumption, better flexibility and efficiency. This paper will describe recent progress and technology toward that goal using novel photonic devices

  2. Modeling of Bandwidth Aggregation over Heterogeneous Wireless Access Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Dittmann, Lars

    2012-01-01

    Motivated by the multihomming capability of the mobile devices and the fact that the heterogeneous wireless access networks overlap in coverage, mobile operators are looking for solutions that will benefit by simultaneous use of the available multiple access interfaces. Multipath or multilink...... transfer deals with the problem on how to effectively aggregate the bandwidth by simultaneous usage of heterogeneous networks that a host is attached to in order to improve the throughput. This paper deals with a simulation based analysis of bandwidth aggregation techniques and their impact on higher layer...

  3. High speed OFDM-CDMA optical access network.

    Science.gov (United States)

    Guo, X; Wang, Q; Zhou, L; Fang, L; Wonfor, A; Penty, R V; White, I H

    2016-04-15

    We demonstrate the feasibility of a 16 × 3.75 Gb/s (60 Gb/s aggregate) Orthogonal frequency division multiplexing-code division multiple access passive optical network for next-generation access applications. 3.75 Gb/s PON channel transmission over 25 km single-mode fiber shows 0.1 dB dispersion and 0.9 dB crosstalk penalties. Advantages of the system include high capacity, enhanced spectral efficiency, coding gain, and networking functions such as increased security and single-wavelength operation.

  4. Dynamic Resource Allocation in Hybrid Access Femtocell Network

    Directory of Open Access Journals (Sweden)

    Afaz Uddin Ahmed

    2014-01-01

    Full Text Available Intercell interference is one of the most challenging issues in femtocell deployment under the coverage of existing macrocell. Allocation of resources between femtocell and macrocell is essential to counter the effects of interference in dense femtocell networks. Advances in resource management strategies have improved the control mechanism for interference reduction at lower node density, but most of them are ineffective at higher node density. In this paper, a dynamic resource allocation management algorithm (DRAMA for spectrum shared hybrid access OFDMA femtocell network is proposed. To reduce the macro-femto-tier interference and to improve the quality of service, the proposed algorithm features a dynamic resource allocation scheme by controlling them both centrally and locally. The proposed scheme focuses on Femtocell Access Point (FAP owners’ satisfaction and allows maximum utilization of available resources based on congestion in the network. A simulation environment is developed to study the quantitative performance of DRAMA in hybrid access-control femtocell network and compare it to closed and open access mechanisms. The performance analysis shows that higher number of random users gets connected to the FAP without compromising FAP owners’ satisfaction allowing the macrocell to offload a large number of users in a dense heterogeneous network.

  5. Greening radio access networks using distributed base station architectures

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2010-01-01

    . However besides this, increasing energy efficiency represents a key factor for reducing operating expenses and deploying cost effective mobile networks. This paper presents how distributed base station architectures can contribute in greening radio access networks. More specifically, the advantages...... of introducing remote radio head modules are discussed. Substantial flexibility is provided in terms of power consumption, as a result of combining efficient hardware with intelligent software. Additionally, it is underlined that designing eco-sustainable systems needs to follow a holistic approach towards...

  6. The challenges of M2M massive access in wireless cellular networks

    Directory of Open Access Journals (Sweden)

    Andrea Biral

    2015-02-01

    Full Text Available The next generation of communication systems, which is commonly referred to as 5G, is expected to support, besides the traditional voice and data services, new communication paradigms, such as Internet of Things (IoT and Machine-to-Machine (M2M services, which involve communication between Machine-Type Devices (MTDs in a fully automated fashion, thus, without or with minimal human intervention. Although the general requirements of 5G systems are progressively taking shape, the technological issues raised by such a vision are still partially unclear. Nonetheless, general consensus has been reached upon some specific challenges, such as the need for 5G wireless access networks to support massive access by MTDs, as a consequence of the proliferation of M2M services. In this paper, we describe the main challenges raised by the M2M vision, focusing in particular on the problems related to the support of massive MTD access in current cellular communication systems. Then we analyze the most common approaches proposed in the literature to enable the coexistence of conventional and M2M services in the current and next generation of cellular wireless systems. We finally conclude by pointing out the research challenges that require further investigation in order to provide full support to the M2M paradigm.

  7. Unheard voices: a qualitative exploration of fathers' access of child safety information.

    Science.gov (United States)

    Olsen, Lise L; Kruse, Sami; Brussoni, Mariana

    2013-02-01

    To gain an understanding about fathers' perspectives and practices related to accessing information on childhood safety. Qualitative interviews were carried out with 32 fathers of children aged 2-7 years in British Columbia, Canada. Interview questions investigated whether fathers accessed information on child safety issues, the type of information they searched for, and the resources they used. Transcripts were examined using thematic content analysis. Fathers reported varied processes for searching for information and emphasized a need for credible, synthesized information. The internet was the source of child safety information fathers mentioned most frequently. Published information, resources from community organizations including general, educational and health organizations and access to personal connections were also seen as important. Fathers' involvement in childcare is growing and they play a significant role in ensuring children's safety. Increasing fathers' knowledge on safety related practices can contribute to a reduction in childhood injuries. The results of this study provide an in-depth exploration of fathers' perspectives and practices that can inform the design of materials and dissemination strategies to help increase and optimize access to safety information.

  8. Effective number of accessed nodes in complex networks.

    Science.gov (United States)

    Viana, Matheus P; Batista, João L B; Costa, Luciano da F

    2012-03-01

    The measurement called accessibility has been proposed as a means to quantify the efficiency of the communication between nodes in complex networks. This article reports results regarding the properties of accessibility, including its relationship with the average minimal time to visit all nodes reachable after h steps along a random walk starting from a source, as well as the number of nodes that are visited after a finite period of time. We characterize the relationship between accessibility and the average number of walks required in order to visit all reachable nodes (the exploration time), conjecture that the maximum accessibility implies the minimal exploration time, and confirm the relationship between the accessibility values and the number of nodes visited after a basic time unit. The latter relationship is investigated with respect to three types of dynamics: traditional random walks, self-avoiding random walks, and preferential random walks.

  9. An Efficient Multi Access Protocol for Wireless Networks

    Directory of Open Access Journals (Sweden)

    T. Suryaprakash Reddy

    2010-09-01

    Full Text Available In this paper, we propose and evaluate an efficient multi-access protocol for cell-based wireless networks. Our protocol addresses the problems in existing random-access protocols for wireless networks: long-term fairness as well as short term fairness in accessing a shared channel and the detection of hidden and exposed collisions. Our proposed protocol is a limited contention protocol in which the set of contending mobiles are chosen based on a global common contention window maintained by every mobile station. The contention window is adjusted based on three possible channel states: no transmission, success, and collision. We assume that the channel state at the end of each contention slot is broadcast by a base station in a control channel. We show analytically that the time interval between two successive accesses to the channel by any station is geometrically distributed, and that each station has equal chance to access the channel in every contention period. This is significantly better than existing random-access protocols based on the binary exponential backoff algorithm, which results in large variances in inter-access delays. Our experimental results also show that the number of contention slots to resolve collisions is constant on the average, independent of the number of contending stations.

  10. LONG-REACH OPTICAL ACCESS NETWORKS (LR-OANS: A PROMISING CANDIDATE FOR FUTURE OPTICAL ACCESS

    Directory of Open Access Journals (Sweden)

    I.M.M. Mohamed

    2014-01-01

    Full Text Available The ever-increasing demand for broader bandwidth per user, which results from the continuous development of new bandwidth-hungry services and applications, creates the motivation to upgrade the currently deployed Time-Division Multiplexing Passive Optical Networks (TDM-PONs to Next-Generation Optical Access Networks (NG-OANs. Beside the need for more bandwidth per user, a further extension in the range and an increase in the split ratio are highly desirable in PONs. These additional requirements can be achieved by adopting so-called Long-Reach Optical Access Networks (LR-OANs. LR-OANs offer a promising solution that ensures a significant number of users can be supported over a longer range. Moreover, they introduce a cost-effective approach in which both the access and metro segments of the telecommunication network are combined into one backhaul segment, which results in the consolidation of many central offices into one trunk-exchange. This cost-effective approach gave us the motivation to provide a comprehensive survey on the LR-OANs. In this study, we first provide a brief review of different potential technologies, proposed for next-generation optical access. We then provide a review of different stat-of-the-art LR-OAN architectures including opportunities and challenges in each one. A comparison among them based on key network specification is also provided.

  11. Spectrum access and management for cognitive radio networks

    CERN Document Server

    2017-01-01

    This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.

  12. Requirements and Algorithms for Cooperation of Heterogeneous Radio Access Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Tragos, Elias; Mino, Emilio

    2009-01-01

    This paper defines the requirements for cooperation of heterogeneous radio access networks (RANs) and proposes a novel radio resource management (RRM) framework for support of mobility and quality of service (QoS) in a heterogeneous communication environment comprising IMT-Advanced and legacy...

  13. Network Asymmetries and Access Pricing in Cellular Telecommunications

    NARCIS (Netherlands)

    V. Kocsis

    2005-01-01

    textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger reputa

  14. Large optical 3D MEMS switches in access networks

    Science.gov (United States)

    Madamopoulos, Nicholas; Kaman, Volkan; Yuan, Shifu; Jerphagnon, Olivier; Helkey, Roger; Bowers, John E.

    2007-09-01

    Interest is high among residential customers and businesses for advanced, broadband services such as fast Internet access, electronic commerce, video-on-demand, digital broadcasting, teleconferencing and telemedicine. In order to satisfy such growing demand of end-customers, access technologies such as fiber-to-the-home/building (FTTH/B) are increasingly being deployed. Carriers can reduce maintenance costs, minimize technology obsolescence and introduce new services easily by reducing active elements in the fiber access network. However, having a passive optical network (PON) also introduces operational and maintenance challenges. Increased diagnostic monitoring capability of the network becomes a necessity as more and more fibers are provisioned to deliver services to the end-customers. This paper demonstrates the clear advantages that large 3D optical MEMS switches offer in solving these access network problems. The advantages in preventative maintenance, remote monitoring, test and diagnostic capability are highlighted. The low optical insertion loss for all switch optical connections of the switch enables the monitoring, grooming and serving of a large number of PON lines and customers. Furthermore, the 3D MEMS switch is transparent to optical wavelengths and data formats, thus making it easy to incorporate future upgrades, such higher bit rates or DWDM overlay to a PON.

  15. Network Asymmetries and Access Pricing in Cellular Telecommunications

    NARCIS (Netherlands)

    V. Kocsis

    2005-01-01

    textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger reputa

  16. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  17. Measuring sustainable accessibility potential using the mobility infrastructure's network configuration

    NARCIS (Netherlands)

    Gil, J.; Read, S.

    2012-01-01

    This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as walkin

  18. Network-Initiated Terminal Mobility in Voice over 3GPP-WLAN

    Directory of Open Access Journals (Sweden)

    Wei-Kuo Chiang

    2008-02-01

    Full Text Available This paper proposes a network-initiated terminal mobility mechanism (NITM to facilitate handover with the session initiation protocol (SIP in 3GPP Voice over WLAN (3GPP VoWLAN. We design the E2E tunnel state model running on the packet data gateway (PDG using the CAMEL concept, and introduce the mobility server (MS as a SIP application server to re-establish sessions with third party call control (3PCC. The MS is triggered to provide the terminal mobility service from the PDG by detecting the state transition of the E2E tunnel state model that represents the occurrence of a handover. This mechanism can advance the time to re-establish sessions. That is, our approach can provide smaller handover delay than mobileinitiated terminal mobility; moreover, it can handle mobility without additional support from the mobile host (MH. In addition, the handover missing problem (messages lost might happen when the MH moves under communication. With the help of the MS, the lost messages are re-sent, and the handover missing problem, including simultaneous movement, is therefore solved.

  19. Dynamic Resource Access Using Graphical Game in Asymmetric Wireless Networks

    Directory of Open Access Journals (Sweden)

    Fangwei Li

    2013-08-01

    Full Text Available In order to improve the resource utilization in asymmetric wireless networks, a novel dynamic resource access algorithm was presented. As the asymmetry of information and the locality of users' actions in distributed wireless networks, the resource access problem was expressed as a simple graphical game model. Let the graphic topology indicate the internal game structure of the realistic environment. Then the Nash equilibrium was got by minimizing the individual regret instead of the system regret. The proposed algorithm realized efficient resource access through exchanging the active information and regret in the competitive community. Theoretical analysis and simulation results show that the algorithm can converge to a suitable pure strategy Nash equilibrium point quickly with less amount of calculation, avoids conflict effectively, and improves the system capacity and power utilization especially in the condition of insufficient resources

  20. A secure network access system for mobile IPv6

    Science.gov (United States)

    Zhang, Hong; Yuan, Man; He, Rui; Jiang, Luliang; Ma, Jian; Qian, Hualin

    2004-03-01

    With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.

  1. A Distributed MAC Protocol for Cooperation in Random Access Networks

    CERN Document Server

    Böcherer, Georg

    2008-01-01

    WLAN is one of the most successful applications of wireless communications in daily life because of low cost and ease of deployment. The enabling technique for this success is the use of random access schemes for the wireless channel. Random access requires minimal coordination between the nodes, which considerably reduces the cost of the infrastructure. Recently, cooperative communication in wireless networks has been of increasing interest because it promises higher rates and reliability. An additional MAC overhead is necessary to coordinate the nodes to allow cooperation and this overhead can possibly cancel out the cooperative benefits. In this work, a completely distributed protocol is proposed that allows nodes in the network to cooperate via Two-Hop and Decode-and-Forward for transmitting their data to a common gateway node. It is shown that high throughput gains are obtained in terms of the individual throughput that can be guaranteed to any node in the network. These results are validated by Monte Ca...

  2. Optimal Medium Access Protocols for Cognitive Radio Networks

    CERN Document Server

    Lai, Lifeng; Jiang, Hai; Poor, H Vincent

    2008-01-01

    This paper focuses on the design of medium access control protocols for cognitive radio networks. The scenario in which a single cognitive user wishes to opportunistically exploit the availability of empty frequency bands within parts of the radio spectrum having multiple bands is first considered. In this scenario, the availability probability of each channel is unknown a priori to the cognitive user. Hence efficient medium access strategies must strike a balance between exploring (learning) the availability probability of the channels and exploiting the knowledge of the availability probability identified thus far. For this scenario, an optimal medium access strategy is derived and its underlying recursive structure is illustrated via examples. To avoid the prohibitive computational complexity of this optimal strategy, a low complexity asymptotically optimal strategy is developed. Next, the multi-cognitive user scenario is considered and low complexity medium access protocols, which strike an optimal balanc...

  3. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani;

    2013-01-01

    This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...... to the incoming and outgoing packet ratio. We describe the new protocol as an extension to the CSMA/CA protocol and implement the protocol on our own hardware platform. By means of our own testbed, we investigate two basic network structures, namely, the two-way relay and the cross topology. It is well known...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  4. Auction pricing of network access for North American railways

    DEFF Research Database (Denmark)

    Harrod, Steven

    2013-01-01

    The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate that the i...... that the infrastructure entity will receive approximately 15.6% less than the true value of the contracted train paths. This loss of revenue threatens the objective of reducing government subsidy for the railway network. (C) 2012 Elsevier Ltd. All rights reserved....

  5. Toward a future access network: XL-PON, PIEMAN, and fully tuneable networks

    Science.gov (United States)

    Rohde, Harald; Smolorz, Sylvia; Xie, Changsong; Kloppe, Karl; Randel, Sebastian

    2007-11-01

    The strategic objective of the European Union to provide broadband access for all of its citizens and also to develop technologies suitable for worldwide use leads to a number of projects aiming on different stages of the technological evolution of next generation fibre-to-the-X access networks. In order to catch up the revenue gap novel technologies are required that offer reduced CAPEX and OPEX. This can be obtained by a converged metro and access network with enhanced reach and splitting factor. Within the project MUSE for the first time a full-functional prototype of a future 10/2.5Gbit/s XL-PON (eXtra Large Passive Optical Network) system was realized and tested. The prototype systems consists of OLT, ONT, and an intermediate stage, called Metro Access Point (MAP) which contains optical amplifiers and a burst-mode transponder for 2.5Gbit/s. The XL-PON prototype fulfils all major requirements of a future next-generation PON1. The PIEMAN project which started a year later researches the physical layer of a symmetrical 10 Gbit/s, 32 wavelength, 100 km reach and 512 way split access network2 and shows very promising results until today. Both PIEMAN and XL-PON are intermediate steps towards the goal of a fully reconfigurable, fully tuneable combined WDM and TDM access networks which offers a multitude of services on a multitude of wavelength which are routed and activated as the demand requires.

  6. Scheduling Data Access in Smart Grid Networks Utilizing Context Information

    DEFF Research Database (Denmark)

    Findrik, Mislav; Grønbæk, Jesper; Olsen, Rasmus Løvenstein

    2014-01-01

    Current electrical grid is facing increased penetration of intermittent energy resources, in particular wind and solar energy. Fast variability of the power supply due to renewable energy resources can be balanced out using different energy storage systems or shifting the loads. Efficiently...... of this approach for a constraint communication networks of the smart grid and compared three general data access mechanisms, namely, push, pull and event-based....

  7. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...... information access mechanism and show how trade-off between energy consumption and information reliability can be achieved....

  8. A physical layer perspective on access network sharing

    Science.gov (United States)

    Pfeiffer, Thomas

    2015-12-01

    Unlike in copper or wireless networks, there is no sharing of resources in fiber access networks yet, other than bit stream access or cable sharing, in which the fibers of a cable are let to one or multiple operators. Sharing optical resources on a single fiber among multiple operators or different services has not yet been applied. While this would allow for a better exploitation of installed infrastructures, there are operational issues which still need to be resolved, before this sharing model can be implemented in networks. Operating multiple optical systems and services over a common fiber plant, autonomously and independently from each other, can result in mutual distortions on the physical layer. These distortions will degrade the performance of the involved systems, unless precautions are taken in the infrastructure hardware to eliminate or to reduce them to an acceptable level. Moreover, the infrastructure needs to be designed such as to support different system technologies and to ensure a guaranteed quality of the end-to-end connections. In this paper, suitable means are proposed to be introduced in fiber access infrastructures that will allow for shared utilization of the fibers while safeguarding the operational needs and business interests of the involved parties.

  9. Accessing a Network using a Secure Android Application

    Directory of Open Access Journals (Sweden)

    Padmalatha Ragunathan

    2012-07-01

    Full Text Available Security plays a vital role in today’s mobile world. There are security issues like sniffing of data while accessing information through open channel. Proper security measures can help to deal with the common security threats faced by mobile phone users such as data protection, privacy, application and personal information security. Cryptographic techniques play an important role in protecting communication links and data, since access to data can be limited to those who hold the proper key. This paper discusses a method to securely access information in a network by an android mobile application using AES cryptographic technique. The paper describes a new key sharing algorithm, based on the symmetric key management, for faster and efficient encryption of data that is suitable for use in a mobile device.

  10. Broadband access network reference models: a different prospective

    Science.gov (United States)

    Mostafa, Mohamed S.

    1996-11-01

    The current view of the fiber-based broadband access network is that it could basically be modeled into two target networks represented by the following architectures, the fiber to the curb, building, home (FTTC/B/H) -- also termed switched digital video (SDV) -- architecture, and the hybrid fiber coax (HFC) architecture. Both architectures support on-demand digital services. One way to distinguish between these two architectures is based on the digital modulation scheme. The SDV/FTTC architecture utilizes baseband digital modulation both in the fiber distribution and the point-to- point drop. Whereas, the HFC architecture is pass-band and utilizes digitally modulated (as well as analog modulated) subcarriers both on the fiber and the coax for distribution to customers. From a network modeling point of view, the distinction between these two architectures is fuzzy. A hybrid between the above two architectures represents other architectural advantages especially bandwidth utilization in the upstream direction. This paper describes this hybrid architecture and provides an evaluation of the different access network configuration scenarios based on an expanded version of the DAVIC reference models.

  11. A Network Access Control Framework for 6LoWPAN Networks

    Directory of Open Access Journals (Sweden)

    Amaro F. de Sousa

    2013-01-01

    Full Text Available Low power over wireless personal area networks (LoWPAN, in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes.

  12. Monday 9 January 2006: RESTRICTED ACCESS to the Technical Network

    CERN Multimedia

    CNIC Users Exchange and IT/CS

    2005-01-01

    As of Monday 9 January 2006, Ethernet access from the general CERN network to the Technical Network (TN) will be restricted in order to improve security on the TN. As a result, all Ethernet communication between the General Purpose Network (GPN) and the TN will be filtered. Only communication lines to the general IT services such as DNS, TP, NICE, DFS, AFS, Antivirus, Linux installation servers, License servers, OracleDB, TSM backup servers and dedicated AB and TS servers on the GPN will remain open. Please make sure that all your devices are registered properly in the network database (LANDB): http://network.cern.ch/. You are encouraged to make proper use of the 'Tag' and 'Description' fields in order to identify your system later on. If your system depends on special services on the GPN or is split between the GPN and the TN, e.g. consists of devices (PCs, PLCs, VME crates, webcams, etc.) connected to both the TN and the GPN, please contact the Technical-Network.Administrator@cern.ch . They will include...

  13. Monday 9 January 2006: RESTRICTED ACCESS to the Technical Network

    CERN Multimedia

    CNIC Users Exchange and IT/CS

    2005-01-01

    As of Monday 9 January 2006, Ethernet access from the general CERN network to the Technical Network (TN) will be restricted in order to improve security on the TN. As a result, all Ethernet communication between the General Purpose Network (GPN) and the TN will be filtered. Only communication lines to the general IT services such as DNS, TP, NICE, DFS, AFS, Antivirus, Linux installation servers, License servers, OracleDB, TSM backup servers and dedicated AB and TS servers on the GPN will remain open. Please make sure that all your devices are registered properly in the network database (LANDB): http://network.cern.ch/. You are encouraged to make proper use of the 'Tag' and 'Description' fields in order to identify your system later on. If your system depends on special services on the GPN or is split between the GPN and the TN, e.g. consists of devices (PCs, PLCs, VME crates, webcams, etc.) connected to both the TN and the GPN, please contact the Technical-Network.Administrator@cern.ch . They will include...

  14. Distributed cloud association in downlink multicloud radio access networks

    KAUST Repository

    Dahrouj, Hayssam

    2015-03-01

    This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS\\'s) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where each user can be connected to one (and only one) cloud. This paper studies the user-to-cloud-assignment problem by maximizing a network-wide utility subject to practical cloud connectivity constraints. The paper solves the problem by using an auction-based iterative algorithm, which can be implemented in a distributed fashion through a reasonable exchange of information between the clouds. The paper further proposes a centralized heuristic algorithm, with low computational complexity. Simulations results show that the proposed algorithms provide appreciable performance improvements as compared to the conventional cloud-less assignment solutions. © 2015 IEEE.

  15. Greening radio access networks using distributed base station architectures

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2010-01-01

    Several actions for developing environmentally friendly technologies have been taken in most industrial fields. Significant resources have also been devoted in mobile communications industry. Moving towards eco-friendly alternatives is primarily a social responsibility for network operators....... However besides this, increasing energy efficiency represents a key factor for reducing operating expenses and deploying cost effective mobile networks. This paper presents how distributed base station architectures can contribute in greening radio access networks. More specifically, the advantages...... of introducing remote radio head modules are discussed. Substantial flexibility is provided in terms of power consumption, as a result of combining efficient hardware with intelligent software. Additionally, it is underlined that designing eco-sustainable systems needs to follow a holistic approach towards...

  16. Ubiquitous map-image access through wireless overlay networks

    Science.gov (United States)

    Cai, Jianfei; Huang, Haijie; Ni, Zefeng; Chen, Chang Wen

    2004-10-01

    With the availability of various wireless link-layer technologies, such as Bluetooth, WLAN and GPRS, in one wireless device, ubiquitous communications can be realized through managing vertical handoff in the environment of wireless overlay networks. In this paper, we propose a vertical handoff management system based on mobile IPv6, which can automatically manage the multiple network interfaces on the mobile device, and make decisions on network interface selection according to the current situation. Moreover, we apply our proposed vertical handoff management with JPEG-2000 codec to the wireless application of map image access. The developed system is able to provide seamless communications, as well as fast retrieve any interested map region with any block size, in different resolutions and different color representations directly from the compressed bitstream.

  17. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-09-06

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station (BS), where each BS is connected to the cloud via either a wireless or capacity-limited wireline backhaul link. The paper addresses the joint design of the hybrid backhaul links (i.e., designing the wireline and wireless backhaul connections from the cloud to the BSs) and the access links (i.e., determining the sparse beamforming solution from the BSs to the users). The paper formulates the hybrid backhaul and access link design problem by minimizing the total network power consumption. The paper solves the problem using a two-stage heuristic algorithm. At one stage, the sparse beamforming solution is found using a weighted mixed 11/12 norm minimization approach; the correlation matrix of the quantization noise of the wireline backhaul links is computed using the classical rate-distortion theory. At the second stage, the transmit powers of the wireless backhaul links are found by solving a power minimization problem subject to quality-of-service constraints, based on the principle of conservation of rate by utilizing the rates found in the first stage. Simulation results suggest that the performance of the proposed algorithm approaches the global optimum solution, especially at high signal-to-interference-plus-noise ratio (SINR).

  18. Extending AAA operational model for profile-based access control in ethernet-based Neutral Access Networks

    NARCIS (Netherlands)

    Matias, J.; Jacob, E.; Demchenko, Y.; de Laat, C.; Gommans, L.; Macías López, E.M.; Bogliolo, A.; Perry, M.; Ran, M

    2010-01-01

    Neutral Access Networks (NAN) have appeared as a new model to overcome some restrictions and lack of flexibility that are present currently in broadband access networks. NAN brings new business opportunities by opening this market to new stakeholders. Although the NAN model is accepted, there are so

  19. Understanding VoIP Internet Telephony and the Future Voice Network

    CERN Document Server

    Flanagan, William A

    2012-01-01

    Translates technical jargon into practical business communications solutions This book takes readers from traditional voice, fax, video, and data services delivered via separate platforms to a single, unified platform delivering all of these services seamlessly via the Internet. With its clear, jargon-free explanations, the author enables all readers to better understand and assess the growing number of voice over Internet protocol (VoIP) and unified communications (UC) products and services that are available for businesses. VoIP and Unified Communications is based on the author's careful rev

  20. Supporting Dynamic Spectrum Access in Heterogeneous LTE+ Networks

    Energy Technology Data Exchange (ETDEWEB)

    Luiz A. DaSilva; Ryan E. Irwin; Mike Benonis

    2012-08-01

    As early as 2014, mobile network operators’ spectral capac- ity is expected to be overwhelmed by the demand brought on by new devices and applications. With Long Term Evo- lution Advanced (LTE+) networks likely as the future one world 4G standard, network operators may need to deploy a Dynamic Spectrum Access (DSA) overlay in Heterogeneous Networks (HetNets) to extend coverage, increase spectrum efficiency, and increase the capacity of these networks. In this paper, we propose three new management frameworks for DSA in an LTE+ HetNet: Spectrum Accountability Client, Cell Spectrum Management, and Domain Spectrum Man- agement. For these spectrum management frameworks, we define protocol interfaces and operational signaling scenar- ios to support cooperative sensing, spectrum lease manage- ment, and alarm scenarios for rule adjustment. We also quan- tify, through integer programs, the benefits of using DSA in an LTE+ HetNet, that can opportunistically reuse vacant TV and GSM spectrum. Using integer programs, we consider a topology using Geographic Information System data from the Blacksburg, VA metro area to assess the realistic benefits of DSA in an LTE+ HetNet.

  1. Accessing Wireless Sensor Networks Via Dynamically Reconfigurable Interaction Models

    Directory of Open Access Journals (Sweden)

    Maria Cecília Gomes

    2012-12-01

    Full Text Available The Wireless Sensor Networks (WSNs technology is already perceived as fundamental for science across many domains, since it provides a low cost solution for environment monitoring. WSNs representation via the service concept and its inclusion in Web environments, e.g. through Web services, supports particularly their open/standard access and integration. Although such Web enabled WSNs simplify data access, network parameterization and aggregation, the existing interaction models and run-time adaptation mechanisms available to clients are still scarce. Nevertheless, applications increasingly demand richer and more flexible accesses besides the traditional client/server. For instance, applications may require a streaming model in order to avoid sequential data requests, or the asynchronous notification of subscribed data through the publish/subscriber. Moreover, the possibility to automatically switch between such models at runtime allows applications to define flexible context-based data acquisition. To this extent, this paper discusses the relevance of the session and pattern abstractions on the design of a middleware prototype providing richer and dynamically reconfigurable interaction models to Web enabled WSNs.

  2. Performance of SON for RSRP-based LTE/WLAN access network selection

    NARCIS (Netherlands)

    Kovács, I.Z.; Laselva, D.; Michaelsen, P.H.; Wang, Y.; Djapic, R.; Spaey, K.

    2014-01-01

    Carrier-grade Wireless Local Area Network (WLAN) is becoming an important complementary system to cellular networks for Mobile Network Operators (MNOs). Network controlled access network selection between cellular and WLAN is an essential functionality to optimize network performance and user experi

  3. Performance of SON for RSRP-based LTE/WLAN access network selection

    NARCIS (Netherlands)

    Kovács, I.Z.; Laselva, D.; Michaelsen, P.H.; Wang, Y.; Djapic, R.; Spaey, K.

    2014-01-01

    Carrier-grade Wireless Local Area Network (WLAN) is becoming an important complementary system to cellular networks for Mobile Network Operators (MNOs). Network controlled access network selection between cellular and WLAN is an essential functionality to optimize network performance and user

  4. Engineering costs proxy models for China rural access network and its application

    Institute of Scientific and Technical Information of China (English)

    FU Yun-jin; ZHOU Huang-jia; XIN Zhan-hong; SUN Hong-bin

    2007-01-01

    The article builds three engineering rural access network models that describe the structure of network elements and their relative engineering parameters for cable access、synchronous code division multiple access (SCDMA), and very small aperture terminal (VSAT) access technologies in the rural areas of China. Of the three access technologies, cable access and SCDMA access are the most popular access technologies. Besides, there still exist some remote special areas such as western mountain areas, whose natural environment is so bad that VSAT becomes the unique economical access way. Fully considering rural areas' geographical environments' impact, the article introduces geographical revised factor (GRF) to the models. By substituting the network data from the operators into the models, the article obtains the integrated networking values and does further researches on different access networks.

  5. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    Energy Technology Data Exchange (ETDEWEB)

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  6. Symmetric reconfigurable capacity assignment in a bidirectional DWDM access network.

    Science.gov (United States)

    Ortega, Beatriz; Mora, José; Puerto, Gustavo; Capmany, José

    2007-12-10

    This paper presents a novel architecture for DWDM bidirectional access networks providing symmetric dynamic capacity allocation for both downlink and uplink signals. A foldback arrayed waveguide grating incorporating an optical switch enables the experimental demonstration of flexible assignment of multiservice capacity. Different analog and digital services, such as CATV, 10 GHz-tone, 155Mb/s PRBS and UMTS signals have been transmitted in order to successfully test the system performance under different scenarios of total capacity distribution from the Central Station to different Base Stations with two reconfigurable extra channels for each down and upstream direction.

  7. Bandpass sampling in heterodyne receivers for coherent optical access networks.

    Science.gov (United States)

    Bakopoulos, Paraskevas; Dris, Stefanos; Schrenk, Bernhard; Lazarou, Ioannis; Avramopoulos, Hercules

    2012-12-31

    A novel digital receiver architecture for coherent heterodyne-detected optical signals is presented. It demonstrates the application of bandpass sampling in an optical communications context, to overcome the high sampling rate requirement of conventional receivers (more than twice the signal bandwidth). The concept is targeted for WDM coherent optical access networks, where applying heterodyne detection constitutes a promising approach to reducing optical hardware complexity. The validity of the concept is experimentally assessed in a 76 km WDM-PON scenario, where the developed DSP achieves a 50% ADC rate reduction with penalty-free operation.

  8. Amplified CWDM-based Next Generation Broadband Access Networks

    Science.gov (United States)

    Peiris, Sasanthi Chamarika

    The explosive growth of both fixed and mobile data-centric traffic along with the inevitable trend towards all-IP/Ethernet transport protocols and packet switched networks will ultimately lead to an all-packet-based converged fixed-mobile optical transport network from the core all the way out to the access network. To address the increasing capacity and speed requirements in the access networks, Wavelength-Division Multiplexed (WDM) and/or Coarse WDM (CWDM)-based Passive Optical Networks (PONs) are expected to emerge as the next-generation optical access infrastructures. However, due to several techno-economic hurdles, CWDM-PONs are still considered an expensive solution and have not yet made any significant inroads into the current access area. One of the key technology hurdles is the scalability of the CWDM-based PONs. Passive component optical insertion losses limit the reach of the network or the number of served optical network units (ONUs). In the recent years, optical amplified CWDM approaches have emerged and new designs of optical amplifiers have been proposed and demonstrated. The critical design parameter for these amplifiers is the very wide optical amplification bandwidth (e.g., 340 nm combined for both directions). The objective of this PhD dissertation work is first to engineer ring and tree-ring based PON architectures that can achieve longer unamplified PON reach and/or provide service to a greater number of ONUs and customers. Secondly is to develop new novel optical amplifier schemes to further address the scalability limitation of the CWDM-based PONs. Specifically, this work proposes and develops novel ultra wide-band hybrid Raman-Optical parametric amplifier (HROPA) schemes that operate over nearly the entire specified CWDM band to provide 340 nm bidirectional optical gain bandwidth over the amplified PON's downstream and upstream CWDM wavelength bands (about 170 nm in each direction). The performance of the proposed HROPA schemes is assessed

  9. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever......-changing environmental energy sources. In this paper, we present an improved and extended version of ODMAC and we analyze it by means of an analytical model that can approximate several performance metrics in an arbitrary network topology. The simulations and the analytical experiments show ODMAC's ability to satisfy...... three key properties of EH-WSNs: adaptability of energy consumption, distributed energy-aware load balancing and support for different application-specific requirements....

  10. High Dimensional Modulation and MIMO Techniques for Access Networks

    DEFF Research Database (Denmark)

    Binti Othman, Maisara

    the capacity per wavelength of the femto-cell network. Bit rate up to 1.59 Gbps with fiber-wireless transmission over 1 m air distance is demonstrated. The results presented in this thesis demonstrate the feasibility of high dimensionality CAP in increasing the number of dimensions and their potentially......Exploration of advanced modulation formats and multiplexing techniques for next generation optical access networks are of interest as promising solutions for delivering multiple services to end-users. This thesis addresses this from two different angles: high dimensionality carrierless...... amplitudephase (CAP) and multiple-input multiple-output (MIMO) radio-over-fiber (RoF) systems. High dimensionality CAP modulation has been investigated in optical fiber systems. In this project we conducted the first experimental demonstration of 3 and 4 dimensional CAP with bit rates up to 10 Gb...

  11. Towards Service Sontinuity in IMS Heterogeneous Access Networks

    Directory of Open Access Journals (Sweden)

    Mohammed BOUTABIA

    2011-05-01

    Full Text Available In this paper we tackle the mobility issue in IP Multimedia Subsystem (IMS. Although IMS was designedto integrate different access networks, mobility management among these networks is still unresolved. We propose a novel hybrid mobility management scheme, based on tight cooperation between fast handovers for mobile IPv6 (FMIPv6 and session initiation protocol (SIP to ensure an uninterrupted real-time service. Moreover, the new Media Independent Handover (MIH service is integrated into IMS architecture in order to perform intelligent and accurate horizontal and vertical handovers. We investigate two handover cases: selected handover and forced handover. Selected handover takes place when user equipment (UE is connected to the network via two interfaces at the same time and decides to upgrade the quality of its connection following a given criterion (i.e. cost, bandwidth…etc without having any difficulty in the previous link. As far as forced handover is concerned, it occurs when thesignal reaches a critical level and UE is forced to make a handover in order to maintain the ongoing communication. This case is managed in two phases. The first one or the fast phase is handled by FMIPv6 protocol to preserve as soon as possible packets of the ongoing communication. The second one or the slow phase is handled by SIP protocol to optimize packet delivery route. By doing so, we exploit the benefits of both network layer and application mobility protocols to ensure a continuous session over the two networks without imposing new elements to the network. Through a comparison with other mobility mechanisms, we show in the analytic analysis that our hybrid scheme presents better results in terms of handover latency and packet loss.

  12. Enhancing Sensing and Channel Access in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2014-06-18

    Cognitive radio technology is a promising technology to solve the wireless spectrum scarcity problem by intelligently allowing secondary, or unlicensed, users access to the primary, licensed, users\\' frequency bands. Cognitive technology involves two main tasks: 1) sensing the wireless medium to assess the presence of the primary users and 2) designing secondary spectrum access techniques that maximize the secondary users\\' benefits while maintaining the primary users\\' privileged status. On the spectrum sensing side, we make two contributions. First, we maximize a utility function representing the secondary throughput while constraining the collision probability with the primary below a certain value. We optimize therein the channel sensing time, the sensing decision threshold, the channel probing time, together with the channel sensing order for wideband primary channels. Second, we design a cooperative spectrum sensing technique termed sensing with equal gain combining whereby cognitive radios simultaneously transmit their sensing results to the fusion center over multipath fading reporting channels. The proposed scheme is shown to outperform orthogonal reporting systems in terms of achievable secondary throughput and to be robust against phase and synchronization errors. On the spectrum access side, we make four contributions. First, we design a secondary scheduling scheme with the goal of minimizing the secondary queueing delay under constraints on the average secondary transmit power and the maximum tolerable primary outage probability. Second, we design another secondary scheduling scheme based on the spectrum sensing results and the primary automatic repeat request feedback. The optimal medium access probabilities are obtained via maximizing the secondary throughput subject to constraints that guarantee quality of service parameters for the primary. Third, we propose a three-message superposition coding scheme to maximize the secondary throughput without

  13. Access Path Planning of Mobile Agent in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chaoyu Yang

    2014-02-01

    Full Text Available Adopting the two-stage optimization model and hybrid optimized algorithm based on evolutionary computation, a new two-stage optimization model that more conforms to the actual demand is proposed on the basis of formal description of Mobile Agent access path planning. This new model divides the access path planning problem into two sub problems of integer linear programming --data integration sub paths and return sub paths, which can reduce search space and improve the efficiency of algorithm. Then a hybrid optimized method named GAPSO, combined with GA (Genetic Algorithm and PSO (Particle Swarm Optimization, is advanced to solve this model, which integrates discrete PSO into the interlace operation of GA to avoid infeasible solution and improve search quality. Meanwhile convergence can be accelerated by optimizing the GA population with PSO in search of return sub paths. By means of virtual connected topology graph, the high-quality to-be-accessed candidate node set is acquired, the number of to-be-selected nodes is reduced,and the complexity of solution space is decreased, making planning algorithm performance not rely on network scale directly any more. Simulation results show that the advantages of the optimization model is obvious as the node number increases, and GASPO has a better performance than GA and BPSO in the same model

  14. A study of multiple access schemes in satellite control network

    Science.gov (United States)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  15. Uplink Scheduling for Supporting Real Time Voice Traffic in IEEE 802.16 Backhaul Networks

    Institute of Scientific and Technical Information of China (English)

    Lizhong Dai; Dongmei Zhao

    2008-01-01

    In this paper we propose simple enhancements to the bandwidth (BW) request messages in IEEE 802.16 for supporting real-time packet voice traffic. Three different BW request formats are proposed, each requiring a different amount of latency information about the buffered packets at the SS. On this basis, packet scheduling schemes are proposed for the BS to make resource allocations for real-time traffic. Our results show that the proposed BW request and scheduling schemes achieve significantly lower packet loss probability than the standard IEEE 802.16 BW request with round robin scheduling.The results further show that there is an optimum point about how much delay information the SS should report to the BS in order to best utilize the uplink resources while the SS provides satisfactory real-time performance for the voice traffic.

  16. Performance of WLAN RSS-based SON for LTE/WLAN access network selection

    NARCIS (Netherlands)

    Wang, Y.; Djapic, R.; Bergström, A.; Kovács, I.Z.; Laselva, D.; Spaey, K.; Sas, B.

    2014-01-01

    Mobile Network Operators (MNOs) are integrating carrier-grade Wireless Local Area Network (WLAN) to cellular networks to improve network performance and user experience. Access network selection (ANS) between cellular and WLAN plays a key role in the integration. Given the complexity of heterogeneou

  17. SON for LTE-WLAN access network selection : design and performance

    NARCIS (Netherlands)

    Willemen, P.; Laselva, D.; Wang, Y.; Kovács, I.; Djapic, R.; Moerman, I.

    2016-01-01

    Mobile network operators (MNOs) are deploying carrier-grade Wireless Local Area Network (WLAN) as an important complementary system to cellular networks. Access network selection (ANS) between cellular and WLAN is an essential component to improve network performance and user quality-of-service

  18. Equalizing Access to Electronic Networked Resources: A Model for Rural Libraries in the United States.

    Science.gov (United States)

    Senkevitch, Judith J.; Wolfram, Dietmar

    1994-01-01

    Provides an overview of the current state of networking technology in rural libraries and describes a model for educating rural librarians in accessing electronic networks. Topics discussed include information needs in rural libraries; telecommunications technology access in rural areas; and examples of services to enhance information access.…

  19. A Distributed Intranet/Web Solution to Integrated Management of Access Networks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    In this article, we describe the present situation of access network management, enumerate a few problems during the development of network management systems, then put forward a distributed Intranet/Web solution named iMAN to the integrated management of access networks, present its architecture and protocol stack, and describe its application in practice.

  20. A wavelength selective bidirectional isolator for access optical networks

    Science.gov (United States)

    Hu, Xi-kui; Huang, Zhang-di; Li, Su-shan; Xu, Fei; Chen, Beckham; Lu, Yan-qing

    2011-05-01

    A wavelength selective bidirectional optical isolator is proposed. Being different from conventional isolators, a well-designed wave plate is employed and works together with the Faraday rotator. Different wavelengths thus experience different phase retardation so that wavelength-dependent polarization states are obtained for bidirectional beams. As an example, a (1.49 μm, 1.31 μm) wavelength selective isolator is proposed, which means only 1.49 μm light can propagate along one-direction while the opposite wave is just for 1.31 μm light. Over 60 dB optical isolation is obtained by selecting suitable wave plate thickness and orientation. This interesting isolator may have promising applications in access optical networks.

  1. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    KAUST Repository

    Zafar, Ammar

    2012-09-16

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  2. The challenges of M2M massive access in wireless cellular networks

    National Research Council Canada - National Science Library

    Biral, Andrea; Centenaro, Marco; Zanella, Andrea; Vangelista, Lorenzo; Zorzi, Michele

    2015-01-01

    .... Nonetheless, general consensus has been reached upon some specific challenges, such as the need for 5G wireless access networks to support massive access by MTDs, as a consequence of the proliferation of M2M services...

  3. Quantitative analysis of access strategies to remote information in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach......, network delay characterization) and specific requirements on mismatch probability, traffic overhead, and access delay. Finally, the analysis is applied to the use-case of context-sensitive service discovery....

  4. The Effect of Information Access Strategy on Power Consumption and Reliability in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    This paper examines the effect of different information access strategies on power consumption and information reliability, considering the wireless sensor network as the source of information. Basically, the paper explores three different access strategies, namely; reactive, periodic and hybrid...... and computes power consumption and mismatch probability [1] in each of these access strategies. Based on our study, we make some recommendations when and where, which access strategy is suitable depending upon the application's requirements and network behavior. It also provides the model implementation...

  5. Acoustic Metadata Management and Transparent Access to Networked Oceanographic Data Sets

    Science.gov (United States)

    2015-09-30

    Transparent Access to Networked Oceanographic Data Sets Marie A. Roch Dept. of Computer Science San Diego State University 5500 Campanile Drive San...University. In addition to providing database services, the Tethys metadata server also provides access to oceanographic data sets in a consistent...passive acoustic monitoring community. 3 3. Access to network available data products in a standard manner (e.g. ephemeris). 4. Secure access on

  6. A TDMA based media access control protocol for wireless ad hoc networks

    Science.gov (United States)

    Yang, Qi; Tang, Biyu

    2013-03-01

    This paper presents a novel Time Division Multiplex Access (TDMA) based Media Access Control (MAC) protocol of wireless Ad Hoc network. To achieve collision free transmission, time slots in a MAC frame are cataloged into three types, that is access slot, control slot and traffic slot. Nodes in the network access to the network in the access slot, and an exclusive control is allocated subsequently. Data packets are transmission by dynamic schedule the traffic slots. Throughput and transmission delay are also analyzed by simulation experiment. The proposed protocol is capable of providing collision free transmission and achieves high throughput.

  7. Modelling high data rate communication network access protocol

    Science.gov (United States)

    Khanna, S.; Foudriat, E. C.; Paterra, Frank; Maly, Kurt J.; Overstreet, C. Michael

    1990-01-01

    Modeling of high data rate communication systems is different from the low data rate systems. Three simulations were built during the development phase of Carrier Sensed Multiple Access/Ring Network (CSMA/RN) modeling. The first was a model using SIMCRIPT based upon the determination and processing of each event at each node. The second simulation was developed in C based upon isolating the distinct object that can be identified as the ring, the message, the node, and the set of critical events. The third model further identified the basic network functionality by creating a single object, the node which includes the set of critical events which occur at the node. The ring structure is implicit in the node structure. This model was also built in C. Each model is discussed and their features compared. It should be stated that the language used was mainly selected by the model developer because of his past familiarity. Further the models were not built with the intent to compare either structure or language but because the complexity of the problem and initial results contained obvious errors, so alternative models were built to isolate, determine, and correct programming and modeling errors. The CSMA/RN protocol is discussed in sufficient detail to understand modeling complexities. Each model is described along with its features and problems. The models are compared and concluding observations and remarks are presented.

  8. Multiple-access Network Information-flow and Correction Codes

    CERN Document Server

    Dikaliotis, Theodoros K; Jaggi, Sidharth; Vyetrenko, Svitlana; Yao, Hongyi; Effros, Michelle; Kliewer, Joerg; Erez, Elona

    2010-01-01

    This work considers the multiple-access multicast error-correction scenario over a packetized network with $z$ malicious edge adversaries. The network has min-cut $m$ and packets of length $\\ell$, and each sink demands all information from the set of sources $\\sources$. The capacity region is characterized for both a "side-channel" model (where sources and sinks share some random bits that are secret from the adversary) and an "omniscient" adversarial model (where no limitations on the adversary's knowledge are assumed). In the "side-channel" adversarial model, the use of a secret channel allows higher rates to be achieved compared to the "omniscient" adversarial model, and a polynomial-complexity capacity-achieving code is provided. For the "omniscient" adversarial model, two capacity-achieving constructions are given: the first is based on random subspace code design and has complexity exponential in $\\ell m$, while the second uses a novel multiple-field-extension technique and has $O(\\ell m^{|\\sources|})$ ...

  9. Investigation of Coherent Multicarrier Code Division Multiple Access for Optical Access Networks

    Directory of Open Access Journals (Sweden)

    Ali Tamini

    2016-01-01

    Full Text Available Orthogonal frequency division multiplexing (OFDM has proved to be a promising technique to increase the reach and bit rate both in long‑haul communications and in passive optical networks. This paper, for the first time, investigates the use of OFDM combined with electrical CDMA in presence of coherent detection as a multiple access scheme. The proposed multicarrier‑CDMA system is simulated using Walsh‑Hadamard codes and its performance is compared to that of coherent WDM-OFDM system in terms of bit‑error‑rate and bandwidth efficiency. It is shown that MC‑CDMA benefits from better spectral efficiency while its performance slightly deteriorates in comparison to WDM-OFDM when the number of users is increased.

  10. Integration of QoS provisioning in home and access networks

    DEFF Research Database (Denmark)

    Popov, Mikhail; Gavler, A.; Sköldström, P.;

    2010-01-01

    Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed.......Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed....

  11. Enhancing Radio Access Network Performance over LTE-A for Machine-to-Machine Communications under Massive Access

    Directory of Open Access Journals (Sweden)

    Fatemah Alsewaidi

    2016-01-01

    Full Text Available The expected tremendous growth of machine-to-machine (M2M devices will require solutions to improve random access channel (RACH performance. Recent studies have shown that radio access network (RAN performance is degraded under the high density of devices. In this paper, we propose three methods to enhance RAN performance for M2M communications over the LTE-A standard. The first method employs a different value for the physical RACH configuration index to increase random access opportunities. The second method addresses a heterogeneous network by using a number of picocells to increase resources and offload control traffic from the macro base station. The third method involves aggregation points and addresses their effect on RAN performance. Based on evaluation results, our methods improved RACH performance in terms of the access success probability and average access delay.

  12. Distributed Access Control Based on Proxy Signature in M2M Sensor Networks

    Directory of Open Access Journals (Sweden)

    Lingyu Lee

    2013-05-01

    Full Text Available In this study, we have a research of the distributed access control based on proxy signature in M2M sensor networks M2M sensor networks. As M2M sensor networks are usually deployed in hostile environment, the global communication security of M2M sensor networks is and will continue to be a major concern. Although there are many related works on access control in WSNs (Wireless Sensor Networks, Ad-hoc networks, MANETs (Mobile Ad-hoc Networks and etc., they cannot be applied to M2M sensor networks directly. Motivated by this consideration, we develop a secure and distributed access control scheme based on proxy signature for M2M sensor networks, which provides strong authentication and achieves efficiency. Moreover, security of the proposed technique does not rely on availability of a secure channel.

  13. A Traffic Forecasting Method with Function to Control Residual Error Distribution for IP Access Networks

    Science.gov (United States)

    Kitahara, Takeshi; Furuya, Hiroki; Nakamura, Hajime

    Since traffic in IP access networks is less aggregated than in backbone networks, its variance could be significant and its distribution may be long-tailed rather than Gaussian in nature. Such characteristics make it difficult to forecast traffic volume in IP access networks for appropriate capacity planning. This paper proposes a traffic forecasting method that includes a function to control residual error distribution in IP access networks. The objective of the proposed method is to grasp the statistical characteristics of peak traffic variations, while conventional methods focus on average rather than peak values. In the proposed method, a neural network model is built recursively while weighting residual errors around the peaks. This enables network operators to control the trade-off between underestimation and overestimation errors according to their planning policy. Evaluation with a total of 136 daily traffic volume data sequences measured in actual IP access networks demonstrates the performance of the proposed method.

  14. Flow Control and Routing in an Integrated Voice and Data Communication Network

    Science.gov (United States)

    1981-08-01

    arbitrarily small values since this is one way of avoiding congestion. Recall that the voice flow control algorithm operates as follows: nif (i) if Pm (,n...dvn(m) , it increases m if m < am; (ii) if pm( n) < dvn(m), it decreases nif En > 0 ; mm m m n ivn n and (iii) if pm(m) v d(m), it leaves unchanged.m m...n.zn if 0 <t - Za < ai aa t if Oa ni Za j An a1 if. n _~ z n> a. Zf a Z a- ɘ n0n ifO< n < ra-nr Xa ra-r xa <r rn rd if rn -n Xa> rda a a a r a-a

  15. 42 CFR 423.124 - Special rules for out-of-network access to covered Part D drugs at out-of-network pharmacies.

    Science.gov (United States)

    2010-10-01

    ... Part D drugs at out-of-network pharmacies. 423.124 Section 423.124 Public Health CENTERS FOR MEDICARE... access to covered Part D drugs at out-of-network pharmacies. (a) Out-of-network access to covered part D drugs. (1) Out-of-network pharmacy access. A Part D sponsor must ensure that Part D enrollees have...

  16. Access pricing for transmission networks: Hypotheses and empirical evidence

    Energy Technology Data Exchange (ETDEWEB)

    Martoccia, Maria [Decision Technology Centre, London (United Kingdom)

    1999-08-01

    The sectors characterised by the use of transmission or transport networks as inputs of production (electricity, gas, telecommunications) have long been considered as natural monopolies. Thanks to the technological innovations which have modified the economics of production (as in electricity generation) or that have driven the development of high value added services (as in telecommunications), the boundaries of the old natural monopolies have been eroded by the presence of operators potentially able to compete in national and international markets. The objective is to delineate, by analysing the more significant theoretical contributions and some of the restructuring experiences of the sector in question, the possible regulatory solutions which, in the perspective of a `European market` for electricity, makes the management and the expansion of the transmission networks adequate for the `open access` of national electricity sectors. The analysis of some mature experiences, such as in Chile, Argentina, the UK and Norway, in the second section, will offer a useful support to this evaluation. The regulatory solution here adopted will be analysed, in particular, with reference to the two main problems outlined above: on the one hand, the problem of providing through prices the necessary information about the opportunities of using the transmission assets; and on the other hand, the problem of defining an efficient incentive mechanism for the behaviour of the monopolist (the owner of the transmission assets). Finally, by considering the limits found in the solutions explored in these models, we will try, in the third section, to delineate the evolution that the regulation of the analysed sectors could follow, in an attempt to make the optimal solution defined in the first section consistent with the imperfections of the real scenarios. (EHS)

  17. Speech Quality Requirements over DSL Networks

    Directory of Open Access Journals (Sweden)

    Ibrahiem M. M. El Emary

    2010-03-01

    Full Text Available Quality of service (QoS has been a feature of voice communication networks almost since their inception. The extension of traditional voice QoS methods to data communication networks and the Internet has been a longstanding research topic, although for many years it was notconsidered a critical issue due to the inherent differences betweendata and voice traffic and the relatively low cost of over provisioning bandwidth. In particular, over-provisioning of network bandwidth has been common practice since the earliest fiber-optic local-area networks (LANs were deployed, and bandwidth on an optical network was found to be very economical. As VoIP moves from being an interesting and cheap application for enthusiasts to a public service for everybody, the speech quality requirements will be of increasing importance. There are a number of factors that contribute to the userperceived speech quality. Voice over a packet network may introduce new degradations such as packet loss, and increase other degradations such as delay. In this paper, we address Voice-over-IP (VoIP as a trend of transferring voice over DSL access network and explaining the reasons of packet loss in speech signals and the solutions for preventing and recovering from packet loss. We concluded that retransmission of voice packets is not feasible for real-time applications like voice since they have very tight delay-bounds.

  18. Peer Relations and Access to Capital in the Mathematics Classroom: A Bourdieusian Social Network Analysis

    Science.gov (United States)

    Choudry, Sophina; Williams, Julian; Black, Laura

    2017-01-01

    The aim of this article is to explore the structure of social capital in peer networks and its relation to the unequal access of educational resources within mathematics classrooms. We hypothesise that learners can gain access to mathematics through friendship networks which provide more or less help from peers that might sustain (or curtail)…

  19. Online Matchmaking: It's Not Just for Dating Sites Anymore! Connecting the Climate Voices Science Speakers Network to Educators

    Science.gov (United States)

    Wegner, Kristin; Herrin, Sara; Schmidt, Cynthia

    2015-01-01

    Scientists play an integral role in the development of climate literacy skills - for both teachers and students alike. By partnering with local scientists, teachers can gain valuable insights into the science practices highlighted by the Next Generation Science Standards (NGSS), as well as a deeper understanding of cutting-edge scientific discoveries and local impacts of climate change. For students, connecting to local scientists can provide a relevant connection to climate science and STEM skills. Over the past two years, the Climate Voices Science Speakers Network (climatevoices.org) has grown to a robust network of nearly 400 climate science speakers across the United States. Formal and informal educators, K-12 students, and community groups connect with our speakers through our interactive map-based website and invite them to meet through face-to-face and virtual presentations, such as webinars and podcasts. But creating a common language between scientists and educators requires coaching on both sides. In this presentation, we will present the "nitty-gritty" of setting up scientist-educator collaborations, as well as the challenges and opportunities that arise from these partnerships. We will share the impact of these collaborations through case studies, including anecdotal feedback and metrics.

  20. REGIONAL WEBGIS USER ACCESS PATTERNS BASED ON A WEIGHTED BIPARTITE NETWORK

    Directory of Open Access Journals (Sweden)

    R. Li

    2015-07-01

    Full Text Available With the rapid development of geographic information services, Web Geographic Information Systems (WebGIS have become an indispensable part of everyday life; correspondingly, map search engines have become extremely popular with users and WebGIS sites receive a massive volume of requests for access. These WebGIS users and the content accessed have regional characteristics; to understand regional patterns, we mined regional WebGIS user access patterns based on a weighted bipartite network. We first established a weighted bipartite network model for regional user access to a WebGIS. Then, based on the massive user WebGIS access logs, we clustered geographic information accessed and thereby identified hot access areas. Finally we quantitatively analyzed the access interests of regional users and the visitation volume characteristics of regional user access to these hot access areas in terms of user access permeability, user usage rate, and user access viscosity. Our research results show that regional user access to WebGIS is spatially aggregated, and the hot access areas that regional users accessed are associated with specific periods of time. Most regional user contact with hot accessed areas is variable and intermittent but for some users, their access to certain areas is continuous as it is associated with ongoing or recurrent objectives. The weighted bipartite network model for regional user WebGIS access provides a valid analysis method for studying user behaviour in WebGIS and the proposed access pattern exhibits access interest of regional user is spatiotemporal aggregated and presents a heavy-tailed distribution. Understanding user access patterns is good for WebGIS providers and supports better operational decision-making, and helpful for developers when optimizing WebGIS system architecture and deployment, so as to improve the user experience and to expand the popularity of WebGIS.

  1. Regional Webgis User Access Patterns Based on a Weighted Bipartite Network

    Science.gov (United States)

    Li, R.; Shen, Y.; Huang, W.; Wu, H.

    2015-07-01

    With the rapid development of geographic information services, Web Geographic Information Systems (WebGIS) have become an indispensable part of everyday life; correspondingly, map search engines have become extremely popular with users and WebGIS sites receive a massive volume of requests for access. These WebGIS users and the content accessed have regional characteristics; to understand regional patterns, we mined regional WebGIS user access patterns based on a weighted bipartite network. We first established a weighted bipartite network model for regional user access to a WebGIS. Then, based on the massive user WebGIS access logs, we clustered geographic information accessed and thereby identified hot access areas. Finally we quantitatively analyzed the access interests of regional users and the visitation volume characteristics of regional user access to these hot access areas in terms of user access permeability, user usage rate, and user access viscosity. Our research results show that regional user access to WebGIS is spatially aggregated, and the hot access areas that regional users accessed are associated with specific periods of time. Most regional user contact with hot accessed areas is variable and intermittent but for some users, their access to certain areas is continuous as it is associated with ongoing or recurrent objectives. The weighted bipartite network model for regional user WebGIS access provides a valid analysis method for studying user behaviour in WebGIS and the proposed access pattern exhibits access interest of regional user is spatiotemporal aggregated and presents a heavy-tailed distribution. Understanding user access patterns is good for WebGIS providers and supports better operational decision-making, and helpful for developers when optimizing WebGIS system architecture and deployment, so as to improve the user experience and to expand the popularity of WebGIS.

  2. Leveraging voice

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth

    2017-01-01

    researchers improve our practices and how could digital online video help offer more positive stories about research and higher education? How can academics in higher education be better to tell about our research, thereby reclaiming and leveraging our voice in a post-factual era? As higher education......This paper speculates on how researchers share research without diluting our credibility and how to make strategies for the future. It also calls for consideration of new traditions and practices for communicating knowledge to a wider audience across multiple media platforms. How might we...... continues to engage with digital and networked technologies it becomes increasingly relevant to question why and how academics could (re) position research knowledge in the digital and online media landscape of today and the future. The paper highlights methodological issues that arise in relation...

  3. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  4. Voice Disorders

    Science.gov (United States)

    Voice is the sound made by air passing from your lungs through your larynx, or voice box. In your larynx are your vocal cords, ... to make sound. For most of us, our voices play a big part in who we are, ...

  5. Every Voice

    Science.gov (United States)

    Patrick, Penny

    2008-01-01

    This article discusses how the author develops an approach that allows her students, who are part of the marginalized population, to learn the power of their own voices--not just their writing voices, but their oral voices as well. The author calls it "TWIST": Thoughts, Writing folder, Inquiring mind, Supplies, and Teamwork. It is where…

  6. Every Voice

    Science.gov (United States)

    Patrick, Penny

    2008-01-01

    This article discusses how the author develops an approach that allows her students, who are part of the marginalized population, to learn the power of their own voices--not just their writing voices, but their oral voices as well. The author calls it "TWIST": Thoughts, Writing folder, Inquiring mind, Supplies, and Teamwork. It is where…

  7. Voice restoration

    NARCIS (Netherlands)

    Hilgers, F.J.M.; Balm, A.J.M.; van den Brekel, M.W.M.; Tan, I.B.; Remacle, M.; Eckel, H.E.

    2010-01-01

    Surgical prosthetic voice restoration is the best possible option for patients to regain oral communication after total laryngectomy. It is considered to be the present "gold standard" for voice rehabilitation of laryngectomized individuals. Surgical prosthetic voice restoration, in essence, is alwa

  8. Voice quality analysis in wireless multimedia sensor networks: an experimental study

    NARCIS (Netherlands)

    Türkes, Okan; Baydere, Sebnem

    2011-01-01

    Audio data processing and transmission in Wireless Sensor Networks (WSNs) require systems which satisfy the equilibrium between heavy data traffic and limited resources. In the lossy nature of the network, transmission techniques matter to sustain a certain content validity to be preserved. Besides,

  9. Social Network Sites and Student-Lecturer Communication: An Academic Voice

    Science.gov (United States)

    Jones, Joanna; Gaffney-Rhys, Ruth; Jones, Edward

    2011-01-01

    This article presents a synthesis of existing ideas relating to the use of social network sites by faculty within higher education institutions (HEIs) to communicate with the student body. As previous research has been from a student-centric perspective, importantly this study explores the use of social networks for student-faculty communication…

  10. Experimental realization of an entanglement access network and secure multi-party computation

    Science.gov (United States)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  11. Resource management in radio access and IP-based core networks for IMT Advanced and Beyond

    Institute of Scientific and Technical Information of China (English)

    SU Gang; HIDELL Markus; ABRAHAMSSON Henrik; AHLGREN Bengt; LI Dan; SJDIN Peter; TANYINGYONG Voravit; XU Ke

    2013-01-01

    The increased capacity needs, primarily driven by content distribution, and the vision of Internet-of-Things with billions of connected devices pose radically new demands on future wireless and mobile systems. In general the increased diversity and scale result in complex resource management and optimization problems in both radio access networks and the wired core network infrastructure. We summarize results in this area from a collaborative Sino-Swedish project within IMT Advanced and Beyond, covering adaptive radio resource management, energy-aware routing, OpenFlow-based network virtualization, data center networking, and access network caching for TV on demand.

  12. Experimental realization of secure multi-party computation in an entanglement access to network

    CERN Document Server

    Chang, X Y; Yuan, X X; Hou, P Y; Huang, Y Y; Duan, L M

    2015-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  13. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...... transmission rate. Furthermore, to evaluate the network performance, we derive new expressions for the decoder bit error rate (BER), total BER, packet error rate (PER), and packet throughput. We analyze the performance of a two-class OFFH-CDMA packet network, where multirate transmissions are achieved via...

  14. Media access control and resource allocation for next generation passive optical networks

    CERN Document Server

    Ansari, Nirwan

    2013-01-01

    This book focuses on various Passive optical networks (PONs)  types, including currently deployed Ethernet PON (EPON) and Gigabit PON (GPON) as well as next generation WDM PON and OFDM PON. Also this book examines the integrated optical and wireless access networks. Concentrating on two issues in these networks: media access control (MAC) and resource allocation. These two problems can greatly affect performances of PONs such as network resource utilization and QoS of end users. Finally this book will discuss various solutions to address the MAC and resource allocation issues in various PON networks.

  15. Experimental realization of an entanglement access network and secure multi-party computation

    Science.gov (United States)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  16. The Role of Social Network Locations in the College Access Mentoring of Urban Youth

    Science.gov (United States)

    Ahn, June

    2010-01-01

    This study uses social network analysis to describe the social network of college mentors in a college access program. Urban students in the program are paired with college mentors-students, professors, and other institutional agents-to help improve their college going process. The study analyzes the social networks within which the mentors are…

  17. Integrated self-management for future radio access networks: Vision and key challenges

    NARCIS (Netherlands)

    Eisenblätter, A.; Conzalez Rodríguez, B.; Gunnarsson, F.; Kürner, T.; Litjens, R.; Sas, B.; Sayrac, B.; Schmelz, L.C.; Willcock, C.

    2013-01-01

    Future radio access networks will require new self-management solutions to handle the increasing operational complexity caused by multi-technology and multi-layer deployments. Current networks already include stand-alone SON (Self-Organizing Networks) solutions, but these are not sufficient to prope

  18. The Role of Social Network Locations in the College Access Mentoring of Urban Youth

    Science.gov (United States)

    Ahn, June

    2010-01-01

    This study uses social network analysis to describe the social network of college mentors in a college access program. Urban students in the program are paired with college mentors-students, professors, and other institutional agents-to help improve their college going process. The study analyzes the social networks within which the mentors are…

  19. Enabling multimode wireless access networks using remote radio heads

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2012-01-01

    The deployment of 4G networks is spreading rapidly providing mobile broadband services to the public. 4G technologies are designed to overlay existing 3G networks enabling reusability of several network components. In this way, the coexistence of 3G/4G standards is facilitated. This paper describes...

  20. Self-management for unified heterogeneous radio access networks

    NARCIS (Netherlands)

    Litjens, R.; Gunnarsson, F.; Sayrac, B.; Spaey, K.; Willcock, C.; Eisenblätter, A.; Rodríguez, B.G.; Kürner, T.

    2013-01-01

    The development of self-management solutions for (multi-technology, multi-layer) mobile communication networks is driven by their increasing operational complexity. Initial stand-alone SON (Self-Organizing Networks) solutions are already available, but are not sufficient to handle the networks of to

  1. An effective access control approach to support mobility in IPv6 networks

    Science.gov (United States)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  2. Native voice, self-concept and the moral case for personalized voice technology.

    Science.gov (United States)

    Nathanson, Esther

    2017-01-01

    Purpose (1) To explore the role of native voice and effects of voice loss on self-concept and identity, and survey the state of assistive voice technology; (2) to establish the moral case for developing personalized voice technology. Methods This narrative review examines published literature on the human significance of voice, the impact of voice loss on self-concept and identity, and the strengths and limitations of current voice technology. Based on the impact of voice loss on self and identity, and voice technology limitations, the moral case for personalized voice technology is developed. Results Given the richness of information conveyed by voice, loss of voice constrains expression of the self, but the full impact is poorly understood. Augmentative and alternative communication (AAC) devices facilitate communication but, despite advances in this field, voice output cannot yet express the unique nuances of individual voice. The ethical principles of autonomy, beneficence and equality of opportunity establish the moral responsibility to invest in accessible, cost-effective, personalized voice technology. Conclusions Although further research is needed to elucidate the full effects of voice loss on self-concept, identity and social functioning, current understanding of the profoundly negative impact of voice loss establishes the moral case for developing personalized voice technology. Implications for Rehabilitation Rehabilitation of voice-disordered patients should facilitate self-expression, interpersonal connectedness and social/occupational participation. Proactive questioning about the psychological and social experiences of patients with voice loss is a valuable entry point for rehabilitation planning. Personalized voice technology would enhance sense of self, communicative participation and autonomy and promote shared healthcare decision-making. Further research is needed to identify the best strategies to preserve and strengthen identity and sense of

  3. A cost model for broadband access networks: FTTx versus WiMAX

    Science.gov (United States)

    Pereira, João Paulo Ribeiro

    2007-09-01

    Local communities and governments are taking various steps to fight the so-called "digital divide" between well served urban communities and undeserved areas. In order to make broadband access available to these under served areas, several technical solutions are available with the capacity to provide high speed Internet access, video, telephony services, etc. This paper presents a cost-model and a tool for the evaluation of broadband access technologies (xDSL, HFC, FTTx, WiMAX, PLC and satellite), and compares two technologies: FTTx and WiMAX. Our tool compares these different access technologies in different scenarios, and examining the capital expense and deployment of building access networks with the same requisite performance using each technology. The cost model is limited to the access part of the network. The results obtained by our evaluation tool give the possibility to compare several BB access technologies, and support the decision about which is the better technological solution for a given scenario

  4. Logical optical line terminal technologies towards flexible and highly reliable metro- and access-integrated networks

    Science.gov (United States)

    Okamoto, Satoru; Sato, Takehiro; Yamanaka, Naoaki

    2017-01-01

    In this paper, flexible and highly reliable metro and access integrated networks with network virtualization and software defined networking technologies will be presented. Logical optical line terminal (L-OLT) technologies and active optical distribution networks (ODNs) are the key to introduce flexibility and high reliability into the metro and access integrated networks. In the Elastic Lambda Aggregation Network (EλAN) project which was started in 2012, a concept of the programmable optical line terminal (P-OLT) has been proposed. A role of the P-OLT is providing multiple network services that have different protocols and quality of service requirements by single OLT box. Accommodated services will be Internet access, mobile front-haul/back-haul, data-center access, and leased line. L-OLTs are configured within the P-OLT box to support the functions required for each network service. Multiple P-OLTs and programmable optical network units (P-ONUs) are connected by the active ODN. Optical access paths which have flexible capacity are set on the ODN to provide network services from L-OLT to logical ONUs (L-ONUs). The L-OLT to L-ONU path on the active ODN provides a logical connection. Therefore, introducing virtualization technologies becomes possible. One example is moving an L-OLT from one P-OLT to another P-OLT like a virtual machine. This movement is called L-OLT migration. The L-OLT migration provides flexible and reliable network functions such as energy saving by aggregating L-OLTs to a limited number of P-OLTs, and network wide optical access path restoration. Other L-OLT virtualization technologies and experimental results will be also discussed in the paper.

  5. A Random-Walk Based Privacy-Preserving Access Control for Online Social Networks

    Directory of Open Access Journals (Sweden)

    You-sheng Zhou

    2016-02-01

    Full Text Available Online social networks are popularized with people to connect friends, share resources etc. Meanwhile, the online social networks always suffer the problem of privacy exposure. The existing methods to prevent exposure are to enforce access control provided by the social network providers or social network users. However, those enforcements are impractical since one of essential goal of social network application is to share updates freely and instantly. To better the security and availability in social network applications, a novel random walking based access control of social network is proposed in this paper. Unlike using explicit attribute based match in the existing schemes, the results from random walking are employed to securely compute L1 distance between two social network users in the presented scheme, which not only avoids the leakage of private attributes, but also enables each social network user to define access control policy independently. The experimental results show that the proposed scheme can facilitate the access control for online social network.

  6. The Architecture of Access: A Grounded Theory on the Nature of Access to Early Childhood Services within a Children's Centre, Derived from Nine Parent Voices

    Science.gov (United States)

    Hayward, Kate; Fletcher, Colin; Whalley, Margy; McKinnon, Eddie; Gallagher, Tracy; Prodger, Angela; Donoyou, Heather; Potts, Judy; Young, Elaine

    2013-01-01

    This was a collaborative action research study by lead staff, researchers and parents at the Pen Green Centre for Children and their Families in England. The study focuses on the factors enabling access to children's services by nine parents from challenging family contexts. The critical questions were: What enabled some parents to overcome…

  7. WIRELESS ADHOC MULTI ACCESS NETWORKS OPTIMIZATION USING OSPF ROUTING PROTOCOL BASED ON CISCO DEVICES

    Directory of Open Access Journals (Sweden)

    Mohamed E. Khedr

    2015-03-01

    Full Text Available One of the most attractive field for research for researchers and authors so the Wireless adhoc networks. So, this paper will describe the background and basic features of Open Short Path First (OSPF routing protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands. Describe, modify and calculate the metric (Cost used by OSPF due to adhoc networks. Illustrating the Election parameters made by DR/BDR (Designated and Back Designated Routers used in multi-access wireless networks. This paper will use OSPF routing protocol because of its average administrative distance with all routing protocols.

  8. Multiple Access Network Information-flow And Correction codes

    CERN Document Server

    Yao, Hongyi; Jaggi, Sidharth; Ho, Tracey

    2010-01-01

    The network communication scenario where one or more receivers request all the information transmitted by different sources is considered. We introduce distributed polynomial-time network codes in the presence of malicious nodes. Our codes can achieve any point inside the rate region of multiple-source multicast transmission scenarios both in the cases of coherent and non-coherent network coding. For both cases the encoding and decoding algorithm runs in poly(|E|)exp(s) time, where poly(|E|) is a polynomial function of the number of edges |E| in the network and exp(s) is an exponential function of the number of sources s. Our codes are fully distributed and different sources require no knowledge of the data transmitted by their peers. Our codes are "end-to-end", that is, all nodes apart from the sources and the receivers are oblivious to the adversaries present in the network and simply implement random linear network coding.

  9. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  10. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Institute of Scientific and Technical Information of China (English)

    Mitsuru Miyauchi; Yanjun Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirmlow optical loss and environmental stabilities.

  11. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Institute of Scientific and Technical Information of China (English)

    Mitsuru; Miyauchi; Yanjun; Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirm low optical loss and environmental stabilities.

  12. ABCDecision: A Simulation Platform for Access Selection Algorithms in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Guy Pujolle

    2010-01-01

    Full Text Available We present a simulation platform for access selection algorithms in heterogeneous wireless networks, called “ABCDecision”. The simulator implements the different parts of an Always Best Connected (ABC system, including Access Technology Selector (ATS, Radio Access Networks (RANs, and users. After describing the architecture of the simulator, we show an overview of the existing decision algorithms for access selection. Then we propose a new selection algorithm in heterogeneous networks and we run a set of simulations to evaluate the performance of the proposed algorithm in comparison with the existing ones. The performance results, in terms of the occupancy rate, show that our algorithm achieves a load balancing distribution between networks by taking into consideration the capacities of the available cells.

  13. Algorithmic PON/P2P FTTH Access Network Design for CAPEX Minimization

    DEFF Research Database (Denmark)

    Papaefthimiou, Kostantinos; Tefera, Yonas; Mihylov, Dimitar

    2013-01-01

    Due to the emergence of high bandwidth-requiring services, telecommunication operators (telcos) are called to upgrade their fixed access network. In order to keep up with the competition, they must consider different optical access network solutions with Fiber To The Home (FTTH) as the prevailing...... one. It provides an obvious advantage for the end users in terms of high achievable data rates. On the other hand, the high initial deployment cost required exists as the heaviest impediment. The main goal of this paper is to study different approaches when designing a fiber access network. More...... concretely, two different optimizations are alternatively evaluated, fiber and trenching minimization, over two of the most typical fiber access architectures, Point-to-Point (P2P) and Passive Optical Network (PON). These are applied to a real geographical scenario and the best returned output in terms...

  14. Application of BP neural network in evaluation of artistic voice%BP神经网络在评价歌唱艺术嗓音中的应用

    Institute of Scientific and Technical Information of China (English)

    李小武; 罗兰娥

    2012-01-01

    The singing voices were recorded from 30 young music students who come from Hunan University of Science and Engineering. Their acoustic parameters, such as Fl, F3, F0, vocal range,jitter, disturbance of Fl, disturbance of F3 and average energy were extracted by the way of voice analysis, BP Neural network analysis was used to evaluate the singing voices objectively. The results were then compared with those of the subjective evaluation performed by the experienced professionals. The error between the two evaluation approachs was within 3.4%, The results show that the neural network analysis can be used as an objective instrument to evaluate the singing quality of artistic voices. This is helpful to instruct, select and train professional singers.%录制湖南科技学院30名无喉病、无上呼吸道感染的声乐专业青年大学生专业训练歌声信号,利用语音分析技术提取歌声声学参数第一共振峰、第三共振峰、基频、音域、基频微扰、第一共振峰微扰、第三共振峰微扰、平均能量,使用BP神经网络方法客观评价歌声质量,并与资深声乐专业教师的主观评价进行比较,误差在3.4%之内.结果表明BP神经网络方法利用评价参数能正确客观评价歌声质量,有助于科学地指导选拔和训练艺术嗓音人才.

  15. QoS Analysis of the Integrated UMTS and WLAN Ad Hoc Network in different Security Schemes with Wormhole Attack under large Scalability for CBR Voice Interactive Traffic

    Directory of Open Access Journals (Sweden)

    Mr. Shashank Tripathi,

    2016-07-01

    Full Text Available The selection of security schemes against Wormhole Attack (WHA in next generation heterogeneous networks is based on major factors: authentication, confidentiality, and integrity and data availability. The effect of this active threat on Quality of Service (QoS of the Integrated Universal Mobile Telecommunications System (UMTS and Wireless Local Area Network (WLAN Ad Hoc network can be minimized by a suitable secure routing protocol. The aim of this work is to analyze QoS of the Integrated UMTS and WLAN network for Constant Bit-Rate (CBR voice messaging, interactive traffic under a secure distance vector routing protocol with various security schemes under WHA. This paper compares them on the basis of QoS metrics.

  16. Smart packet access and call admission control for efficient resource management in advanced wireless networks

    OpenAIRE

    Phan, V. V. (Vinh V.)

    2005-01-01

    Abstract Efficient management of rather limited resources, including radio spectrum and mobile-terminal battery power, has been the fundamental design challenge of wireless networks and one of the most widespread research problems over the years. MAC (Medium Access Control) for packet access and CAC (Call Admission Control) for connection-oriented service domains are commonly used as effective tools to manage radio resources, capacity and performance of wireless networks while providing ad...

  17. Parenting and social capital: Accessing help and support from informal social networks

    OpenAIRE

    2004-01-01

    This paper explores the resources and support that parents in the UK are able to access through their social networks, and analyses how these networks are organized and sustained. Concern over a perceived demise in community relations and trust have driven many recent UK family policy initiatives and have underpinned proposals to increase parenting support services. However drawing on data from the project "Resources in Parenting: Access to Capitals" it will be suggested that parents remain t...

  18. Energy Saving Scheme Based On Traffic Forwarding For Optical Fiber Access Networks

    DEFF Research Database (Denmark)

    Lopez, G. Arturo Rodes; Estaran Tolosa, Jose Manuel; Vegas Olmos, Juan José;

    2013-01-01

    We report on an energy saving block that regroups and powers off OLTs during low traffic periods, resulting in energy savings up to 87,5% in the central office of optical access networks.......We report on an energy saving block that regroups and powers off OLTs during low traffic periods, resulting in energy savings up to 87,5% in the central office of optical access networks....

  19. Modeling and performance analysis of IP access interface in optical transmission networks with packet switching

    OpenAIRE

    Lackovic, Marko; Bungarzeanu, Cristian

    2006-01-01

    The article analyzes the influence of the Internet Protocol (IP) access interface on the packet loss probability and delay times in the optical packet switched network. The network and node model have been proposed, and the structure of the IP access interface, including assembler and holder, have been included in the analysis. It has been shown that the increase of the maximum optical packet sizes, as well as use of the holding feature as contention resolution mechanism, decrease the packet ...

  20. A concurrent access MAC protocol for cognitive radio ad hoc networks without common control channel

    Science.gov (United States)

    Timalsina, Sunil K.; Moh, Sangman; Chung, Ilyong; Kang, Moonsoo

    2013-12-01

    Cognitive radio ad hoc networks (CRAHNs) consist of autonomous nodes that operate in ad hoc mode and aim at efficient utilization of spectrum resources. Usually, the cognitive nodes in a CRAHN exploit a number of available channels, but these channels are not necessarily common to all nodes. Such a network environment poses the problem of establishing a common control channel (CCC) as there might be no channel common to all the network members at all. In designing protocols, therefore, it is highly desirable to consider the network environment with no CCC. In this article, we propose a MAC protocol called concurrent access MAC (CA-MAC) that operates in the network environment with no CCC. The two devices in a communication pair can communicate with each other even if they have only one common channel available. Therefore, the problems with CCC (such as channel saturation and denial of service attacks) can also be resolved. In CA-MAC, channel accesses are distributed over communication pairs, resulting in increased network connectivity. In addition, CA-MAC allows different communication pairs to access multiple channels concurrently. According to our performance study, CA-MAC provides higher network connectivity with shorter channel access delay compared to SYN-MAC, which is the conventional key MAC protocol for the network environment with no CCC, resulting in better network throughput.

  1. Service Differentiation in Residential Broadband Networks

    DEFF Research Database (Denmark)

    Sigurdsson, Halldór Matthias

    2004-01-01

    As broadband gains widespread adoption with residential users, revenue generating voice- and video-services have not yet taken off. This slow uptake is often attributed to lack of Quality of Service management in residential broadband networks. To resolve this and induce service variety, network...... access providers are implementing service differentiation in their networks where voice and video gets prioritised before data. This paper discusses the role of network access providers in multipurpose packet based networks and the available migration strategies for supporting multimedia services...... in digital subscriber line (DSL) based residential broadband networks. Four possible implementation scenarios and their technical characteristics and effects are described. To conclude, the paper discusses how network access providers can be induced to open their networks for third party service providers....

  2. Resource Sharing in Heterogeneous and Cloud Radio Access Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Iversen, Villy Bæk

    2012-01-01

    This paper analyzes performance of cellular systems with shared resources, where the network with overlapping cells is modeled as a circuit switched network with direct routing. The influence of the degree of sharing, represented by cell overlap percentage, on the call blocking probability is inv...

  3. Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks

    Science.gov (United States)

    Yadav, Rajesh; Varma, Shirshu; Malaviya, N.

    2008-05-01

    Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.

  4. CCNA Voice Study Guide, Exam 640-460

    CERN Document Server

    Froehlich, Andrew

    2010-01-01

    The ultimate guide to the new CCNA voice network administrator certification exam. The new CCNA Voice exam tests candidates on their ability to implement a Cisco VoIP solution. Network administrators of voice systems will appreciate that the CCNA Voice Study Guide focuses completely on the information required by the exam. Along with hands-on labs and an objective map showing where each objective is covered, this guide includes a CD with the Sybex Test Engine, flashcards, and entire book in PDF format.: The new CCNA Voice certification will be valuable for administrators of voice network syste

  5. A Hybrid Networking Model for the Access Layer of the Communication Network for Distribution in Smart Grid

    Directory of Open Access Journals (Sweden)

    Wang Hao

    2016-01-01

    Full Text Available The access layer in the communication network for distribution is an important link in the automation of smart distribution power grid. In current access layer of communication network for distribution in Chinese power grid systems, several communication methods like optical fiber, mediumvoltage carrier communication, 1.8GHz TD-LTE power private wireless network, 230MHz TD-LTE power private wireless network, public wireless network are constructed concurrently and running simultaneously in an identical power supply area. This traditional networking model will cause repeated construction and operation and maintenance difficulties in the communication network of power grid. On the basis of giving a detailed analysis of the radio link budget of TD-LTE power private wireless network in two frequencies, this paper present a multi-communication methods hybrid networking model, which gives a clear boundary for different communication methods based on the isoline with equal signal strength of the TD-LTE power private wireless network and accomplish the optimization of communication resources for distribution.

  6. Challenges Faced by Traditional Voice Core Network and Development Strategy%传统语音交换网络面临的挑战及应对策略

    Institute of Scientific and Technical Information of China (English)

    柴泽明

    2014-01-01

    The voice services provided by telecommunication operators continue to be diverted, the original careful y constructed voice core network needs an evolution to positively pursue new architecture for the future business service needs, to face the chal enges of mobile Internet. From the perspective of voice services and existing network situation, this paper analyzes the features and business trends of voice services development, and proposes the development strategy of traditional voice core network through a comprehensive analysis of the voice service needs and technology development.%电信运营商经营的语音业务不断被分流,原来构筑的精品交换网络必须进行演进,并积极展开面向未来业务发展需要的新架构研究,迎接移动互联网的挑战。文章从语音业务和网络现状出发,分析语音业务发展的特点和发展趋势,通过对语音业务需求和技术发展的综合分析,提出传统语音交换网络的发展策略。

  7. Using IP as Transport Technology in Third Generation and Beyond Radio Access Networks

    NARCIS (Netherlands)

    Bader, Attila; Westberg, Lars; Karagiannis, Georgios; de Meer, H; Bhatti, N.T.

    This paper discusses the motivation for developing a new QoS signaling protocol for IP-based Radio Access Networks. It describes the main characteristics of these networks and the special requirements imposed by these characteristics on QoS signaling solutions.

  8. mCRAN: A radio access network architecture for 5G indoor ccommunications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, Tom; Prasad, R.V.; Karagiannis, Georgios; Tangdiongga, E.; van den Boom, H.P.A.; Kokkeler, Andre B.J.

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has

  9. Traffic-Adaptive, Flow-Specific Medium Access for Wireless Networks

    Science.gov (United States)

    2009-09-01

    vol. 23, no. 12, pp. 1417–1433, Dec. 1975. [67] P. Karn, “MACA—A new channel access method for packet radio,” Proc. 9th ARRL Comput. Netw. Conf...and L. Meier, “Time synchronization and calibration in wireless sensor networks,” in Handbook of Sensor Networks: Algorithms and Architectures, I

  10. Hybrid InP-SiGe photoreceiver for the access network

    NARCIS (Netherlands)

    Urban, P.J.; Leijtens, X.J.M.; Smalbrugge, E.; Vries, T. de; Noetzel, R.; Oei, Y.S.; Xu, L.; Heijningen, M. van; Bent, G. van der; Waardt, H. de; Smit, M.K.

    2008-01-01

    In this paper, we present a low cost and polarization independent photoreceiver which is part of the optical network unit (ONU) for the fiber access network. It consists of one InPphotodetector and a low cost SiGe amplifier. It operates error free with 223 − 1 PRBS word length at 1.25 Gbit/s with -1

  11. mCRAN: A radio access network architecture for 5G indoor ccommunications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, T.M.; Prasad, R.V.; Karagiannis, G.; Tangdiongga, E.; Boom, van den H.P.A.; Kokkeler, A.B.J.

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has emerge

  12. Hybrid InP-SiGe photoreceiver for the access network

    NARCIS (Netherlands)

    Urban, P.J.; Leijtens, X.J.M.; Smalbrugge, E.; Vries, T. de; Noetzel, R.; Oei, Y.S.; Xu, L.; Heijningen, M. van; Bent, G. van der; Waardt, H. de; Smit, M.K.

    2008-01-01

    In this paper, we present a low cost and polarization independent photoreceiver which is part of the optical network unit (ONU) for the fiber access network. It consists of one InPphotodetector and a low cost SiGe amplifier. It operates error free with 223 − 1 PRBS word length at 1.25 Gbit/s with -1

  13. mCRAN: A radio access network architecture for 5G indoor ccommunications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, Tom; Prasad, R.V.; Karagiannis, Georgios; Tangdiongga, E.; van den Boom, H.P.A.; Kokkeler, Andre B.J.

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has emerge

  14. The Changing Role of Community Networks in Providing Citizen Access to the Internet.

    Science.gov (United States)

    Keenan, Thomas P.; Trotter, David Mitchell

    1999-01-01

    Examines the changing role of community network associations or freenets in providing Internet access by examining the case of the Calgary Community Network Association (CCNA) in Alberta, Canada. Discusses the withdrawal of states from the telecommunications field, priorities of the Canadian government, and the role of the private sector.…

  15. Hybrid InP-SiGe photoreceiver for the access network

    NARCIS (Netherlands)

    Urban, P.J.; Leijtens, X.J.M.; Smalbrugge, E.; Vries, T. de; Noetzel, R.; Oei, Y.S.; Xu, L.; Heijningen, M. van; Bent, G. van der; Waardt, H. de; Smit, M.K.

    2008-01-01

    In this paper, we present a low cost and polarization independent photoreceiver which is part of the optical network unit (ONU) for the fiber access network. It consists of one InPphotodetector and a low cost SiGe amplifier. It operates error free with 223 − 1 PRBS word length at 1.25 Gbit/s with

  16. Collaboration and Coordination in Secondary Networks for Opportunistic Spectrum Access

    CERN Document Server

    Jouini, Wassim; Bononi, Luciano; Moy, Christophe

    2012-01-01

    In this paper, we address the general case of a coordinated secondary network willing to exploit communication opportunities left vacant by a licensed primary network. Since secondary users (SU) usually have no prior knowledge on the environment, they need to learn the availability of each channel through sensing techniques, which however can be prone to detection errors. We argue that cooperation among secondary users can enable efficient learning and coordination mechanisms in order to maximize the spectrum exploitation by SUs, while minimizing the impact on the primary network. To this goal, we provide three novel contributions in this paper. First, we formulate the spectrum selection in secondary networks as an instance of the Multi-Armed Bandit (MAB) problem, and we extend the analysis to the collaboration learning case, in which each SU learns the spectrum occupation, and shares this information with other SUs. We show that collaboration among SUs can mitigate the impact of sensing errors on system perf...

  17. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  18. Reconfigurable radio access unit to dynamically distribute W-band signals in 5G wireless access networks

    DEFF Research Database (Denmark)

    Rodríguez Páez, Juan Sebastián; Rommel, Simon; Vegas Olmos, Juan José

    2017-01-01

    In this paper a new type of radio access unit is proposed and demonstrated. This unit is composed only of the reduced amount of components (compared to conventional unit designs) to optically generate wireless signals on the W-band (75–110 GHz) in combination with a switching system. The proposed...... system not only achieves BER values below the FEC limit, but gives an extra level of flexibility to the network by easing the redirection of the signal to different antennas....

  19. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  20. Dynamic Spectrum Access in Cognitive Radio Networks with RF Energy Harvesting

    OpenAIRE

    Lu, Xiao; Wang,Ping; Dusit, Niyato; Ekram, Hossain

    2014-01-01

    Spectrum efficiency and energy efficiency are two critical issues in designing wireless networks. Through dynamic spectrum access, cognitive radios can improve the spectrum efficiency and capacity of wireless networks. On the other hand, radio frequency (RF) energy harvesting has emerged as a promising technique to supply energy to wireless networks and thereby increase their energy efficiency. Therefore, to achieve both spectrum and energy efficiencies, the secondary users in a cognitive rad...

  1. A model for incorporating patient and stakeholder voices in a learning health care network: Washington State's Comparative Effectiveness Research Translation Network.

    Science.gov (United States)

    Devine, Emily Beth; Alfonso-Cristancho, Rafael; Devlin, Allison; Edwards, Todd C; Farrokhi, Ellen T; Kessler, Larry; Lavallee, Danielle C; Patrick, Donald L; Sullivan, Sean D; Tarczy-Hornoch, Peter; Yanez, N David; Flum, David R

    2013-08-01

    To describe the inaugural comparative effectiveness research (CER) cohort study of Washington State's Comparative Effectiveness Research Translation Network (CERTAIN), which compares invasive with noninvasive treatments for peripheral artery disease, and to focus on the patient centeredness of this cohort study by describing it within the context of a newly published conceptual framework for patient-centered outcomes research (PCOR). The peripheral artery disease study was selected because of clinician-identified uncertainty in treatment selection and differences in desired outcomes between patients and clinicians. Patient centeredness is achieved through the "Patient Voices Project," a CERTAIN initiative through which patient-reported outcome (PRO) instruments are administered for research and clinical purposes, and a study-specific patient advisory group where patients are meaningfully engaged throughout the life cycle of the study. A clinician-led research advisory panel follows in parallel. Primary outcomes are PRO instruments that measure function, health-related quality of life, and symptoms, the latter developed with input from the patients. Input from the patient advisory group led to revised retention procedures, which now focus on short-term (3-6 months) follow-up. The research advisory panel is piloting a point-of-care, patient assessment checklist, thereby returning study results to practice. The cohort study is aligned with the tenets of one of the new conceptual frameworks for conducting PCOR. The CERTAIN's inaugural cohort study may serve as a useful model for conducting PCOR and creating a learning health care network. Copyright © 2013 Elsevier Inc. All rights reserved.

  2. Evaluation of MPEG-7-Based Audio Descriptors for Animal Voice Recognition over Wireless Acoustic Sensor Networks.

    Science.gov (United States)

    Luque, Joaquín; Larios, Diego F; Personal, Enrique; Barbancho, Julio; León, Carlos

    2016-05-18

    Environmental audio monitoring is a huge area of interest for biologists all over the world. This is why some audio monitoring system have been proposed in the literature, which can be classified into two different approaches: acquirement and compression of all audio patterns in order to send them as raw data to a main server; or specific recognition systems based on audio patterns. The first approach presents the drawback of a high amount of information to be stored in a main server. Moreover, this information requires a considerable amount of effort to be analyzed. The second approach has the drawback of its lack of scalability when new patterns need to be detected. To overcome these limitations, this paper proposes an environmental Wireless Acoustic Sensor Network architecture focused on use of generic descriptors based on an MPEG-7 standard. These descriptors demonstrate it to be suitable to be used in the recognition of different patterns, allowing a high scalability. The proposed parameters have been tested to recognize different behaviors of two anuran species that live in Spanish natural parks; the Epidalea calamita and the Alytes obstetricans toads, demonstrating to have a high classification performance.

  3. Do social networks matter for the access to goods and services obtained outside markets?

    Directory of Open Access Journals (Sweden)

    Eduardo Marques

    Full Text Available This article discusses the role of social networks and sociability in poor people's access to goods and services obtained from outside the markets. The article uses qualitative information from research into social networks of poor individuals living in segregated places in São Paulo, as well as a control group of middle-class individuals. The results show the importance of networks and suggest that the help that mediates such access depends upon the types of ties and trust involved, as well as the cost of providing the help. The observed processes tend to reiterate inequalities, establishing circularities of poverty reproduction.

  4. Virus spreading in wireless sensor networks with a medium access control mechanism

    Institute of Scientific and Technical Information of China (English)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper,an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks.Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks,which has been ignored in previous studies.It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes.The theoretical results are confirmed by numerical simulations.

  5. A novel multipriority reservation protocol for plastic optical fiber access network

    Institute of Scientific and Technical Information of China (English)

    Ning Zhang(张宁); Rongjin Yu(于荣金)

    2003-01-01

    In this papcr, a novel multipriority reservation protocol for plastic optical fiber access network based onoptical code division multiplexing access (OCDMA) technology is proposed. Conventional OCDMA systemonly allows finite units to transmit and access simultaneously according to the number of channels. Theprotocol is proposed to resolve this problem. By using the reservation scheme and a distributed arbitrationalgorithm, channel collision and destination conflict can be avoided. The protocol can efficiently supportthe transmission of multimedia messages that require the different time-delays. At the same time, eachoptical network unit is equipped with a fixed optical encoder/decoder that is always tuned to channel forcontrol and the tunable optical encoder/decoder that is tuned to any of channel for data. The networkthroughput and average delay have been investigated by numerical analysis and simulation experiments.It is shown that the multipriority reservation protocol in this POF access network based on OCDMAtechnology is valid and efficient.

  6. CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK

    Directory of Open Access Journals (Sweden)

    V. S. Kolomoitcev

    2016-01-01

    Full Text Available We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls. The scheme is considered in view of the fact that the system has got common areas of removing threats in the channel for different means of protection. Parameters of average residence time of request in the system and its reliability were obtained for each variant of access scheme. Based on the results, comparison of the ways of design for access scheme was carried out between themselves and with the standard access scheme (with onefirewall. It was found out that design of access scheme with a single group of routers for the whole system has better performance and reliability than the other variants of "Direct Connection" access scheme.

  7. Improved Data Transmission Scheme of Network Coding Based on Access Point Optimization in VANET

    Directory of Open Access Journals (Sweden)

    Zhe Yang

    2014-01-01

    Full Text Available VANET is a hot spot of intelligent transportation researches. For vehicle users, the file sharing and content distribution through roadside access points (AP as well as the vehicular ad hoc networks (VANET have been an important complement to that cellular network. So the AP deployment is one of the key issues to improve the communication performance of VANET. In this paper, an access point optimization method is proposed based on particle swarm optimization algorithm. The transmission performances of the routing protocol with random linear network coding before and after the access point optimization are analyzed. The simulation results show the optimization model greatly affects the VANET transmission performances based on network coding, and it can enhance the delivery rate by 25% and 14% and reduce the average delay of transmission by 38% and 33%.

  8. Adaptive coded spreading OFDM signal for dynamic-λ optical access network

    Science.gov (United States)

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun

    2015-12-01

    This paper proposes and experimentally demonstrates a novel adaptive coded spreading (ACS) orthogonal frequency division multiplexing (OFDM) signal for dynamic distributed optical ring-based access network. The wavelength can be assigned to different remote nodes (RNs) according to the traffic demand of optical network unit (ONU). The ACS can provide dynamic spreading gain to different signals according to the split ratio or transmission length, which offers flexible power budget for the network. A 10×13.12 Gb/s OFDM access with ACS is successfully demonstrated over two RNs and 120 km transmission in the experiment. The demonstrated method may be viewed as one promising for future optical metro access network.

  9. Homeless Families' Education Networks: An Examination of Access and Mobilization

    Science.gov (United States)

    Miller, Peter M.

    2011-01-01

    Purpose: This study sought deeper understanding of how sheltered families accessed and mobilized educationally related relationships and resources during periods of homelessness. Such work is posited to be especially relevant considering that there is a growing crisis of family homelessness in the United States and school- and community-based…

  10. Homeless Families' Education Networks: An Examination of Access and Mobilization

    Science.gov (United States)

    Miller, Peter M.

    2011-01-01

    Purpose: This study sought deeper understanding of how sheltered families accessed and mobilized educationally related relationships and resources during periods of homelessness. Such work is posited to be especially relevant considering that there is a growing crisis of family homelessness in the United States and school- and community-based…

  11. Research on Network Voice Transmission System Based on RTEMS%基于RTEMS的网络语音传输系统的研究

    Institute of Scientific and Technical Information of China (English)

    李顺

    2014-01-01

    Studies the key technologies on network voice transmission, which include VoIP principles, H.323 network communication protocol and SIP. A network audio transmission system which is characterized by recording, implements playback and remote transmission function-alities based on such research results. Designs S3C2410 development board as the hardware platform and selects the RTEMS real-time operating system as the software platform since it is a lightweight, real-time and open source operating system.%主要研究网络语音传输过成中的关键技术,包括:Voice over IP(VoIP)的原理、网络通信协议H.323和会话初始化协议(SIP)。在此基础上研究并实现一个具有录音、放音、远程传输音频数据的网络音频系统。该网络音频传输系统是在以S3C2410嵌入式处理器为核心的硬件开发平台,RTEMS为软件平台的基础上进行开发,可以通过网络传送声音数据。

  12. Ethernet access network based on free-space optic deployment technology

    Science.gov (United States)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  13. A metro-access integrated network with all-optical virtual private network function using DPSK/ASK modulation format

    Science.gov (United States)

    Tian, Yue; Leng, Lufeng; Su, Yikai

    2008-11-01

    All-optical virtual private network (VPN), which offers dedicated optical channels to connect users within a VPN group, is considered a promising approach to efficient internetworking with low latency and enhanced security implemented in the physical layer. On the other hand, time-division multiplexed (TDM) / wavelength-division multiplexed (WDM) network architecture based on a feeder-ring with access-tree topology, is considered a pragmatic migration scenario from current TDM-PONs to future WDM-PONs and a potential convergence scheme for access and metropolitan networks, due to its efficiently shared hardware and bandwidth resources. All-optical VPN internetworking in such a metro-access integrated structure is expected to cover a wider service area and therefore is highly desirable. In this paper, we present a TDM/WDM metro-access integrated network supporting all-optical VPN internetworking among ONUs in different sub- PONs based on orthogonal differential-phase-shift keying (DPSK) / amplitude-shift keying (ASK) modulation format. In each ONU, no laser but a single Mach-Zehnder modulator (MZM) is needed for the upstream and VPN signal generation, which is cost-effective. Experiments and simulations are performed to verify its feasibility as a potential solution to the future access service.

  14. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...

  15. Adaptive Information Access in Multiple Applications Support Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2012-01-01

    Nowadays, due to wide applicability of Wireless Sensor Network (WSN) added by the low cost sensor devices, its popularity among the researchers and industrialists are very much visible. A substantial amount of works can be seen in the literature on WSN which are mainly focused on application...

  16. Requirements of triple play services towards broadband access networks

    NARCIS (Netherlands)

    Wolfswinkel, R.N. van

    2005-01-01

    In the current broadband market there are many new developments regarding both services and the broadband infrastructures carrying those services. This paper will address what the requirements of services are towards broadband networks. The focus will be on the requirements of triple play related se

  17. Iowa Communications Network Enhancing Education in Iowa.

    Science.gov (United States)

    Ivanovic, Greta

    1995-01-01

    Describes the Iowa Communications Network, a statewide fiber optic network capable of transporting interactive, two-way audio, video, voice, and data signals. Topics include statewide cooperation among educational and state organizations; classroom design, including interactive classrooms; access to the Internet; and use by noneducational…

  18. Opportunistic Access in Frequency Hopping Cognitive Radio Networks

    Science.gov (United States)

    2014-03-27

    Modulator ib X c(t) s(t) Figure 3.4: Transmitter function model. + s(t) n(t) i(t) X c(t) MFSK Demod îb Figure 3.5: Receiver function model...Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x I. Introduction...thresholding MA multiple access MFSK M-ary frequency shift keying MIMO multiple-input/multiple-output OFDM orthogonal frequency-division multiplexing x

  19. The accessibility of European regions and airport network

    OpenAIRE

    Redondi, Renato; Malighetti, Paolo; Paleari, Stefano

    2011-01-01

    The objective of this work is to evaluate the accessibility of European municipalities by ground and air transportation. We compute the quickest paths between any origin municipality and any destination municipality separated by more than 500 km. The total travel time includes three components: i) travel by car to reach the origin airport; ii) travel by air from the origin airport to the destination airport, including waiting times when no direct flight is available; and iii) travel by car fr...

  20. A Comparative Study of Multiplexing Schemes for Next Generation Optical Access Networks

    Science.gov (United States)

    Imtiaz, Waqas A.; Khan, Yousaf; Shah, Pir Mehar Ali; Zeeshan, M.

    2014-09-01

    Passive optical network (PON) is a high bandwidth, economical solution which can provide the necessary bandwidth to end-users. Wavelength division multiplexed passive optical networks (WDM PONs) and time division multiplexed passive optical networks (TDM PONs) are considered as an evolutionary step for next-generation optical access (NGOA) networks. However they fail to provide highest transmission capacity, efficient bandwidth access, and robust dispersion tolerance. Thus future PONs are considered on simpler, efficient and potentially scalable, optical code division multiplexed (OCDM) PONs. This paper compares the performance of existing PONs with OCDM PON to determine a suitable scheme for NGOA networks. Two system parameter are used in this paper: fiber length, and bit rate. Performance analysis using Optisystem shows that; for a sufficient system performance parameters i.e. bit error rate (BER) ≤ 10-9, and maximum quality factor (Q) ≥ 6, OCDMA PON efficiently performs upto 50 km with 10 Gbit/s per ONU.

  1. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  2. Analysis of physical layer performance of hybrid optical-wireless access network

    Science.gov (United States)

    Shaddad, R. Q.; Mohammad, A. B.; Al-hetar, A. M.

    2011-09-01

    The hybrid optical-wireless access network (HOWAN) is a favorable architecture for next generation access network. It is an optimal combination of an optical backhaul and a wireless front-end for an efficient access network. In this paper, the HOWAN architecture is designed based on a wavelengths division multiplexing/time division multiplexing passive optical network (WDM/TDM PON) at the optical backhaul and a wireless fidelity (WiFi) technology at the wireless front-end. The HOWAN is proposed that can provide blanket coverage of broadband and flexible connection for end-users. Most of the existing works, based on performance evaluation are concerned on network layer aspects. This paper reports physical layer performance in terms of the bit error rate (BER), eye diagram, and signal-to-noise ratio (SNR) of the communication system. It accommodates 8 wavelength channels with 32 optical network unit/wireless access points (ONU/APs). It is demonstrated that downstream and upstream of 2 Gb/s can be achieved by optical backhaul for each wavelength channel along optical fiber length of 20 km and a data rate of 54 Mb/s per ONU/AP along a 50 m outdoor wireless link.

  3. Fairness problems at the media access level for high-speed networks

    Science.gov (United States)

    Maly, Kurt J.; Zhang, L.; Game, David

    1990-01-01

    Most lower speed (approx. 10 Mbps) local area networks use adaptive or random access protocols like Ethernet. Others at higher speed use demand assignment like token or slotted rings. These include Cambridge ring and electronic token ring systems. Fairness issues in representatives of such protocols are discussed. In particular, Fiber Distributed Data Interface (FDDI) was selected as a demand access protocol using tokens, Carrier Sensed Multiple Access/Ring Network (CSMA/RN) a random access protocol, and Distributed Queue Dual Bus (DQDB) a demand access protocol using reservations. Fairness at the media access level was the focus, i.e., attaining access or being excessively delayed when a message is queued to be sent as a function of network location. Within that framework, the essential fairness of FDDI was observed along with severe fairness problems in DQDB and some problems for CSMA/RN. Several modifications were investigated and their ameliorative effect is shown. Finally, a unified presentation which allows comparisons of the three protocols' fairness when normalized to their capacity is given.

  4. Resource allocation using time division multiple access over wireless relay networks

    Institute of Scientific and Technical Information of China (English)

    DAI Qin-yun; RONG Lu; HU Hong-lin; SU Gang

    2008-01-01

    This article considers a wireless network consisting of multiple sources that communicate with the corresponding destination utilizing a single half-duplex relay, whereas, the sources use the relay opportunistically. By integrating the information theory with the concept of effective capacity, this article proposes a dynamic time allocation strategy over the wireless relay network that aims at maximizing the relay network throughput, subject to a given delay quality of service (QoS) constraint, where time division multiple access (TDMA) is applied in the relay network. The simulation results show that the proposed allocation strategy can significantly improve the effective capacity as compared to the traditional equal time allocation strategy.

  5. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    Science.gov (United States)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  6. Scheduling of network access for feedback-based embedded systems

    Science.gov (United States)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  7. The Technology of ZigBee for Builiding Wireless Voice Communications Network%ZigBee无线语音通信组网技术

    Institute of Scientific and Technical Information of China (English)

    陈海燕; 张晨

    2012-01-01

    Whereas most of the low security intercom equipment, signal instability, conflict-prone, frequency of use license and other issues, the paper design of a ZigBee as communication technology to voice intercom system, significantly improved the above-mentioned problems. Terminal to the system microcontroller MSP430F149 microprocessor, provided through the use of TI CC2430 RF chip, ZigBee wireless communication standard, application technology related to the node in design, hardware test platform, the formation of ZigBee star network realization voice communication, of the entire system tests. Test results show that, using the ZigBee wireless technology has the advantages of voice communication, and meet the WSN network of power and transmission requirements.%鉴于目前多数对讲设备安全性低、信号不稳定、易冲突、使用频率许可等问题,设计了一种以ZigBee为通信技术的语音对讲系统.明显改善了上述问题.该系统终端以单片机MSP430F149为微处理器,通过使用TI公司提供的CC2430射频芯片,应用ZigBee无线通信标准相关技术,在所设计的节点硬件试验平台上,组建ZigBee星型网络实现语音通信,并且对整个系统进行测试.测试结果表明,利用ZigBee技术进行无线语音通信是具有优越性的,并且满足了无线个域网网络对功耗和传输的要求.

  8. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  9. A novel root-index based prioritized random access scheme for 5G cellular networks

    Directory of Open Access Journals (Sweden)

    Taehoon Kim

    2015-12-01

    Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.

  10. Random Access in Wireless Networks With Overlapping Cells

    Science.gov (United States)

    2010-06-01

    Downloaded on May 19,2010 at 21:13:10 UTC from IEEE Xplore . Restrictions apply. Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...Authorized licensed use limited to: NRL. Downloaded on May 19,2010 at 21:13:10 UTC from IEEE Xplore . Restrictions apply. NGUYEN et al.: RANDOM ACCESS IN...21:13:10 UTC from IEEE Xplore . Restrictions apply. 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 6, JUNE 2010 5) For a single

  11. Joint Channel and Network Decoding for XOR-Based Relay in Multi-Access Channel

    Science.gov (United States)

    Tang, Suhua; Cheng, Jun; Sun, Chen; Miura, Ryu; Obana, Sadao

    In this paper network coding based relay for multi-access channel is studied. In the system, two nodes send messages to a common access point (AP). A relay assists the two nodes by forwarding a network coded version of the messages. The AP performs joint channel and network decoding to recover the two original messages from three received signals. Two schemes, soft network coding (SoftNC) and turbo network coding (TurboNC), both focusing on bitwise exclusive or (XOR) based network coding, are proposed to salvage messages from erroneous signals. SoftNC is simple and backward compatible with existing protocol stack of wireless networks, and reduces packet errors by maximal ratio combining (MRC). TurboNC improves channel efficiency by letting the relay node transmit only parity check bits of the interleaved XORed message, where reliability is retained by iterative decoding. Simulation results show that compared with the network-layer path diversity scheme [8], both SoftNC and TurboNC greatly improve the reliability, and TurboNC also achieves a much higher throughput. The proposed schemes are suitable for improving the performance of wireless local area networks (WLAN).

  12. Passive Optical Access Networks: State of the Art and Future Evolution

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2014-10-01

    Full Text Available In the very last years, optical access networks are growing very rapidly, from both the network operators and the research interests points of view. Fiber To The Home (FTTH is already a reality in plenty of real contexts and there has been a further stimulus to the proposal of new solutions and the investigation of new possibilities, in order to optimize network performance and reduce capital and operational expenditure. A complete and systematic overview of passive optical access networks is presented in this paper, concerning both the hot research topics and the main operative issues about the design guidelines and the deployment of Passive Optical Networks (PON architectures, nowadays the most commonly implemented approach to realize optical fiber links in the access networks. A comparison of advantages and disadvantages of different multiplexing techniques is discussed, with specific reference to WDM-based networks, almost universally considered as the enabling technology for future proof bandwidth requirements. An exhaustive summary is also given about the-state-of-the-art of modulation and encoding techniques recently proposed by the scientific community, as well as the open challenges (such as colorless and coolerless ONUs for telecom companies and international standardization compliance.

  13. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  14. Design of handoff procedures for broadband wireless access IEEE 802.16 based networks

    Directory of Open Access Journals (Sweden)

    V. Rangel–Licea

    2008-01-01

    Full Text Available IEEE 802.16 is a protocol for fixed broad band wire less access that is currently trying to add mobility among mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "handoff" (change of connection between two base stations "BS" by a mobile user. In this paper, the problem of HO in IEEE 802.16 is approached try ing to maintain the quality of service (QoS of mobile users. A mechanism for changing connection during HO is pre sented. A simulation model based on OPNET MODELER1 was developed to evaluate the performance of the proposed HO mechanism. Finally, this paper demonstrates that it is possible to implement a seam less HO mech a nism over IEEE 802.16 even for users with de manding applications such as voice over IP.

  15. Cost effective Internet access and video conferencing for a community cancer network.

    Science.gov (United States)

    London, J W; Morton, D E; Marinucci, D; Catalano, R; Comis, R L

    1995-01-01

    Utilizing the ubiquitous personal computer as a platform, and Integrated Services Digital Network (ISDN) communications, cost effective medical information access and consultation can be provided for physicians at geographically remote sites. Two modes of access are provided: information retrieval via the Internet, and medical consultation video conferencing. Internet access provides general medical information such as current treatment options, literature citations, and active clinical trials. During video consultations, radiographic and pathology images, and medical text reports (e.g., history and physical, pathology, radiology, clinical laboratory reports), may be viewed and simultaneously annotated by either video conference participant. Both information access modes have been employed by physicians at community hospitals which are members of the Jefferson Cancer Network, and oncologists at Thomas Jefferson University Hospital. This project has demonstrated the potential cost effectiveness and benefits of this technology.

  16. Keeping Your Voice Healthy

    Science.gov (United States)

    ... Find an ENT Doctor Near You Keeping Your Voice Healthy Keeping Your Voice Healthy Patient Health Information ... heavily voice-related. Key Steps for Keeping Your Voice Healthy Drink plenty of water. Moisture is good ...

  17. Next generation communications satellites: multiple access and network studies

    Science.gov (United States)

    Meadows, H. E.; Schwartz, M.; Stern, T. E.; Ganguly, S.; Kraimeche, B.; Matsuo, K.; Gopal, I.

    1982-01-01

    Efficient resource allocation and network design for satellite systems serving heterogeneous user populations with large numbers of small direct-to-user Earth stations are discussed. Focus is on TDMA systems involving a high degree of frequency reuse by means of satellite-switched multiple beams (SSMB) with varying degrees of onboard processing. Algorithms for the efficient utilization of the satellite resources were developed. The effect of skewed traffic, overlapping beams and batched arrivals in packet-switched SSMB systems, integration of stream and bursty traffic, and optimal circuit scheduling in SSMB systems: performance bounds and computational complexity are discussed.

  18. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  19. REFIM: A Practical Interference Management in Heterogeneous Wireless Access Networks

    CERN Document Server

    Son, Kyuho; Yi, Yung; Chong, Song

    2011-01-01

    Due to the increasing demand of capacity in wireless cellular networks, the small cells such as pico and femto cells are becoming more popular to enjoy a spatial reuse gain, and thus cells with different sizes are expected to coexist in a complex manner. In such a heterogeneous environment, the role of interference management (IM) becomes of more importance, but technical challenges also increase, since the number of cell-edge users, suffering from severe interference from the neighboring cells, will naturally grow. In order to overcome low performance and/or high complexity of existing static and other dynamic IM algorithms, we propose a novel low-complex and fully distributed IM scheme, called REFIM, in the downlink of heterogeneous multi-cell networks. We first formulate a general optimization problem that turns out to require intractable computation complexity for global optimality. To have a practical solution with low computational and signaling overhead, which is crucial for low-cost small-cell solutio...

  20. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks.

    Science.gov (United States)

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-10-12

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  1. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Lin

    2016-10-01

    Full Text Available Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  2. Random access to mobile networks with advanced error correction

    Science.gov (United States)

    Dippold, Michael

    1990-01-01

    A random access scheme for unreliable data channels is investigated in conjunction with an adaptive Hybrid-II Automatic Repeat Request (ARQ) scheme using Rate Compatible Punctured Codes (RCPC) Forward Error Correction (FEC). A simple scheme with fixed frame length and equal slot sizes is chosen and reservation is implicit by the first packet transmitted randomly in a free slot, similar to Reservation Aloha. This allows the further transmission of redundancy if the last decoding attempt failed. Results show that a high channel utilization and superior throughput can be achieved with this scheme that shows a quite low implementation complexity. For the example of an interleaved Rayleigh channel and soft decision utilization and mean delay are calculated. A utilization of 40 percent may be achieved for a frame with the number of slots being equal to half the station number under high traffic load. The effects of feedback channel errors and some countermeasures are discussed.

  3. A survey of medium access control protocols for wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Elvio João Leonardo

    2004-01-01

    Full Text Available A number of issues distinguishes Medium Access Control (MAC protocols for wireless networks from those used in wireline systems. In addition, for ad-hoc networks, the characteristics of the radio channel, the diverse physical-layer technologies available and the range of services envisioned make it a difficult task to design an algorithm to discipline the access to the shared medium that results efficient, fair, power consumption sensitive and delay bound. This article presents the current “state-of-art” in this area, including solutions already commercially available as well as those still in study.

  4. Access to strategic resources through the relational network of the contractor and innovation of Tunisian SMEs

    Directory of Open Access Journals (Sweden)

    Adel Ghodbane

    2016-04-01

    Full Text Available Our paper is devoted to analyze the mediating effects of the access to strategic resources between the relational network of contractors and innovation in the specific case of Tunisian SMEs. The originality of this approach lies in the effort to show that the detention of a relational network is not synonymous with real access to strategic resources and the realization of benefits in terms of innovation. This finding is particularly important for SMEs which lack the means to profit from their own relational fabrics.

  5. A Method for Upper Bounding Long Term Growth of Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Pedersen, Jens Myrup; Madsen, Ole Brun

    2004-01-01

    The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound...... to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research...

  6. Unsynchronized Energy-Efficient Medium Access Control and Routing in Wireless Sensor Networks

    Science.gov (United States)

    Hurni, Philipp

    This master thesis investigates optimizations on recently proposed fully unsynchronized power saving sensor MAC protocols. In contrast to many other sensor MAC protocols, unsynchronized sensor MAC protocols renounce on any kind of network- or cluster-wide synchronization for channel access coordination and maintenance of a common wake-sleep pattern, because in wireless sensor networks with low traffic requirements, the overhead for maintaining synchronization is likely to exceed the energy spent for the actual data traffic.

  7. ONU power saving modes in next generation optical access networks: progress, efficiency and challenges.

    Science.gov (United States)

    Dixit, Abhishek; Lannoo, Bart; Colle, Didier; Pickavet, Mario; Demeester, Piet

    2012-12-10

    The optical network unit (ONU), installed at a customer's premises, accounts for about 60% of power in current fiber-to-the-home (FTTH) networks. We propose a power consumption model for the ONU and evaluate the ONU power consumption in various next generation optical access (NGOA) architectures. Further, we study the impact of the power savings of the ONU in various low power modes such as power shedding, doze and sleep.

  8. A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS competition

    Institute of Scientific and Technical Information of China (English)

    Liang-fang QIAN; Sen-lin ZHANG; Mei-qin LIU

    2015-01-01

    Long propagation delay, limited bandwidth, and high bit error rate pose great challenges in media access control (MAC) protocol design for underwater acoustic networks. A MAC protocol called slotted fl oor acquisition multiple access (slotted-FAMA) suitable for underwater acoustic networks is proposed and analyzed. This FAMA based protocol adds a time slot mechanism to avoid DATA packet collisions. However, slotted-FAMA is not suitable for dense networks since the multiple request-to-send (RTS) attempts problem in dense networks is serious and greatly limits the network throughput. To overcome this drawback, this paper proposes a slotted-FAMA based MAC protocol for underwater acoustic networks, called RC-SFAMA. RC-SFAMA introduces an RTS competition mechanism to keep the network from high frequency of backoff caused by the multiple RTS attempts problem. Via the RTS competition mechanism, useful data transmission can be completed successfully when the situation of multiple RTS attempts occurs. Simulation results show that RC-SFAMA increases the network throughput efficiency as compared with slotted-FAMA, and minimizes the energy consumption.

  9. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    of contention, reservation and polling access techniques based on the dynamic TDMA system. Extensive simulation results using realistic data traffic sources, show that the proposed medium access scheme may provide QoS guarantees to different ATM traffic including the realistic MPEG video traces with low cell......In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...

  10. The PBO Borehole Strainmeter Network: Data Availability, Access And Products

    Science.gov (United States)

    Hodgkinson, Kathleen; Mencin, David; Philips, David; Fox, Otina; Henderson, Brent; Meertens, Charles; Mattioli, Glen

    2013-04-01

    Earthscope is a U.S. NSF funded program designed to provide seismic, GPS, strainmeter, fault core, LiDAR, and InSAR data to the scientific community to research the evolution and structure of the North American continent. The Plate Boundary Observatory (PBO), operated by UNAVCO, is the geodetic component of the program. PBO consists of over 1100 continuous GPS sites in the western U.S. and Alaska, 6 long baseline laser strainmeters and 75 co-located borehole strainmeters and seismometers distributed in arrays along the western U.S. Pacific-North American plate boundary. In this presentation we describe how UNAVCO makes the borehole data sets available to the community and details the generation of higher-level PBO strainmeter data products. PBO borehole data flow in either real time or with a few hours delay to the IRIS Data Management Center (DMC) and the Northern California Earthquake Data Center (NCEDC) where they are immediately available in SEED format. Archiving the various data sets using the same, well-known format facilitates the integrated analysis of complementary data sets. Processed strain time-series, earth tide models, barometric pressure response coefficients, long-term borehole trends, data quality information and calibration matrices for each strainmeter are generated by UNAVCO and can accessed in XML format from the DMC and NCEDC or, as ASCII files from UNAVCO. Both formats contain the information required to regenerate the processed time-series from the raw data thus meeting an Earthscope goal of repeatability of processed data sets. UNAVCO is guided by the scientific community in determining the best data formats, archiving, access methods and data products to generate. Recommendations for future data products made in an October 2012 workshop hosted by UNAVCO include: a noise assessment of each strainmeter site, development of a physical model for long-term trends in strainmeter data and the release of high-rate processed data in a seismic data

  11. Future Scenarios for Software-Defined Metro and Access Networks and Software-Defined Photonics

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2017-01-01

    Full Text Available In recent years, architectures, devices, and components in telecommunication networks have been challenged by evolutionary and revolutionary factors which are drastically changing the traffic features. Most of these changes imply the need for major re-configurability and programmability not only in data-centers and core networks, but also in the metro-access segment. In a wide variety of contexts, this necessity has been addressed by the proposed introduction of the innovative paradigm of software-defined networks (SDNs. Several solutions inspired by the SDN model have been recently proposed also for metro and access networks, where the adoption of a new generation of software-defined reconfigurable integrated photonic devices is highly desirable. In this paper, we review the possible future application scenarios for software-defined metro and access networks and software-defined photonics (SDP, on the base of analytics, statistics, and surveys. This work describes the reasons underpinning the presented radical change of paradigm and summarizes the most significant solutions proposed in literature, with a specific emphasis to physical-layer reconfigurable networks and a focus on both architectures and devices.

  12. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    Science.gov (United States)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  13. Let Cognitive Radios Imitate: Imitation-based Spectrum Access for Cognitive Radio Networks

    CERN Document Server

    Iellamo, Stefano; Coupechoux, Marceau

    2011-01-01

    In this paper, we tackle the problem of opportunistic spectrum access in large-scale cognitive radio networks, where the unlicensed Secondary Users (SU) access the frequency channels partially occupied by the licensed Primary Users (PU). Each channel is characterized by an availability probability unknown to the SUs. We apply evolutionary game theory to model the spectrum access problem and develop distributed spectrum access policies based on imitation, a behavior rule widely applied in human societies consisting of imitating successful behavior. We first develop two imitation-based spectrum access policies based on the basic Proportional Imitation (PI) rule and the more advanced Double Imitation (DI) rule given that a SU can imitate any other SUs. We then adapt the proposed policies to a more practical scenario where a SU can only imitate the other SUs operating on the same channel. A systematic theoretical analysis is presented for both scenarios on the induced imitation dynamics and the convergence proper...

  14. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  15. Service Class Resource Management For Green Wireless-Optical Broadband Access NetworksWOBAN

    Directory of Open Access Journals (Sweden)

    SRUTHY.S

    2015-08-01

    Full Text Available Abstract-Broadband access networks have become an essential part of worldwide communication systems because of the exponential growth of broadband services such as video on demand high definition TV internet protocol TV and video conferencing. Exponential growth in the volume of wireless data boosted by the growing popularity of mobile devices such as smartphone and tablets has forced the telecommunication industries to rethink the way networks are currently designed and to focus on the development of high-capacity mobile broadband networks. In response to this challenge researchers have been working toward the development of an integrated wireless optical broadband access network. Two major candidate technologies which are currently known for their high capacity as well as quality of service QoS for multimedia traffic are passive optical networks PON and fourth generation 4G wireless networks. PON is a wired access technology well known for its cost efficiency and high capacity whereas 4G is a wireless broadband access technology which has achieved broad market acceptance because of its ease of deployment ability to offer mobility and its cost efficiency. Integration of PON and 4G technologies in the form of wireless-optical broadband access networks offers advantages such as extension of networks in rural areas support for mobile broadband services and quick deployment of broadband networks. These two technologies however have different design architectures for handling broadband services that require quality of service. For example 4G networks use traffic classification for supporting different QoS demands whereas the PON architecture has no such mechanism to differentiate between types of traffic. These two technologies also differ in their power saving mechanisms. Propose a service class mapping for the integrated PON-4G network which is based on the MG1 queuing model and class-based power saving mechanism which significantly improves the

  16. Redirecting a client device from a first gateway to a second gateway for accessing a network node function

    NARCIS (Netherlands)

    Strijkers, R.J.; Norp, A.H.J.

    2014-01-01

    The present invention enables a network operator to select a gateway that provides desirable operational parameters to access a network node function in a network node requested by a client. A network service provider detects what service a client device is requesting or using and selects a gateway

  17. Performance Evaluation of 5G Millimeter-Wave Cellular Access Networks Using a Capacity-Based Network Deployment Tool

    Directory of Open Access Journals (Sweden)

    Michel Matalatala

    2017-01-01

    Full Text Available The next fifth generation (5G of wireless communication networks comes with a set of new features to satisfy the demand of data-intensive applications: millimeter-wave frequencies, massive antenna arrays, beamforming, dense cells, and so forth. In this paper, we investigate the use of beamforming techniques through various architectures and evaluate the performance of 5G wireless access networks, using a capacity-based network deployment tool. This tool is proposed and applied to a realistic area in Ghent, Belgium, to simulate realistic 5G networks that respond to the instantaneous bit rate required by the active users. The results show that, with beamforming, 5G networks require almost 15% more base stations and 4 times less power to provide more capacity to the users and the same coverage performances, in comparison with the 4G reference network. Moreover, they are 3 times more energy efficient than the 4G network and the hybrid beamforming architecture appears to be a suitable architecture for beamforming to be considered when designing a 5G cellular network.

  18. An architecture to offer cloud-based radio access network as a service

    NARCIS (Netherlands)

    Studer Ferreira, Lucio; Pichon, Dominique; Hatefi, Atoosa; Gomes, Andre; Dimitrova, Desislava; Braun, Torsten; Karagiannis, Georgios; Karimzadeh, Morteza; Branco, Monica; Correia, Luis M.

    2014-01-01

    This paper addresses the novel notion of offering a radio access network as a service. Its components may be instantiated on general purpose platforms with pooled resources (both radio and hardware ones) dimensioned on-demand, elastically and following the pay-per-use principle. A novel architecture

  19. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  20. Assessing Individual Social Capital Capacity: The Development and Validation of a Network Accessibility Scale

    Science.gov (United States)

    Hatala, John-Paul

    2009-01-01

    Any organization that is able to promote the importance of increased levels of social capital and individuals who can leverage and use the resources that exist within the network may experience higher levels of performance. This study sought to add to our knowledge about individuals' accessing social resources for the purpose of accomplishing…

  1. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  2. Data Archiving and Networked Services (DANS) promotes sustained access to digital research data

    NARCIS (Netherlands)

    van Berchum, M.; Kraaikamp, Emilie

    2015-01-01

    Data Archiving and Networked Services (DANS) promotes sustained access to digital research data. For this purpose, DANS encourages researchers to archive and reuse data in a sustained form. In the online archiving system EASY research data is stored in a permanent and sustainable manner, according t

  3. Use cases, requirements and assessment criteria for future self-organising radio access networks

    NARCIS (Netherlands)

    Amirijoo, M.; Litjens, R.; Spaey, K.; Döttling, M.; Jansen, T.; Scully, N.; Türke, U.

    2008-01-01

    Self-organisation (self-optimisation, self-configuration, and self-healing) methods are a promising concept to automate wireless access network planning, deployment and optimisation. This paper contains a mind setting exercise. First the mechanisms for which self-organisation is anticipated to be ef

  4. DEVELOPMENT OF MATHEMATICAL MODEL OF NETWORK, USES THE COMPETING ACCESS TO THE DATA TRANSMISSION AREA

    Directory of Open Access Journals (Sweden)

    G. V. Abramov

    2012-01-01

    Full Text Available In this article we consider a mathematical model of a network that uses competitive environment, access to data. The authors have conducted theoretical and experimental investigation of the delivery time information, the formation of queues in the switching devices. Checking the adequacy of the model is performed using formal statistical tests of Fisher and Student.

  5. Modeling the video distribution link in the Next Generation Optical Access Networks

    DEFF Research Database (Denmark)

    Amaya, F.; Cárdenas, A.; Tafur Monroy, Idelfonso

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we...

  6. QoS Provisioning Techniques for Future Fiber-Wireless (FiWi Access Networks

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2010-04-01

    Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.

  7. Fair Scheduling and Throughput Maximization for IEEE 802.16 Mesh Mode Broadband Wireless Access Networks

    Science.gov (United States)

    Alam, Muhammad Mahbub; Hamid, Md. Abdul; Razzaque, Md. Abdur; Hong, Choong Seon

    Broadband wireless access networks are promising technology for providing better end user services. For such networks, designing a scheduling algorithm that fairly allocates the available bandwidth to the end users and maximizes the overall network throughput is a challenging task. In this paper, we develop a centralized fair scheduling algorithm for IEEE 802.16 mesh networks that exploits the spatio-temporal bandwidth reuse to further enhance the network throughput. The proposed mechanism reduces the length of a transmission round by increasing the number of non-contending links that can be scheduled simultaneously. We also propose a greedy algorithm that runs in polynomial time. Performance of the proposed algorithms is evaluated by extensive simulations. Results show that our algorithms achieve higher throughput than that of the existing ones and reduce the computational complexity.

  8. One4All Cooperative Media Access Strategy in Infrastructure Based Distributed Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    In this paper we propose the one4all cooperative access strategy to introduce a more efficient media access strategy for wireless networks. The one4all scheme is designed for the infrastructure based distributed wireless network architecture. The basic idea is that mobile devices can form...... a cooperative cluster using their short-range air interface and one device contends the channel for all the devices within the cluster. This strategy reduces the number of mobile devices involved in the collision process for the wireless medium resulting in larger throughput, smaller access delay, and less...... energy consumption. Based on an analytical model, the proposed strategy is compared with the two existing strategies RTS/CTS (request to send/ clear to send) and packet aggregation. The results show that the proposed cooperative scheme has similar throughput performance as packet aggregation and it has...

  9. A Novel Ranking Algorithm Based Network Selection For Heterogeneous Wireless Access

    Directory of Open Access Journals (Sweden)

    Mohamed Lahby

    2013-02-01

    Full Text Available In order to provide ubiquitous access for the users, future generation network integrate a multitude of radio access technologies (RAT’S which can interoperate between them. However, the most challenging problem is the selection of an optimal radio access network, in terms of quality of service anywhere at anytime. This paper proposes a novel ranking algorithm, which combines multi attribute decision making (MADM and Mahalanobis distance. Firstly, a classification method is applied to build a classes which having the homogeneous criteria. Afterwards, the Fuzzy AHP, MADM method is applied to determine weights of inter-classes and intraclasses. Finally, Mahalanobis distance is used to rank the alternatives. The simulation results show that the proposed algorithm can effectively reduce the ranking abnormality and the number of handoffs.

  10. Accessing Multi-Source Geological Data through Network in MORPAS Software System

    Institute of Scientific and Technical Information of China (English)

    Mei Hongbo; Hu Guangdao; Chen Jianguo; Li Zhenhua

    2003-01-01

    MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system.

  11. Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    Directory of Open Access Journals (Sweden)

    Lau WingCheong

    2010-01-01

    Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

  12. A secure WDM ring access network employing silicon micro-ring based remote node

    Science.gov (United States)

    Sung, Jiun-Yu; Chow, Chi-Wai; Yeh, Chien-Hung; Xu, Ke; Hsu, Chin-Wei; Su, Hong-Quan; Tsang, Hon-Ki

    2014-08-01

    A secure and scalable wavelength-division-multiplexing (WDM) ring-based access network is proposed and demonstrated using proof-of-concept experiments. In the remote node (RN), wavelength hopping for specific optical networking unit (ONU) is deployed by using silicon micro-ring resonators (SMR). Using silicon-based devices could be cost-effective for the cost-sensitive access network. Hence the optical physical layer security is introduced. The issues of denial of service (DOS) attacks, eavesdropping and masquerading can be made more difficult in the proposed WDM ring-based access network. Besides, the SMRs with different dropped wavelengths can be cascaded, such that the signals pass through the preceding SMRs can be dropped by a succeeding SMR. This can increase the scalability of the RN for supporting more ONUs for future upgrade. Here, error-free 10 Gb/s downlink and 1.25 Gb/s uplink transmission are demonstrated to show the feasibility of the proposed network.

  13. [Principles and stakes of external communication of healthcare networks: the case of heathcare networks for health services accessibility].

    Science.gov (United States)

    Plu, Isabelle; Gignon, Maxime; Emery, Sophie; Purssell-François, Irène; Moutel, Grégoire; Hervé, Christian

    2009-01-01

    Healthcare networks which purpose is to manage patients through better coordination of the care, need to develop a communication strategy to be recognized by the public and by healthcare professionals and to be inserted in the healthcare landscape. We firstly will present legal requirements related to external communication of healthcare networks. Then, we will describe the different tools which can be used to communicate about healthcare networks in its area, with the example from a healthcare network for health services accessibility. In the French Public health code, the legal status and the ethical charter of the healthcare network have to be delivered to the healthcare professionals in its area and to the patients. Moreover, the example healthcare network informed collectively and individually the healthcare professionals of its area about its activities. It made it known to the public by the way of departmental prevention manifestations and health education sessions in community social associations. From these examples, we will conduct an ethical reflection on the modalities and stakes of the external communication of healthcare networks.

  14. A Novel Adaptive MAC Protocol for Wireless Internet Access Network with Smart Antennas

    Institute of Scientific and Technical Information of China (English)

    YANGJun; LIJiandong

    2004-01-01

    Employing smart antennas in the Central access point (CAP) of wireless Internet access networks is studied. Based on the characteristics of the networks and smart antennas, a Polling-based Adaptive beamforming multiple access protocol (PB-ABFMA) is proposed. In PB-ABFMA, the CAP requests the corresponding Mobile terminal (MT) to transmit training sequence just before the data packets transmission, so the Temporal reference beamforming (TRB) can be performed by the smart antennas. The CAP schedules packet transmissions based on the polling mechanism and dynamic TDMA, and a mini-slot is used to keep connectivity when an MT is idle, therefore,the access delay is reduced. Meanwhile, a simple and effec-tive access method is proposed to guarantee rapid access of new arrival MTs to the channel. Based on the “requestreply” traffic, which is the main traffic in Internet, the theoretical analysis of channel utilization and mean turnaround delay is presented. Analysis and simulation results show that the proposed PB-ABFMA protocols effectively support the application of smart antennas and provide high channel utilization and low turn-around delay.

  15. Experimental demonstration of large capacity WSDM optical access network with multicore fibers and advanced modulation formats.

    Science.gov (United States)

    Li, Borui; Feng, Zhenhua; Tang, Ming; Xu, Zhilin; Fu, Songnian; Wu, Qiong; Deng, Lei; Tong, Weijun; Liu, Shuang; Shum, Perry Ping

    2015-05-01

    Towards the next generation optical access network supporting large capacity data transmission to enormous number of users covering a wider area, we proposed a hybrid wavelength-space division multiplexing (WSDM) optical access network architecture utilizing multicore fibers with advanced modulation formats. As a proof of concept, we experimentally demonstrated a WSDM optical access network with duplex transmission using our developed and fabricated multicore (7-core) fibers with 58.7km distance. As a cost-effective modulation scheme for access network, the optical OFDM-QPSK signal has been intensity modulated on the downstream transmission in the optical line terminal (OLT) and it was directly detected in the optical network unit (ONU) after MCF transmission. 10 wavelengths with 25GHz channel spacing from an optical comb generator are employed and each wavelength is loaded with 5Gb/s OFDM-QPSK signal. After amplification, power splitting, and fan-in multiplexer, 10-wavelength downstream signal was injected into six outer layer cores simultaneously and the aggregation downstream capacity reaches 300 Gb/s. -16 dBm sensitivity has been achieved for 3.8 × 10-3 bit error ratio (BER) with 7% Forward Error Correction (FEC) limit for all wavelengths in every core. Upstream signal from ONU side has also been generated and the bidirectional transmission in the same core causes negligible performance degradation to the downstream signal. As a universal platform for wired/wireless data access, our proposed architecture provides additional dimension for high speed mobile signal transmission and we hence demonstrated an upstream delivery of 20Gb/s per wavelength with QPSK modulation formats using the inner core of MCF emulating a mobile backhaul service. The IQ modulated data was coherently detected in the OLT side. -19 dBm sensitivity has been achieved under the FEC limit and more than 18 dB power budget is guaranteed.

  16. Cell Deployment Optimization for Cloud Radio Access Networks using Teletraffic Theory

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Christiansen, Henrik Lehrmann; Iversen, Villy Bæk

    2015-01-01

    Cloud Radio Access Network (C-RAN) is a new mobile radio access network design based on centralized and pooled processing. It offers potential cost savings by utilizing the so-called tidal effect due to user mobility in cellular networks. This paper provides a quantitative analysis....... The conditions for optimization are based on the aggregated traffic characteristics and baseband unit pool dimensioning. This paper considers cells with different traffic profiles and the optimal conditions for maximization of the pooling gain are determined. Furthermore, it is shown how the model can be applied...... to dynamically re-assign cells to a pool of baseband units. The re-assignment is based on the cell load and traffic characteristics such that effective utilization of the baseband resources is assured....

  17. HOWRAN: An Hybrid Optical Wireless Radio Access Network for WiMAX Antennas Backhauling

    Science.gov (United States)

    Gagnaire, Maurice; Youssef, Tony

    In comparison to existing 3G or 3G+ wireless systems, fourth generation (4G), long-term evolution (LTE) or mobile Wimax are characterized by higher bit rates, highly fluctuant traffic matrices and higher antenna’s density. Current backhauling techniques federating radio antennas are not suited to these new characteristics. Several investigations are carried out for the design of new generation radio access networks (NG-RAN) in charge of concentrating radio cellular traffic from the base stations to the core network. In this paper, we propose an original approach based on an Hybrid Optical Wireless Radio Access Network (HOWRAN) exploiting the benefits of radio-over-fiber technologies and of recent advances in the field of optical devices and systems. As an illustration, we apply the HOWRAN concept to the backhauling of fixed or mobile WiMAX base stations. The two main innovative aspects of HOWRAN are depicted: its hardware architecture and its control plane.

  18. Optimum feedback strategy for access control mechanism modelled as stochastic differential equation in computer network

    Directory of Open Access Journals (Sweden)

    Ahmed N. U.

    2004-01-01

    Full Text Available We consider optimum feedback control strategy for computer communication network, in particular, the access control mechanism. The dynamic model representing the source and the access control system is described by a system of stochastic differential equations developed in our previous works. Simulated annealing (SA was used to optimize the parameters of the control law based on neural network. This technique was found to be computationally intensive. In this paper, we have proposed to use a more powerful algorithm known as recursive random search (RRS. By using this technique, we have been able to reduce the computation time by a factor of five without compromising the optimality. This is very important for optimization of high-dimensional systems serving a large number of aggregate users. The results show that the proposed control law can improve the network performance by improving throughput, reducing multiplexor and TB losses, and relaxing, not avoiding, congestion.

  19. ALPHA: Proposal of Mapping QoS Parameters between UPnP Home Network and GMPLS Access

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Sköldström, Pontus; Gavler, Anders

    2011-01-01

    This paper is treating the interdomain QoS signaling between the home and access domains with a focus on applying it for providing QoS between a UPnP-QoS based home network and GMPLS based access network. The work presented here is defining a possible approach for an interface between UPn...

  20. Optical network unit placement in Fiber-Wireless (FiWi) access network by Moth-Flame optimization algorithm

    Science.gov (United States)

    Singh, Puja; Prakash, Shashi

    2017-07-01

    Hybrid wireless-optical broadband access network (WOBAN) or Fiber-Wireless (FiWi) is the integration of wireless access network and optical network. This hybrid multi-domain network adopts the advantages of wireless and optical domains and serves the demand of technology savvy users. FiWi exhibits the properties of cost effectiveness, robustness, flexibility, high capacity, reliability and is self organized. Optical Network Unit (ONU) placement problem in FiWi contributes in simplifying the network design and enhances the performance in terms of cost efficiency and increased throughput. Several individual-based algorithms, such as Simulated Annealing (SA), Tabu Search, etc. have been suggested for ONU placement, but these algorithms suffer from premature convergence (trapping in a local optima). The present research work undertakes the deployment of FiWi and proposes a novel nature-inspired heuristic paradigm called Moth-Flame optimization (MFO) algorithm for multiple optical network units' placement. MFO is a population based algorithm. Population-based algorithms are better in handling local optima avoidance. The simulation results are compared with the existing Greedy and Simulated Annealing algorithms to optimize the position of ONUs. To the best of our knowledge, MFO algorithm has been used for the first time in this domain, moreover it has been able to provide very promising and competitive results. The performance of MFO algorithm has been analyzed by varying the 'b' parameter. MFO algorithm results in faster convergence than the existing strategies of Greedy and SA and returns a lower value of overall cost function. The results exhibit the dependence of the objective function on the distribution of wireless users also.

  1. Highly Reliable PON Optical Splitters for Optical Access Networks in Outside Environments

    Science.gov (United States)

    Watanabe, Hiroshi; Araki, Noriyuki; Fujimoto, Hisashi

    Broadband optical access services are spreading throughout the world, and the number of fiber to the home (FTTH) subscribers is increasing rapidly. Telecom operators are constructing passive optical networks (PONs) to provide optical access services. Externally installed optical splitters for PONs are very important passive devices in optical access networks, and they must provide satisfactory performance as outdoor plant over long periods. Therefore, we calculate the failure rate of optical access networks and assign a failure rate to the optical splitters in optical access networks. The maximum cumulative failure rate of 1 × 8 optical splitters was calculated as 0.025 for an optical access fiber length of 2.1km and a 20-year operating lifetime. We examined planar lightwave circuit (PLC) type optical splitters for use as outside plant in terms of their optical characteristics and environmental reliability. We confirmed that PLC type optical splitters have sufficient optical performance for a PON splitter and sufficient reliability as outside plant in accordance with ITU-T standard values. We estimated the lifetimes of three kinds of PLC type optical splitters by using accelerated aging tests. The estimated failure rate of these splitters installed in optical access networks was below the target value for the cumulative failure rate, and we confirmed that they have sufficient reliability to maintain the quality of the network service. We developed 1 × 8 optical splitter modules with plug and socket type optical connectors and optical fiber cords for optical aerial closures designed for use as outside plant. These technologies make it easy to install optical splitters in an aerial optical closure. The optical splitter modules have sufficient optical performance levels for PONs because the insertion loss at the commercially used wavelengths of 1.31 and 1.55µm is less than the criterion established by ITU-T Recommendation G.671 for optical splitters. We performed a

  2. Emotional voices in context: A neurobiological model of multimodal affective information processing

    Science.gov (United States)

    Brück, Carolin; Kreifelts, Benjamin; Wildgruber, Dirk

    2011-12-01

    Just as eyes are often considered a gateway to the soul, the human voice offers a window through which we gain access to our fellow human beings' minds - their attitudes, intentions and feelings. Whether in talking or singing, crying or laughing, sighing or screaming, the sheer sound of a voice communicates a wealth of information that, in turn, may serve the observant listener as valuable guidepost in social interaction. But how do human beings extract information from the tone of a voice? In an attempt to answer this question, the present article reviews empirical evidence detailing the cerebral processes that underlie our ability to decode emotional information from vocal signals. The review will focus primarily on two prominent classes of vocal emotion cues: laughter and speech prosody (i.e. the tone of voice while speaking). Following a brief introduction, behavioral as well as neuroimaging data will be summarized that allows to outline cerebral mechanisms associated with the decoding of emotional voice cues, as well as the influence of various context variables (e.g. co-occurring facial and verbal emotional signals, attention focus, person-specific parameters such as gender and personality) on the respective processes. Building on the presented evidence, a cerebral network model will be introduced that proposes a differential contribution of various cortical and subcortical brain structures to the processing of emotional voice signals both in isolation and in context of accompanying (facial and verbal) emotional cues.

  3. DESIGN AND IMPLEMENTATION OF ROLE BASE ACCESS CONTROL SYSTEM FOR NETWORK RESOURCES

    Directory of Open Access Journals (Sweden)

    S.R. Kodituwakku

    2010-11-01

    Full Text Available Role Based Access Control is very useful for providing a high level description of access control for organizational applications. This paper proposes a role based framework that deals with security problems in an intranet environment. The proposed framework protects intranet resources from unauthorized users. The salient feature of the framework is that it allows intranet users to access only authorized resources. It consists of two kinds of role hierarchies: global role hierarchy and local role hierarchy, and two levels of permissions: server permission and object permission. They simplify the way of structuring authority and responsibility in the whole intranet and the allocation of privileges for different objects within a particular server. The proposed framework is implemented over Windows platform and tested for the validity. The test results indicated that it can successfully be used to control accessing network objects.

  4. Stability of multiple access network control schemes with carrier sensing and exponential backoff

    Science.gov (United States)

    Barany, Ernest; Krupa, Maciej

    2006-05-01

    A new approach to determine the stability of multiple access network control schemes is presented. A “busy” network (the precise meaning of the term “busy” will be presented in the text) is modelled as a switched single-server hybrid dynamical system whose switching laws are stochastic and are based on typical multiple access network control protocols such as ALOHA and ethernet. The techniques are used to compute the critical ratio of traffic production per network node to total available bandwidth that ensures that data packets will not accumulate unboundedly in waiting queues at each node. This is a measure of stability of the network and is an emergent, global, property determined by decentralized, autonomous behavior of each node. The behavior of each individual node is regarded as “microscopic” and the collective behavior of the network as a whole are emergent consequences of such microscopic laws. The results follow from the stationary distribution property of ergodic Markov chains.

  5. Heterogeneous wireless/wireline optical access networks with the R-EAT as backend component

    Science.gov (United States)

    Hagedorn, Klaus; Gindera, Ralf; Stohr, Andreas; Jager, Dieter

    2004-09-01

    A heterogeneous wireless/wireline optical transmission link using a reflection type electroabsorption transceiver (R-EAT) is presented. Simultaneous transmission of full-duplex broadband wireless LAN (WLAN) channels and 1Gb/s base band data is experimentally demonstrated. The system link employs sub-carrier multiplexing (SCM) and two optical channels for full duplex transmission of various analog WLAN channels and downlink digital base band data. The developed link architecture is suitable for simultaneous transmission of broadband wireline and wireless signals, it enables the coexistence and interoperability between wireline and wireless access technologies. The developed R-EAT component employed in this wireline/wireless access system, features "single-chip-component" base stations in access networks with star type topology where only a single optical fiber is used for bidirectional optical transmission. The R-EAT can be used within the optical C-band (1530- 1560nm) and is suitable for (D)WDM networks. Bit error rate measurements demonstrate the capabilities of the R-EAT for 1Gb/s base band transmission. The analog performance for WLAN transmission is characterised by a spurious free dynamic range (SFDR) of more than 75dB and 90dB for uplink and downlink transmission, respectively. The link gain for uplink and downlink transmission is -42dB and -37dB, respectively. The demonstrates the analog performances of the R-EAT for being used in wireless access networks such as W-LAN.

  6. Coalitional Games in Partition Form for Joint Spectrum Sensing and Access in Cognitive Radio Networks

    Science.gov (United States)

    Saad, Walid; Han, Zhu; Zheng, Rong; Hjorungnes, Are; Basar, Tamer; Poor, H. Vincent

    2012-04-01

    Unlicensed secondary users (SUs) in cognitive radio networks are subject to an inherent tradeoff between spectrum sensing and spectrum access. Although each SU has an incentive to sense the primary user (PU) channels for locating spectrum holes, this exploration of the spectrum can come at the expense of a shorter transmission time, and, hence, a possibly smaller capacity for data transmission. This paper investigates the impact of this tradeoff on the cooperative strategies of a network of SUs that seek to cooperate in order to improve their view of the spectrum (sensing), reduce the possibility of interference among each other, and improve their transmission capacity (access). The problem is modeled as a coalitional game in partition form and an algorithm for coalition formation is proposed. Using the proposed algorithm, the SUs can make individual distributed decisions to join or leave a coalition while maximizing their utilities which capture the average time spent for sensing as well as the capacity achieved while accessing the spectrum. It is shown that, by using the proposed algorithm, the SUs can self-organize into a network partition composed of disjoint coalitions, with the members of each coalition cooperating to jointly optimize their sensing and access performance. Simulation results show the performance improvement that the proposed algorithm yields with respect to the non-cooperative case. The results also show how the algorithm allows the SUs to self-adapt to changes in the environment such as the change in the traffic of the PUs, or slow mobility.

  7. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  8. Access, engagement, networks, and norms: Dimensions of social capital at work in a first grade classroom

    Science.gov (United States)

    Wexler-Robock, Stephanie

    Social capital refers to access and use of resources available through one's networks to solve problems, and the norms that reflect inclusive or exclusive access to those networks and resources. Research has found positive relationships between social capital, academic achievement, and attainment. Studies, however, have generally examined social capital through factors that occur outside the classroom; students who have social capital, acquired through their family and community relationships, seem to be more successful academically. Limited research has explored what if any factors within the classroom might impact the production, and nature of social capital, or its workings in a classroom. The purpose of this study was to explore the workings and nature of classroom social capital, including its possible relationships to engagement and cognition among 5 student participants. Using methods of qualitative data collection, mixed methods were used to analyze information resources, participants' networking, student work, and classroom discourse. Eight interdependent networking factors and 3 overarching patterns of norms were discovered. The networking factors reflected the structure, content, processes, purposes, and acceptability of participants' networking. The norms, also working interdependently, appeared to promote or inhibit among other things, engagement in networking, help seeking, access, sharing, and intertextual use of diverse, often complex sources of information. Through interaction of the 8 factors and 3 overarching norms, ongoing outcomes of networking appeared to include the creation of bridging (inclusive) and bonding (exclusive) forms of social capital, and depth of scientific conceptual understanding, in this case, about birds. Bridging social capital appeared related to willingness to engage in strong and weak tie networking, help seeking, intertextuality, and possibly to mastery goal orientation for all participants, regardless of reading level

  9. THE ACCESSIBILITY ASSESSMENT OF REGIONAL TRANSPORT NETWORK IN THE SOUTH EAST EUROPE

    Directory of Open Access Journals (Sweden)

    Ana Šimecki

    2013-12-01

    Full Text Available Development of transport infrastructure and establishment of effective transport systems is a prerequisite for the achievement of broad based economic growth which is one of the European and Southeast European major development goals. Due to the lack of intraregional connectivity within the South East Europe (SEE, certain parts of the region have limited access to regional, European and global markets. Mentioned imbalance of accessibility to services, markets and opportunities for further social and economic progress is an obstacle for overall development of the SEE region. The research is thematically oriented on the assessment of road, rail and air passenger transport accessibility in the SEE with the aim of providing scientific overview of current regional transport network connectivity serving as basis for further identification of potential improvement measures. The research is conducted on the SEETO Comprehensive Network that was established as a main output of joint cooperation between seven Regional Participants and the European Commission as a result of signing of the Memorandum of Understanding for the Development of the Core Regional Transport Network (MoU in 2004. The multimodal Core Regional Transport Network defined under the MoU represents a commonly agreed main and ancillary transport infrastructure in the SEE, which is the base for the implementation of transport related investments programmes.

  10. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  11. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  12. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  13. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  14. Green survivability in Fiber-Wireless (FiWi) broadband access network

    Science.gov (United States)

    Liu, Yejun; Guo, Lei; Gong, Bo; Ma, Rui; Gong, Xiaoxue; Zhang, Lincong; Yang, Jiangzi

    2012-03-01

    Fiber-Wireless (FiWi) broadband access network is a promising "last mile" access technology, because it integrates wireless and optical access technologies in terms of their respective merits, such as high capacity and stable transmission from optical access technology, and easy deployment and flexibility from wireless access technology. Since FiWi is expected to carry a large amount of traffic, numerous traffic flows may be interrupted by the failure of network components. Thus, survivability in FiWi is a key issue aiming at reliable and robust service. However, the redundant deployment of backup resource required for survivability usually causes huge energy consumption, which aggravates the global warming and accelerates the incoming of energy crisis. Thus, the energy-saving issue should be considered when it comes to survivability design. In this paper, we focus on the green survivability in FiWi, which is an innovative concept and remains untouched in the previous works to our best knowledge. We first review and discuss some challenging issues about survivability and energy-saving in FiWi, and then we propose some instructive solutions for its green survivability design. Therefore, our work in this paper will provide the technical references and research motivations for the energy-efficient and survivable FiWi development in the future.

  15. Mapping the accessibility of the disulfide crosslink network in the wool fiber cortex.

    Science.gov (United States)

    Deb-Choudhury, Santanu; Plowman, Jeffrey E; Rao, Kelsey; Lee, Erin; van Koten, Chikako; Clerens, Stefan; Dyer, Jolon M; Harland, Duane P

    2015-02-01

    The disulfide bond network within the cortex of mammalian hair has a critical influence on the physical and mechanical characteristics of the fiber. The location, pattern, and accessibility of free and crosslinked cysteines underpin the properties of this network, but have been very difficult to map and understand, because traditional protein extraction techniques require the disruption of these disulfide bonds. Cysteine accessibility in both trichocyte keratins and keratin associated proteins (KAPs) of wool was investigated using staged labeling, where reductants and chaotropic agents were used to expose cysteines in a stepwise fashion according to their accessibility. Cysteines thus exposed were labeled with distinguishable alkylation agents. Proteomic profiling was used to map peptide modifications and thereby explore the role of KAPs in crosslinking keratins. Labeled cysteines from KAPs were detected when wool was extracted with reductant only. Among them were sequences from the end domains of KAPs, indicating that those cysteines were easily accessible in the fiber and could be involved in forming interdisulfide linkages with keratins or with other KAPs. Some of the identified peptides were from the rod domains of Types I and II keratins, with their cysteines positioned on the exposed surface of the α-helix. Peptides were also identified from keratin head and tail domains, demonstrating that they are not buried within the filament structure and, hence, have a possible role in forming disulfide linkages. From this study, a deeper understanding of the accessibility and potential reactivity of cysteine residues in the wool fiber cortex was obtained.

  16. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  17. A Greedy link scheduler for Wireless Networks having Gaussian Broadcast and Multiple Access Channels

    CERN Document Server

    Sridharan, Arun; Uysal-Biyikoglu, Elif

    2010-01-01

    Information theoretic Broadcast Channels (BC) and Multiple Access Channels (MAC) enable a single node to transmit data simultaneously to multiple nodes, and multiple nodes to transmit data simultaneously to a single node respectively. In this paper, we address the problem of link scheduling in multihop wireless networks containing nodes with BC and MAC capabilities. We first propose an interference model that extends protocol interference models, originally designed for point to point channels, to include the possibility of BC and MAC. Due to the high complexity of optimal link schedulers, we introduce the Multiuser Greedy Maximum Weight algorithm for link scheduling in multihop wireless networks containing BCs and MACs. Given a network graph, we develop new local pooling conditions and show that the performance of our algorithm can be fully characterized using the associated parameter, the multiuser local pooling factor. We provide examples of some network graphs, on which we apply local pooling conditions a...

  18. Advanced modulation formats for delivery of heterogeneous wired and wireless access networks

    Science.gov (United States)

    Chow, C. W.; Yeh, C. H.

    2009-12-01

    It is believed that the integration of wired and wireless access networks (or heterogeneous network) will provide high bandwidth and flexibility for both fixed and mobile users in a single and cost-effective platform. Here, we propose and demonstrate a signal remodulated wired and wireless network with wireless signal broadcast. Dark-return-to-zero (DRZ) and polarization-shift-keying (PolSK) signals are used for the downstream wired and wireless applications respectively. At the remote antenna unit (RAU), the PolSK signal is demodulated to produce the binary-phase-shift-keying (BPSK) signal, which will be used for the wireless broadcast application. Signal remodulation is demonstrated using reflective semiconductor optical amplifier (RSOA) as a colorless reflective modulator in the optical networking unit (ONU)/RAU. The downstream signal is remodulated at the ONU/RAU to produce the non-return-to-zero (NRZ) upstream signal.

  19. Optical interconnection network for parallel access to multi-rank memory in future computing systems.

    Science.gov (United States)

    Wang, Kang; Gu, Huaxi; Yang, Yintang; Wang, Kun

    2015-08-10

    With the number of cores increasing, there is an emerging need for a high-bandwidth low-latency interconnection network, serving core-to-memory communication. In this paper, aiming at the goal of simultaneous access to multi-rank memory, we propose an optical interconnection network for core-to-memory communication. In the proposed network, the wavelength usage is delicately arranged so that cores can communicate with different ranks at the same time and broadcast for flow control can be achieved. A distributed memory controller architecture that works in a pipeline mode is also designed for efficient optical communication and transaction address processes. The scaling method and wavelength assignment for the proposed network are investigated. Compared with traditional electronic bus-based core-to-memory communication, the simulation results based on the PARSEC benchmark show that the bandwidth enhancement and latency reduction are apparent.

  20. A Quantile-Based Sequential Feedback Scheme via Overhearing in Multicarrier Access Networks

    CERN Document Server

    Baek, Seung Jun

    2010-01-01

    We propose a scheme to reduce the overhead associated with channel state information (CSI) feedback required for opportunistic scheduling in multicarrier access networks. We study the case where CSI is partially overheard by mobiles and one can suppress transmitting CSI reports for time varying channel of inferior quality. As a means to assess channel quality and exploit multiuser diversity we adopt maximum quantile (MQ) scheduling. We show that the problem of minimizing the average feedback overhead can be formulated as a Bayesian network problem. A greedy heuristic using probabilistic inference is proposed to deal with the NP-hardness of the problem. Leveraging properties of MQ scheduling we first show that networks having tree-like overhearing graphs admit simple inference. We then present a class of more general network structures for which exact inference is computationally tractable. Simulation results are provided to demonstrate the improvements offered by the proposed heuristic.

  1. Wireless and wireline service convergence in next generation optical access networks - the FP7 WISCON project

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Pang, Xiaodan; Lebedev, Alexander

    2014-01-01

    . In this paper, we will present the Marie Curie Framework Program 7 project “Wireless and wireline service convergence in next generation optical access networks” (WISCON), which focuses on the conception and study of novel architectures for wavelength-division-multiplexing (WDM) optical multi-modulation format...... radio-over-fiber (RoF) systems; this is a promising solution to implement broadband seamless wireless -wireline access networks. This project successfully concluded in autumn 2013, and is being follow up by another Marie Curie project entitled “flexible edge nodes for dynamic optical interconnection...

  2. Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method

    Science.gov (United States)

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches. PMID:24883384

  3. A Survey of Downlink Non-Orthogonal Multiple Access for 5G Wireless Communication Networks

    Institute of Scientific and Technical Information of China (English)

    WEI Zhiqiang; YUAN Jinhong; Derrick Wing Kwan Ng; Maged Elkashlan; DING Zhiguo

    2016-01-01

    Non⁃orthogonal multiple access (NOMA) has been recognized as a promising multiple access technique for the next generation cel⁃lular communication networks. In this paper, we first discuss a simple NOMA model with two users served by a single⁃carrier si⁃multaneously to illustrate its basic principles. Then, a more general model with multicarrier serving an arbitrary number of users on each subcarrier is also discussed. An overview of existing works on performance analysis, resource allocation, and multiple⁃in⁃put multiple⁃output NOMA are summarized and discussed. Furthermore, we discuss the key features of NOMA and its potential re⁃search challenges.

  4. Topology-selective jamming of fully-connected, code-division random-access networks

    Science.gov (United States)

    Polydoros, Andreas; Cheng, Unjeng

    1990-01-01

    The purpose is to introduce certain models of topology selective stochastic jamming and examine its impact on a class of fully-connected, spread-spectrum, slotted ALOHA-type random access networks. The theory covers dedicated as well as half-duplex units. The dominant role of the spatial duty factor is established, and connections with the dual concept of time selective jamming are discussed. The optimal choices of coding rate and link access parameters (from the users' side) and the jamming spatial fraction are numerically established for DS and FH spreading.

  5. Joint power and multiple access control for wireless mesh network with Rose projection method.

    Science.gov (United States)

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches.

  6. Using narrative inquiry to listen to the voices of adolescent mothers in relation to their use of social networking sites (SNS).

    Science.gov (United States)

    Nolan, Samantha; Hendricks, Joyce; Williamson, Moira; Ferguson, Sally

    2017-09-14

    This article presents a discussion highlighting the relevance and strengths of using narrative inquiry to explore experiences of social networking site (SNS) use by adolescent mothers. Narrative inquiry as a method reveals truths about holistic human experience. Knowledge gleaned from personal narratives informs nursing knowledge and clinical practice. This approach gives voice to adolescent mothers in relation to their experiences with SNS as a means of providing social support. Discussion paper. This paper draws and reflects on the author's experiences using narrative inquiry and is supported by literature and theory. The following databases were searched: CINAHL, Cochrane Library, Medline, Scopus, ERIC, ProQuest, PsychINFO, Web of Science and Health Collection (Informit). Key terms and Boolean search operators were used to broaden the search criteria. Search terms included: adolescent mother, teenage mother, "social networking sites", online, social media, Facebook, social support, social capital and information. Dates for the search were limited to January 1995 - June 2017. Narrative research inherently values the individual 'story' of experience. This approach facilitates rapport building and methodological flexibility with an often difficult to engage sample group, adolescents. Narrative inquiry reveals a deep level of insight into social networking site use by adolescent mothers. The flexibility afforded by use of a narrative approach allows for fluidity and reflexivity in the research process. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  7. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  8. A Reinforcement Routing Algorithm with Access Selection in the Multi-Hop Multi-Interface Networks

    Science.gov (United States)

    Jafari, Amir Hosein; Shahhoseini, Hadi Shahriar

    2015-03-01

    In this paper, a routing algorithm is proposed for access selection in a network to find the optimal paths among intermediate nodes with multiple interfaces. Markov Decision Process is applied in each node to find optimal policy and select proper paths to the best access point in a dynamic environment. A reward function is defined as environment feedback to optimize and adapt routing behavior of nodes based on the local information. Selection metrics in each node are interface load, link quality and destination condition. It is shown, by using the proposed algorithm, there are better management in the node which decreases interference and collision and selects links with better quality toward the best possible destination. The performance of the method is exemplified and it is shown how the throughput and average delay of the network with more interface in its nodes, improved while packet loss degrades. As an example a two-interface and a one-interface network are studied. It is shown when network load is increased, interface management will improve the throughput, in the network with two-interface nodes. Also, by considering the link quality factor in the reward function, packet dropping becomes less but average delay increases.

  9. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  10. BioSYNTHESIS: access to a knowledge network of health sciences databases.

    Science.gov (United States)

    Broering, N C; Hylton, J S; Guttmann, R; Eskridge, D

    1991-04-01

    Users of the IAIMS Knowledge Network at the Georgetown University Medical Center have access to multiple in-house and external databases from a single point of entry through BioSYNTHESIS. The IAIMS project has developed a rich environment of biomedical information resources that represent a medical decision support system for campus physicians and students. The BioSYNTHESIS system is an information navigator that provides transparent access to a Knowledge Network of over a dozen databases. These multiple health sciences databases consist of bibliographic, informational, diagnostic, and research systems which reside on diverse computers such as DEC VAXs, SUN 490, AT&T 3B2s, Macintoshes, IBM PC/PS2s and the AT&T ISN and SYTEK network systems. Ethernet and TCP/IP protocols are used in the network architecture. BioSYNTHESIS also provides network links to the other campus libraries and to external institutions. As additional knowledge resources and technological advances have become available. BioSYNTHESIS has evolved from a two phase to a three phase program. Major components of the system including recent achievements and future plans are described.

  11. Improving collaboration between primary care research networks using Access Grid technology

    Directory of Open Access Journals (Sweden)

    Zsolt Nagykaldi

    2008-05-01

    Full Text Available Access Grid (AG is an Internet2-driven, high performance audio_visual conferencing technology used worldwide by academic and government organisations to enhance communication, human interaction and group collaboration. AG technology is particularly promising for improving academic multi-centre research collaborations. This manuscript describes how the AG technology was utilised by the electronic Primary Care Research Network (ePCRN that is part of the National Institutes of Health (NIH Roadmap initiative to improve primary care research and collaboration among practice- based research networks (PBRNs in the USA. It discusses the design, installation and use of AG implementations, potential future applications, barriers to adoption, and suggested solutions.

  12. New resource allocation scheme for cognitive relay networks with opportunistic access

    KAUST Repository

    Zafar, Ammar

    2012-06-01

    In this paper, a new resource allocation scheme to minimize Symbol Error rate (SER) for relay assisted cognitive radio networks is studied. A cognitive relay network with amplify-and-forward (AF) fixed gain relays and opportunistic access to the licensed spectrum is considered. The SER objective function and the optimization constraints are derived first. The resource allocation algorithm is then derived using the Langrangian multiplier method. Closed form expressions are derived for the source and relay powers and, symbol time. Analytical results show that the optimal power allocation follows an extended water-filling solution. © 2012 IEEE.

  13. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    OpenAIRE

    Kilhung Lee

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is eit...

  14. Helping people to keep their voices healthy and to communicate effectively.

    Science.gov (United States)

    Comins, R

    1998-01-01

    Voice is essential for all spoken languages. The mechanism of voice is taken for granted and its potential in human communication is overlooked. The combined expertise of specialist speech and language therapists and voice teachers in the Voice Care Network is focused on disseminating knowledge about care, development and effective use of the speaking voice. They cooperate, exchange ideas and develop practical voice workshops to prevent vocal problems and to support teachers, lecturers and others who depend on voice. A countrywide network of tutors runs workshops in universities and schools. Feedback shows appreciation of the overall benefits.

  15. Coalitional Games in Partition Form for Joint Spectrum Sensing and Access in Cognitive Radio Networks

    CERN Document Server

    Saad, Walid; Zheng, Rong; Hjørungnes, Are; Başar, Tamer; Poor, H Vincent

    2012-01-01

    Unlicensed secondary users (SUs) in cognitive radio networks are subject to an inherent tradeoff between spectrum sensing and spectrum access. Although each SU has an incentive to sense the primary user (PU) channels for locating spectrum holes, this exploration of the spectrum can come at the expense of a shorter transmission time, and, hence, a possibly smaller capacity for data transmission. This paper investigates the impact of this tradeoff on the cooperative strategies of a network of SUs that seek to cooperate in order to improve their view of the spectrum (sensing), reduce the possibility of interference among each other, and improve their transmission capacity (access). The problem is modeled as a coalitional game in partition form and an algorithm for coalition formation is proposed. Using the proposed algorithm, the SUs can make individual distributed decisions to join or leave a coalition while maximizing their utilities which capture the average time spent for sensing as well as the capacity achi...

  16. Proposition of a full deterministic medium access method for wireless network in a robotic application

    CERN Document Server

    Bossche, Adrien Van Den; Campo, Eric

    2008-01-01

    Today, many network applications require shorter react time. Robotic field is an excellent example of these needs: robot react time has a direct effect on its task's complexity. Here, we propose a full deterministic medium access method for a wireless robotic application. This contribution is based on some low-power wireless personal area networks, like ZigBee standard. Indeed, ZigBee has identified limits with Quality of Service due to non-determinist medium access and probable collisions during medium reservation requests. In this paper, two major improvements are proposed: an efficient polling of the star nodes and a temporal deterministic distribution of peer-to-peer messages. This new MAC protocol with no collision offers some QoS faculties.

  17. A passive optical network based on optical code division multiplexing and time division multiple access technology

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    A passive optical network (PON) scheme based on optical code division multiplexing (OCDM) for the downstream traffics is proposed and analyzed in detail. In the PON, the downstream traffics are broadcasted by OCDM technology to guarantee the security, while the upstream traffics pass through the same optical fiber by the common time division multiple access (TDMA) technology to decrease the cost.This schemes are denoted as OCDM/TDMA-PON, which can be applied to an optical access network (OAN) with full services on demand, such as Internet protocol, video on demand, tele-presence and high quality audio. The proposed OCDM/TDMA-PON scheme combines advantages of PON, TDMA, and OCDM technology. Simulation results indicate that the designed scheme improves the OAN performance,and enhances flexibility and scalability of the system.

  18. Medium Access Control for Wireless Sensor Networks based on Impulse Radio Ultra Wideband

    CERN Document Server

    Berthe, Abdoulaye; Dragomirescu, Daniela; Plana, Robert

    2010-01-01

    This paper describes a detailed performance evaluation of distributed Medium Access Control (MAC) protocols for Wireless Sensor Networks based on Impulse Radio Ultra Wideband (IR-UWB) Physical layer (PHY). Two main classes of Medium Access Control protocol have been considered: Slotted and UnSlotted with reliability. The reliability is based on Automatic Repeat ReQuest (ARQ). The performance evaluation is performed using a complete Wireless Sensor Networks (WSN) simulator built on the Global Mobile Information System Simulator (GloMoSim). The optimal operating parameters are first discussed for IR-UWB in terms of slot size, retransmission delay and the number of retransmission, then a comparison between IR-UWB and other transmission techniques in terms of reliability latency and power efficiency.

  19. National Cultural Heritage Networks: Access and Context in the Digital Environment

    Directory of Open Access Journals (Sweden)

    Lori McCay-Peet

    2010-11-01

    Full Text Available With advances in digital technology, museums, archives, and libraries have faced challenges in presenting their collections of primary source material online. This paper discusses the potential for national federated search engines to further the goals of local and national cultural institutions and benefit users by creating a single access point to authoritative sources, formats, and subjects. The challenges associated iwth providing context at the item and collection level to make digital items valuable ot the user are also explored. A search for mourning customs on the Picture Australia, Images Canada, and American Memory national cultural heritage networks is used to highlight issues related to access and context throughout the paper. Finally, challenges to greater contextualization due to the diversity of users and the mandates of the networks themselves are examined.

  20. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    and communication networks on the controller performance. We start by investigating the effects of a communication network that introduces delays in the information access for the central controller. The control performance as measured by accumulated fatigue is shown to be significantly impacted by communication....... This information quality metric is called mismatch probability, mmPr, and is used to express quantitatively the information accuracy in a given scenario. Lastly measurements of different communication technologies have been performed in order to carry out the analysis in a practically relevant scenario......In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...

  1. Comparison of a Ring On-Chip Network and a Code-Division Multiple-Access On-Chip Network

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2007-01-01

    Full Text Available Two network-on-chip (NoC designs are examined and compared in this paper. One design applies a bidirectional ring connection scheme, while the other design applies a code-division multiple-access (CDMA connection scheme. Both of the designs apply globally asynchronous locally synchronous (GALS scheme in order to deal with the issue of transferring data in a multiple-clock-domain environment of an on-chip system. The two NoC designs are compared with each other by their network structures, data transfer principles, network node structures, and their asynchronous designs. Both the synchronous and the asynchronous designs of the two on-chip networks are realized using a hardware-description language (HDL in order to make the entire designs suit the commonly used synchronous design tools and flow. The performance estimation and comparison of the two NoC designs which are based on the HDL realizations are addressed. By comparing the two NoC designs, the advantages and disadvantages of applying direct connection and CDMA connection schemes in an on-chip communication network are discussed.

  2. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  3. Energy Efficiency and Capacity Tradeoff in Cloud Radio Access Network of High-Speed Railways

    OpenAIRE

    Shichao Li; Gang Zhu; Siyu Lin; Qian Gao; Lei Xiong; Weiliang Xie; Xiaoyu Qiao

    2017-01-01

    To meet the increasing demand of high-data-rate services of high-speed railway (HSR) passengers, cloud radio access network (C-RAN) is proposed. This paper investigates the tradeoff between energy efficiency (EE) performance and capacity in C-RAN of HSR. Considering that the train location can be predicted, we propose a predictable path loss based time domain power allocation method (PPTPA) to improve EE performance of HSR communication system. First, we consider that the communication system...

  4. Embedded real-time control of optically amplified repeaters in broadband access networks

    Science.gov (United States)

    Stubbe, Brecht; Vaes, Peter; Gouwy, Lieven; Coene, Chris; Qiu, Xing-Zhi; Staelens, Bart; Vandewege, Jan; Slabbinck, B. Hans; Martin, Claire M.; Van de Voorde, Ingrid

    1997-10-01

    This paper presents the use of distributed, intelligent control and management in optically amplified repeaters. These optical repeater units (ORUs) are used in an optical access network. A semiconductor optical amplifier (SOA) has been used in the upstream direction because of the possibility of fast switching. The real time control platform consists of both a hard- and a software part. The software control is handled with the embedded control system FORTRESS developed by IMEC.

  5. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    Science.gov (United States)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  6. Multicore fronthaul and backhaul provision in next-generation optical access networks

    Science.gov (United States)

    Llorente, Roberto; Morant, Maria; Macho, Andrés.

    2016-02-01

    This paper reports the experimental demonstration of a multicore fiber (MCF) system employing space-division multiplexing for the combined transmission of radio-over-fiber full-standard LTE-Advanced and WiMAX signals in a 4-core MCF optical fronthaul on a PON access network. Combining MCF fronthaul and PON access with RoF transmission enables the simultaneous transmission of downstream and upstream services in different cores. In this work, we propose and demonstrate a MCF fronthaul system providing combined fully-standard LTE-A and WiMAX signals using radio-over-fiber (RoF) transmission in a 4-core MCF media. The impact of the inter-core crosstalk in RoF transmissions is also evaluated and we studied the possibility of mitigating the crosstalk impairments with MIMO processing. The experimental performance of the PON access overlay employing optical polarization multiplexing is also reported.

  7. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  8. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks (WPA

  9. Support networks and people with physical disabilities: social inclusion and access to health services

    Directory of Open Access Journals (Sweden)

    Cristina Marques de Almeida Holanda

    2015-01-01

    Full Text Available This study seeks to identify the formation of social support networks of people with physical disabilities, and how these networks can help facilitate access to health services and promote social inclusion. It is a cross-sectional study, with data collected via a form applied to physically disabled persons over eighteen years of age registered with the Family Health Teams of the municipal district of João Pessoa in the state of Paraíba. It was observed that the support networks of these individuals predominantly consist of family members (parents, siblings, children, spouses and people outside the family (friends and neighbors. However, 50% of the interviewees declared that they could not count on any support from outside the family. It was observed that the support network contributes to access to the services and participation in social groups. However, reduced social inclusion was detected, due to locomotion difficulties, this being the main barrier to social interaction. Among those individuals who began to interact in society, the part played by social support was fundamental.

  10. Resource allocation in heterogeneous cloud radio access networks: advances and challenges

    KAUST Repository

    Dahrouj, Hayssam

    2015-06-01

    Base station densification is increasingly used by network operators to provide better throughput and coverage performance to mobile subscribers in dense data traffic areas. Such densification is progressively diffusing the move from traditional macrocell base stations toward heterogeneous networks with diverse cell sizes (e.g., microcell, picocell, femotcell) and diverse radio access technologies (e.g., GSM, CDMA), and LTE). The coexistence of the different network entities brings an additional set of challenges, particularly in terms of the provisioning of high-speed communications and the management of wireless interference. Resource sharing between different entities, largely incompatible in conventional systems due to the lack of interconnections, becomes a necessity. By connecting all the base stations from different tiers to a central processor (referred to as the cloud) through wire/wireline backhaul links, the heterogeneous cloud radio access network, H-CRAN, provides an open, simple, controllable, and flexible paradigm for resource allocation. This article discusses challenges and recent developments in H-CRAN design. It proposes promising resource allocation schemes in H-CRAN: coordinated scheduling, hybrid backhauling, and multicloud association. Simulations results show how the proposed strategies provide appreciable performance improvement compared to methods from recent literature. © 2015 IEEE.

  11. Distributed Robust Power Minimization for the Downlink of Multi-Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2017-02-07

    Conventional cloud radio access networks assume single cloud processing and treat inter-cloud interference as background noise. This paper considers the downlink of a multi-cloud radio access network (CRAN) where each cloud is connected to several base-stations (BS) through limited-capacity wireline backhaul links. The set of BSs connected to each cloud, called cluster, serves a set of pre-known mobile users (MUs). The performance of the system becomes therefore a function of both inter-cloud and intra-cloud interference, as well as the compression schemes of the limited capacity backhaul links. The paper assumes independent compression scheme and imperfect channel state information (CSI) where the CSI errors belong to an ellipsoidal bounded region. The problem of interest becomes the one of minimizing the network total transmit power subject to BS power and quality of service constraints, as well as backhaul capacity and CSI error constraints. The paper suggests solving the problem using the alternating direction method of multipliers (ADMM). One of the highlight of the paper is that the proposed ADMM-based algorithm can be implemented in a distributed fashion across the multi-cloud network by allowing a limited amount of information exchange between the coupled clouds. Simulation results show that the proposed distributed algorithm provides a similar performance to the centralized algorithm in a reasonable number of iterations.

  12. Support networks and people with physical disabilities: social inclusion and access to health services.

    Science.gov (United States)

    Holanda, Cristina Marques de Almeida; De Andrade, Fabienne Louise Juvêncio Paes; Bezerra, Maria Aparecida; Nascimento, João Paulo da Silva; Neves, Robson da Fonseca; Alves, Simone Bezerra; Ribeiro, Kátia Suely Queiroz Silva

    2015-01-01

    This study seeks to identify the formation of social support networks of people with physical disabilities, and how these networks can help facilitate access to health services and promote social inclusion. It is a cross-sectional study, with data collected via a form applied to physically disabled persons over eighteen years of age registered with the Family Health Teams of the municipal district of João Pessoa in the state of Paraíba. It was observed that the support networks of these individuals predominantly consist of family members (parents, siblings, children, spouses) and people outside the family (friends and neighbors). However, 50% of the interviewees declared that they could not count on any support from outside the family. It was observed that the support network contributes to access to the services and participation in social groups. However, reduced social inclusion was detected, due to locomotion difficulties, this being the main barrier to social interaction. Among those individuals who began to interact in society, the part played by social support was fundamental.

  13. Energy efficiency for cloud-radio access networks with imperfect channel state information

    KAUST Repository

    Al-Oquibi, Bayan

    2016-12-24

    The advent of smartphones and tablets over the past several years has resulted in a drastic increase of global carbon footprint, due to the explosive growth of data traffic. Improving energy efficiency (EE) becomes, therefore, a crucial design metric in next generation wireless systems (5G). Cloud radio access network (C-RAN), a promising 5G network architecture, provides an efficient framework for improving the EE performance, by means of coordinating the transmission across the network. This paper considers a C-RAN system formed by several clusters of remote radio heads (RRHs), each serving a predetermined set of mobile users (MUs), and assumes imperfect channel state information (CSI). The network performance becomes therefore a function of the intra-cluster and inter-cluster interference, as well as the channel estimation error. The paper optimizes the transmit power of each RRH in order to maximize the network global EE subject to MU service rate requirements and RRHs maximum power constraints. The paper proposes solving the optimization problem using a heuristic algorithm based on techniques from optimization theory via a two-stage iterative solution. Simulation results show that the proposed power allocation algorithm provides an appreciable performance improvement as compared to the conventional systems with maximum power transmission strategy. They further highlight the convergence of the proposed algorithm for different networks scenarios.

  14. The Effects of a Dynamic Spectrum Access Overlay in LTE-Advanced Networks

    Energy Technology Data Exchange (ETDEWEB)

    Juan D. Deaton; Ryan E. lrwin; Luiz A. DaSilva

    2011-05-01

    As early as 2014, wireless network operators spectral capacity will be overwhelmed by a data tsunami brought on by new devices and applications. To augment spectral capacity, operators could deploy a Dynamic Spectrum Access (DSA) overlay. In the light of the many planned Long Term Evolution (LTE) network deployments, the affects of a DSA overlay have not been fully considered into the existing LTE standards. Coalescing many different aspects of DSA, this paper develops the Spectrum Accountability (SA) framework. The SA framework defines specific network element functionality, protocol interfaces, and signaling flow diagrams for LTE to support service requests and enforce rights of responsibilities of primary and secondary users, respectively. We also include a network simulation to quantify the benefits of using DSA channels to augment capacity. Based on our simulation we show that, network operators can benefit up to %40 increase in operating capacity when sharing DSA bands to augment spectral capacity. With our framework, this paper could serve as an guide in developing future LTE network standards that include DSA.

  15. Statistics of the uplink co-tier interference in closed access heterogeneous networks

    KAUST Repository

    Tabassum, Hina

    2013-09-01

    In this paper, we derive a statistical model of the co-tier interference in closed access two tier heterogeneous wireless cellular networks with femtocell deployments. The derived model captures the impact of bounded path loss model, wall penetration loss, user distributions, random locations, and density of the femtocells. Firstly, we derive the analytical expressions for the probability density function (PDF) and moment generating function (MGF) of the co-tier interference considering a single femtocell interferer by exploiting the random disc line picking theory from geometric probability. We then derive the MGF of the cumulative interference from all femtocell interferers considering full spectral reuse in each femtocell. Orthogonal spectrum partitioning is assumed between the macrocell and femtocell networks to avoid any cross-tier interference. Finally, the accuracy of the derived expressions is validated through Monte-Carlo simulations and the expressions are shown to be useful in quantifying important network performance metrics such as ergodic capacity. © 2013 IEEE.

  16. A novel distributed algorithm for media access control address assignment in wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    TIAN Ye; SHENG Min; LI Jiandong

    2007-01-01

    This Paper presents a novel distributed media access control(MAC)address assignment algorithm,namely virtual grid spatial reusing(VGSR),for wireless sensor networks,which reduces the size of the MAC address efficiently on the basis of both the spatial reuse of MAC address and the mapping of geographical position.By adjusting the communication range of sensor nodes,VGSR algorithm can minimize the size of MAC address and meanwhile guarantee the connectivity of the sensor network.Theoretical analysis and experimental results show that VGSR algorithm is not only of low energy cost,but also scales well with the network ize,with its performance superior to that of other existing algorithms.

  17. Through the looking glass: self-reassuring meta-cognitive capacityand its relationship with the thematic content of voicesand nature of the voice/voice-hearer relationship

    Directory of Open Access Journals (Sweden)

    Charlotte eConnor

    2013-05-01

    Full Text Available AbstractAimsTo examine the self-critical thoughts and self-reassuring meta-cognitive capacity of those who hear voices and explore whether they are associated with the theme of voice content and appraisals of voice power and voice expressed emotion. MethodA cross-sectional design was used, combining semi-structured interviews and self-report measures. Data on symptomatology, self-critical thoughts and self-reassuring meta-cognitive capacity, thematic voice content and appraisals of voice power and expressed emotion were collected from 74 voice-hearers in Birmingham, UK. Results Common themes of voice content reflected issues of shame, control and affiliation. Controlling content was the most prevalent theme, however, no significant predictor of this theme was found; shaming thematic voice content linked with reduced capacity to self-reassure following self-critical thoughts. Voice-hearers with the greatest level of self-critical thoughts appraised their voices as powerful and high in voice expressed emotion ConclusionsFindings suggest that voice-hearers self-critical thoughts are reflected in the type of relationship they have with their voice. However, access to self-reassuring meta-cognitive capacity may serve as a protective factor for those who hear voices, resulting in more benign voice content. These findings highlight the importance of this specific meta-cognitive capacity and will inform future therapeutic interventions for the management of voices in this vulnerable group.

  18. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    Science.gov (United States)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  19. Basset: learning the regulatory code of the accessible genome with deep convolutional neural networks

    Science.gov (United States)

    Kelley, David R.; Snoek, Jasper; Rinn, John L.

    2016-01-01

    The complex language of eukaryotic gene expression remains incompletely understood. Despite the importance suggested by many noncoding variants statistically associated with human disease, nearly all such variants have unknown mechanisms. Here, we address this challenge using an approach based on a recent machine learning advance—deep convolutional neural networks (CNNs). We introduce the open source package Basset to apply CNNs to learn the functional activity of DNA sequences from genomics data. We trained Basset on a compendium of accessible genomic sites mapped in 164 cell types by DNase-seq, and demonstrate greater predictive accuracy than previous methods. Basset predictions for the change in accessibility between variant alleles were far greater for Genome-wide association study (GWAS) SNPs that are likely to be causal relative to nearby SNPs in linkage disequilibrium with them. With Basset, a researcher can perform a single sequencing assay in their cell type of interest and simultaneously learn that cell's chromatin accessibility code and annotate every mutation in the genome with its influence on present accessibility and latent potential for accessibility. Thus, Basset offers a powerful computational approach to annotate and interpret the noncoding genome. PMID:27197224

  20. Basset: learning the regulatory code of the accessible genome with deep convolutional neural networks.

    Science.gov (United States)

    Kelley, David R; Snoek, Jasper; Rinn, John L

    2016-07-01

    The complex language of eukaryotic gene expression remains incompletely understood. Despite the importance suggested by many noncoding variants statistically associated with human disease, nearly all such variants have unknown mechanisms. Here, we address this challenge using an approach based on a recent machine learning advance-deep convolutional neural networks (CNNs). We introduce the open source package Basset to apply CNNs to learn the functional activity of DNA sequences from genomics data. We trained Basset on a compendium of accessible genomic sites mapped in 164 cell types by DNase-seq, and demonstrate greater predictive accuracy than previous methods. Basset predictions for the change in accessibility between variant alleles were far greater for Genome-wide association study (GWAS) SNPs that are likely to be causal relative to nearby SNPs in linkage disequilibrium with them. With Basset, a researcher can perform a single sequencing assay in their cell type of interest and simultaneously learn that cell's chromatin accessibility code and annotate every mutation in the genome with its influence on present accessibility and latent potential for accessibility. Thus, Basset offers a powerful computational approach to annotate and interpret the noncoding genome.

  1. Optimizing Channel Access for Event-Driven Wireless Sensor Networks: Analysis and Enhancements

    CERN Document Server

    Shakya, Rajeev K; Verma, Nishchal K

    2012-01-01

    We study the problem of medium access control in domain of event-driven wireless sensor networks (WSN). In this kind of WSN, sensor nodes send data to sink node only when an event occurs in the monitoring area. The nodes in this kind of WSN encounter correlated traffic as a subset of nodes start sending data by sensing a common event simultaneously. We wish to rethink of medium access control (MAC) for this type of traffic characteristics. For WSN, many existing MAC protocols utilize the basic CSMA strategies like 802.11 that uses Binary Exponential Backoff (BEB) algorithm to handle the collisions among packets when more than one node want to access the channel. We show that this BEB algorithm does not work well without incurring access delay or performance degradation due to increased number of collisions and retransmissions when nodes encounter correlated traffic. In this paper, we investigate on how to minimize the access delay and improve throughput by setting contention window (CW) size adaptively accord...

  2. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  3. Advanced digital signal processing for short-haul and access network

    Science.gov (United States)

    Zhang, Junwen; Yu, Jianjun; Chi, Nan

    2016-02-01

    Digital signal processing (DSP) has been proved to be a successful technology recently in high speed and high spectrum-efficiency optical short-haul and access network, which enables high performances based on digital equalizations and compensations. In this paper, we investigate advanced DSP at the transmitter and receiver side for signal pre-equalization and post-equalization in an optical access network. A novel DSP-based digital and optical pre-equalization scheme has been proposed for bandwidth-limited high speed short-distance communication system, which is based on the feedback of receiver-side adaptive equalizers, such as least-mean-squares (LMS) algorithm and constant or multi-modulus algorithms (CMA, MMA). Based on this scheme, we experimentally demonstrate 400GE on a single optical carrier based on the highest ETDM 120-GBaud PDM-PAM-4 signal, using one external modulator and coherent detection. A line rate of 480-Gb/s is achieved, which enables 20% forward-error correction (FEC) overhead to keep the 400-Gb/s net information rate. The performance after fiber transmission shows large margin for both short range and metro/regional networks. We also extend the advanced DSP for short haul optical access networks by using high order QAMs. We propose and demonstrate a high speed multi-band CAP-WDM-PON system on intensity modulation, direct detection and digital equalizations. A hybrid modified cascaded MMA post-equalization schemes are used to equalize the multi-band CAP-mQAM signals. Using this scheme, we successfully demonstrates 550Gb/s high capacity WDMPON system with 11 WDM channels, 55 sub-bands, and 10-Gb/s per user in the downstream over 40-km SMF.

  4. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    National Research Council Canada - National Science Library

    Kevin McCluskey; Katharine B. Barker; Hazel A. Barton; Kyria Boundy-Mills; Daniel R. Brown; Jonathan A. Coddington; Kevin Cook; Philippe Desmeth; David Geiser; Jessie A. Glaeser; Stephanie Greene; Seogchan Kang; Michael W. Lomas; Ulrich Melcher; Scott E. Miller; David R. Nobles; Kristina J. Owens; Jerome H. Reichman; Manuela da Silva; John Wertz; Cale Whitworth; David Smith; Steven E. Lindow

    2017-01-01

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources...

  5. Stochastic geometry model for multi-channel fog radio access networks

    KAUST Repository

    Emara, Mostafa

    2017-06-29

    Cache-enabled base station (BS) densification, denoted as a fog radio access network (F-RAN), is foreseen as a key component of 5G cellular networks. F-RAN enables storing popular files at the network edge (i.e., BS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. The hitting probability, which is the probability of successfully transmitting popular files request from the network edge, is a fundamental key performance indicator (KPI) for F-RAN. This paper develops a scheduling aware mathematical framework, based on stochastic geometry, to characterize the hitting probability of F-RAN in a multi-channel environment. To this end, we assess and compare the performance of two caching distribution schemes, namely, uniform caching and Zipf caching. The numerical results show that the commonly used single channel environment leads to pessimistic assessment for the hitting probability of F-RAN. Furthermore, the numerical results manifest the superiority of the Zipf caching scheme and quantify the hitting probability gains in terms of the number of channels and cache size.

  6. Medium Access Control Protocols for Wireless Sensor Networks with Energy Harvesting

    CERN Document Server

    Iannello, Fabio; Spagnolini, Umberto

    2011-01-01

    The design of Medium Access Control (MAC) protocols for wireless sensor networks (WSNs) has been conventionally tackled by assuming battery-powered devices and by adopting the network lifetime as the main performance criterion. While WSNs operated by energy-harvesting (EH) devices are not limited by network lifetime, they pose new design challenges due to the uncertain amount of harvestable energy. Novel design criteria are thus required to capture the trade-offs between the potentially infinite network lifetime and the uncertain energy availability. This paper addresses the analysis and design of WSNs with EH devices by focusing on conventional MAC protocols, namely TDMA, Framed-ALOHA (FA) and Dynamic-FA (DFA), and by accounting for the performance trade-offs and design issues arising due to EH. A novel metric, referred to as delivery probability, is introduced to measure the capability of a MAC protocol to deliver the measure of any sensor in the network to the intended destination (or fusion center, FC). T...

  7. A low power medium access control protocol for wireless medical sensor networks.

    Science.gov (United States)

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  8. Decentralized Group Sparse Beamforming for Multi-Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-12-06

    Recent studies on cloud-radio access networks (CRANs) assume the availability of a single processor (cloud) capable of managing the entire network performance; inter-cloud interference is treated as background noise. This paper considers the more practical scenario of the downlink of a CRAN formed by multiple clouds, where each cloud is connected to a cluster of multiple-antenna base stations (BSs) via high-capacity wireline backhaul links. The network is composed of several disjoint BSs\\' clusters, each serving a pre-known set of single-antenna users. To account for both inter- cloud and intra-cloud interference, the paper considers the problem of minimizing the total network power consumption subject to quality of service constraints, by jointly determining the set of active BSs connected to each cloud and the beamforming vectors of every user across the network. The paper solves the problem using Lagrangian duality theory through a dual decomposition approach, which decouples the problem into multiple and independent subproblems, the solution of which depends on the dual optimization problem. The solution then proceeds in updating the dual variables and the active set of BSs at each cloud iteratively. The proposed approach leads to a distributed implementation across the multiple clouds through a reasonable exchange of information between adjacent clouds. The paper further proposes a centralized solution to the problem. Simulation results suggest that the proposed algorithms significantly outperform the conventional per-cloud update solution, especially at high signal-to-interference-plus- noise ratio (SINR) target.

  9. Access-Network Association Policies for Media Streaming in Heterogeneous Environments

    CERN Document Server

    ParandehGheibi, Ali; Ozdaglar, Asuman; Shakkottai, Srinivas

    2010-01-01

    We study the design of media streaming applications in the presence of multiple heterogeneous wireless access methods with different throughputs and costs. Our objective is to analytically characterize the trade-off between the usage cost and the Quality of user Experience (QoE), which is represented by the probability of interruption in media playback and the initial waiting time. We model each access network as a server that provides packets to the user according to a Poisson process with a certain rate and cost. Blocks are coded using random linear codes to alleviate the duplicate packet reception problem. Users must take decisions on how many packets to buffer before playout, and which networks to access during playout. We design, analyze and compare several control policies with a threshold structure. We formulate the problem of finding the optimal control policy as an MDP with a probabilistic constraint. We present the HJB equation for this problem by expanding the state space, and exploit it as a verif...

  10. Wide area network access to CMS data using the Lustre{sup TM} filesystem

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J L; Brody, T [Department of Physics, Florida International University, Miami, FL 33199 (United States); Avery, P; Bourilkov, D; Fu, Y; Kim, B; Wu, Y [Department of Physics, Florida University of Florida, Gainesville, FL 32611 (United States); Prescott, C [High Performance Computing Center University of Florida, Gainesville, FL 32611 (United States)

    2010-04-01

    In this paper, we explore the use of the Lustre{sup TM} cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre{sup TM} filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  11. Wide area network access to CMS data using the LustreTM filesystem

    Science.gov (United States)

    Rodriguez, J. L.; Avery, P.; Brody, T.; Bourilkov, D.; Fu, Y.; Kim, B.; Prescott, C.; Wu, Y.

    2010-04-01

    In this paper, we explore the use of the LustreTM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed LustreTM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  12. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  13. QoS Modeling for End-to-End Performance Evaluation over Networks with Wireless Access

    Directory of Open Access Journals (Sweden)

    Gerardo Gómez

    2010-01-01

    Full Text Available This paper presents an end-to-end Quality of Service (QoS model for assessing the performance of data services over networks with wireless access. The proposed model deals with performance degradation across protocol layers using a bottom-up strategy, starting with the physical layer and moving on up to the application layer. This approach makes it possible to analytically assess performance at different layers, thereby facilitating a possible end-to-end optimization process. As a representative case, a scenario where a set of mobile terminals connected to a streaming server through an IP access node has been studied. UDP, TCP, and the new TCP-Friendly Rate Control (TFRC protocols were analyzed at the transport layer. The radio interface consisted of a variable-rate multiuser and multichannel subsystem, including retransmissions and adaptive modulation and coding. The proposed analytical QoS model was validated on a real-time emulator of an end-to-end network with wireless access and proved to be very useful for the purposes of service performance estimation and optimization.

  14. Enabling Broadband as Commodity within Access Networks: A QoS Recipe

    Science.gov (United States)

    Areizaga, Enrique; Foglar, Andreas; Elizondo, Antonio J.; Geilhardt, Frank

    This paper describes the QoS features that will transform the access networks landscape in order to bring “Broadband” as a commodity while setting up the pillars of the “Future Media Internet”. Quality of Experience is obviously key for emerging and future services. Broadcasting services will first need to equal the QoE of their counterparts in the Open-air market (for IP-TV examples would be artifact-free, no picture freezing, fast zapping times) and offer new features often using interactivity (Time-shifted TV, access to more content, 3DTV with feeling of presence). The huge variety of communications alternatives will lead to different requirements per customer, whose needs will also be dependent on parameters like where the connection is made, the time of the day/day of the week/period of the year or even his/her mood. Today’s networks, designed for providing just Broadband connectivity, will not be enough to satisfy customer’s needs and will necessarily support the introduction of new and innovative services. The Networks of the future should learn from the way the users are communicating, what services they are using, where, when, and how, and adapt accordingly.

  15. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha

    2015-05-26

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user equipments (UEs) can be served, and each of which is allocated single downlink channel at a time. On the other hand, the macrocell base station can unconditionally serve macrocell UEs that exist inside its coverage space. The available channels can be shared simultaneously in the macrocell network and the femtocell network. Moreover, a channel can be reused only at the macrocell base station. The analysis provides quantitative approaches to model UEs identities, their likelihoods of being active, and their likelihoods of producing interference, considering UEs classifications, locations, and access capabilities. Moreover, it develops models for various interference sources observed from effective interference femtocells, considering femtocells capacities and operation conditions. The associated formulations to describe a desired UE performance and the impact of the number of available channels as well as the adopted channel assignment approach are thoroughly investigated. The results are generally presented for any channel models of interference sources as well as the desired source of the served UE. Moreover, specific channel models are then adopted, for which generalized closedform analytical results for the desired UE outage probability performance are obtained. Numerical and simulation results are presented to further clarify the main outcomes of the developed analysis.

  16. Hybrid Access Femtocells in Overlaid MIMO Cellular Networks with Transmit Selection under Poisson Field Interference

    KAUST Repository

    Abdel Nabi, Amr A

    2017-09-21

    This paper analyzes the performance of hybrid control-access schemes for small cells (such as femtocells) in the context of two-tier overlaid cellular networks. The proposed hybrid access schemes allow for sharing the same downlink resources between the small-cell network and the original macrocell network, and their mode of operations are characterized considering post-processed signal-to-interference-plus-noise ratios (SINRs) or pre-processed interference-aware operation. The work presents a detailed treatment of achieved performance of a desired user that benefits from MIMO arrays configuration through the use of transmit antenna selection (TAS) and maximal ratio combining (MRC) in the presence of Poisson field interference processes on spatial links. Furthermore, based on the interference awareness at the desired user, two TAS approaches are treated, which are the signal-to-noise (SNR)-based selection and SINR-based selection. The analysis is generalized to address the cases of highly-correlated and un-correlated aggregated interference on different transmit channels. In addition, the effect of delayed TAS due to imperfect feedback and the impact of arbitrary TAS processing are investigated. The analytical results are validated by simulations, to clarify some of the main outcomes herein.

  17. 基于高速公路网的无线语音系统的设计%Design of wireless voice system for highway network

    Institute of Scientific and Technical Information of China (English)

    康维新; 缪晶

    2014-01-01

    为了便于对公路的维护与保养,需要一款具有通信功能的移动设备,提出了基于高速公路网的对讲终端的解决方案,在服务端采用嵌入式LINUX平台,利用ALSA数字音频接口,结合麦克风采集原始PCM音频数据,采用G726标准进行音频编解码,采用RTP/RTCP协议,基于wifi实现音频的网络传输。在用户端用支持LINUX系统的PC对音频数据进行编解码,播放。该方案的终端基于高速公路现有网络,具有移动性,经济性,且语音清晰,实时性好。%In order to maintain and repair the road, a kind of mobile devices with communi-cation function is necessary.The solution which is based on the highway network intercom terminal was proposed.Used the embedded LINUX platform on the service side, ALSA digit-al audio interface, standard G726 to realize audio codec and used RTP /RTCP protocol based on wifi to realize network transmission of audio.In the client-to-use, the PC which can support LINUX system was used to code and decode the audio and play it.The terminal of the solution was based on the existing highway network and it has the advantages of mobili-ty, economy, clear voice and real time.

  18. Root Cause Analysis and New Practical Schemes for better Accessing and Establishing of Dedicated Control Channel in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Rasoul Tanhatalab

    2013-12-01

    Full Text Available The Dedicated Control Channel (DCCH plays an important role in all generations of cellular networks, such as, GSM , HSPA and LTE ; through this logical channel, some information between user equipment and network can be carried. It should be considered that accessing to the DCCH is the entry gate of entrance to the every cellular network; and without a successful DCCH access call-setup process will not be possible. Hence, DCCH channel accessing is one of the most critical issues that RF planner and optimization engineers must consider. More than this, these schemes can contribute to achieve some algorithms in SON for ameliorating the DCCH accessing and serving better services at 4G. In this paper, a real fundamentally established cellular network (GSM is surveyed and its radio frequency network performance is evaluated and presented on the basis of KPI parameters in general. Furthermore, the DCCH Access Success in particular and different issues, findings, trials and improvements have been summarized. Also, recommendations have been listed to correlate the practical aspects of RF optimization, which affect the improvement of DCCH Access Success rate in cellular networks.

  19. Measuring the Gap Between Car and Transit Accessibility : Estimating Access Using a High-Resolution Transit Network Geographic Information System

    NARCIS (Netherlands)

    Benenson, I.; Martens, C.J.C.M.; Rofé, Y.

    2010-01-01

    Accessibility is increasingly identified in the academic literature and in planning practice as a key criterion to assess transport policies and urban land use development. This paper contributes in two respects to the growing body of literature on accessibility and accessibility measurement. First,

  20. Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

    CERN Document Server

    Shukla, Piyush Kumar; Bhadoria, Dr Sarita Singh

    2009-01-01

    The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering this fact, performance of MAC protocol can be enhanced. The purpose of this work is to modify the existing protocol by enabling it to adapt according to state of the network. The modified protocol takes appropriate action whenever unutilized periods detected. In this way, to increase the effective bandwidth utilization and determine how it behaves under increasing load, and varying packet sizes. It will also include effects of attacks i.e. Denial of service attacks, Replay Attack, Continuous Channel Access or Exhaustion attack, Flooding attack, Jamming (Radio interference) attack, Selective forwarding attack which degrade...

  1. Secure wide area network access to CMS analysis data using the Lustre filesystem

    Science.gov (United States)

    Bourilkov, D.; Avery, P.; Cheng, M.; Fu, Y.; Kim, B.; Palencia, J.; Budden, R.; Benninger, K.; Rodriquez, J. L.; Dilascio, J.; Dykstra, D.; Seenu, N.

    2012-12-01

    This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.

  2. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    techniques with both coherent and incoherent optical sources are studied and demonstrated. Employments of advanced modulation formats including phase-shift keying (PSK), M-quadrature amplitude modulation (QAM) and orthogonal frequency-division multiplexing (OFDM) for high speed photonic-wireless transmission......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...... techniques. In conclusion, the results presented in the thesis show the feasibility of employing mm-wave signals, advanced modulation formats and spatial multiplexing technologies in next generation high capacity hybrid optical fiber-wireless access systems....

  3. A distributed Synchronous reservation multiple access control protocol for mobile Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yanling; SUN Xianpu; LI Jiandong

    2007-01-01

    This study proposes a new multiple access control protocol named distributed synchronous reservation multiple access control protocol.in which the hidden and exposed terminal problems are solved,and the quality of service(QoS)requirements for real-time traffic are guaranteed.The protocol is founded on time division multiplex address and a different type of traffic is assigned to difierent priority,according to which a node should compete for and reserve the free slots in a different method.Moreover,there is a reservation acknowledgement process before data transmit in each reserved slot,so that the intruded terminal problem is solved.The throughput and average packets drop probability of this protocol are analyzed and simulated in a fully connected network.the results of which indicate that this protocol is efficient enough to support the real-time traffic.and it is more suitable to MANETs.

  4. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  5. Studying on equilibriums between price and QoS in multi-provider overlay access networks

    Institute of Scientific and Technical Information of China (English)

    Wang Yufeng; Wang Wendong

    2006-01-01

    From the viewpoint of game theory, this paper proposes a model that combines QoS index with price factor in overlay access networks, and uses the multinomial logit (MNL) to model the choice behaviour of users. Each service class is considered an independent and competitive entity offered by each provider,which aims at maximizing its own utility. Based on noncooperative game, we prove the existence and uniqueness of equilibriums between QoS levels and prices among various service classes, and demonstrate the properties of equilibriums. Finally, these results are verified via numerical analysis.

  6. Sub-THz photonic frequency conversion using optoelectronic transistors for future fully coherent access network systems

    Science.gov (United States)

    Otsuji, Taiichi; Sugawara, Kenta; Tamamushi, Gen; Dobroiu, Adrian; Suemitsu, Tetsuya; Ryzhii, Victor; Iwatsuki, Katsumi; Kuwano, Shigeru; Kani, Jun-ichi; Terada, Jun

    2016-02-01

    This paper reviews advances in sub-THz photonic frequency conversion using optoelectronic transistors for future fully coherent access network systems. Graphene-channel field effect transistors (G-FETs) and InP-based high electron mobility transistors (inP-HEMT) are experimentally examined as photonic frequency converters. Optoelectronic properties and three-terminal functionalities of the G-FETs and InP-HEMTs are exploited to perform single-chip photonic double-mixing operation over the 120 GHz wireless communication band. A single transistor can photomix the optical subcarriers to generate LO and mix down the RF data on the sub-THz carrier to the IF band.

  7. Towards convergence of wireless and wireline signal transport in broadband access networks

    DEFF Research Database (Denmark)

    Yu, Xianbin; Prince, Kamau; Tafur Monroy, Idelfonso

    2010-01-01

    Hybrid optical wireless access networks are to play an important role in the realization of the vision of delivery of broadband services to the end-user any time, anywhere and at affordable costs. We present results of experiments conducted over a field deployed optical fibre links we successfull...... demonstrated converged wireless and wireline signal transport over a common fibre infrastructure. The type of signal used in this field deployed experiments cover WiMax, Impulse-radio ultra-wideband (UWB) and coherent transmission of baseband QPSK and radio-over-fibre signals....

  8. TELEMEDICINE NETWORK BASED ON CODE-DIVISION MULTIPLE ACCESS WIRELESS TECHNOLOGY

    Institute of Scientific and Technical Information of China (English)

    同鸣; 卞正中; 张亮

    2003-01-01

    Objective To satisfy the need of reliable and efficient telemedicine in many mobile and ambulance situations. Methods A practical telemedicine system bases on code-division multiple access (CDMA) wireless communication technology has been developed, which has never been mentioned before. The design scheme for the proposed system is described and detailed analysis of the network protocol stacks and the data flow is presented. Results Experiments on real time transmission of medical images using developed system have demonstrated that the system performance is satisfactory and acceptable. Conclusion The telemedicine system based on CDMA is easy to implement and has high quality of transmitted images. It would be a prospective solution to mobile telemedicine.

  9. Seamless generation and provisioning of broadcasting and independent services in WDMPON access networks.

    Science.gov (United States)

    Tang, Ming; Fu, Songnian; Shum, Perry Ping

    2009-06-08

    A novel broadcasting scheme for WDM-PON based fiber access networks is proposed in this paper and downstream system experiments has been demonstrated. The broadcasting data is generated via subcarrier modulation technique. By using a delayed interferometer, the un-modulated continuous-wave carrier is separated and acts as the seeder for FP-LD injection locking and direct modulation, which is compatible with current WDM-PON infrastructures. In experiments, 2.5 Gb/s broadcasting data and 2.5 Gb/s point-to-point data are successfully integrated and transmitted in a typical WDM-PON structure with good performance.

  10. Digital Signal Processing for a Sliceable Transceiver for Optical Access Networks

    DEFF Research Database (Denmark)

    Saldaña Cercos, Silvia; Wagner, Christoph; Vegas Olmos, Juan José;

    2015-01-01

    Methods to upgrade the network infrastructure to cope with current traffic demands has attracted increasing research efforts. A promising alternative is signal slicing. Signal slicing aims at re-using low bandwidth equipment to satisfy high bandwidth traffic demands. This technique has been used......, a comprehensive DSP power consumption analysis for both WDM and TDM systems at 1 Gbps and 10 Gbps, discussing latency penalties for each approach. For 1 Gbps WDM system 278 pJ per information bit for 4 slices is reported at 105 ns latency penalties, whereas 3898.4 pJ per information bit at 183.5 µs latency...... penalty is reported for 10 Gbps. Power savings of the order of hundreds of Watts can be obtained when using signal slicing as an alternative to 10 Gbps implemented access networks....

  11. Modified Distributed Medium Access Control Algorithm Based on Multi-Packets Reception in Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    ZHENG Qing; YANG Zhen

    2005-01-01

    Based on the Multi-Packet Reception(MPR)capability at the physical layer and the Distributed Coordination Function(DCF)of the IEEE 802.11 MAC protocol,we propose a modified new solution about WAITING mechanism to make full use of the MPR capability in this paper,which is named as modified distributed medium access control algorithm.We describe the details of each step of the algorithm after introducing the WAITING mechanism.Then,we also analyze how the waiting-time affects the throughput performance of the network.The network simulator NS-2 is used to evaluate the throughput performance of the new WAITING algorithm and we compare it with IEEE 802.11 MAC protocol and the old WAITING algorithm.The experimental results show that our new algorithm has the best performance.

  12. Interoperable Medical Instrument Networking and Access System with Security Considerations for Critical Care

    Directory of Open Access Journals (Sweden)

    Deniz Gurkan

    2010-01-01

    Full Text Available The recent influx of electronic medical records in the health care field, coupled with the need of providing continuous care to patients in the critical care environment, has driven the need for interoperability of medical devices. Open standards are needed to support flexible processes and interoperability of medical devices, especially in intensive care units. In this paper, we present an interoperable networking and access architecture based on the CAN protocol. Predictability of the delay of medical data reports is a desirable attribute that can be realized using a tightly-coupled system architecture. Our simulations on network architecture demonstrate that a bounded delay for event reports offers predictability. In addition, we address security issues related to the storage of electronic medical records. We present a set of open source tools and tests to identify the security breaches, and appropriate measures that can be implemented to be compliant with the HIPAA rules.

  13. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kilhung Lee

    2010-03-01

    Full Text Available This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme.

  14. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    Science.gov (United States)

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme. PMID:22319270

  15. A time tree medium access control for energy efficiency and collision avoidance in wireless sensor networks.

    Science.gov (United States)

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme.

  16. Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks

    CERN Document Server

    Han, Zhu; Poor, Vincent H

    2009-01-01

    In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. In this paper, an efficient bidding learning algorithm is proposed based on the outcome of past transactions. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good balance between efficiency and fairness.

  17. Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks

    Directory of Open Access Journals (Sweden)

    Sumit J. Darak

    2016-09-01

    Full Text Available Poor utilization of an electromagnetic spectrum and ever increasing demand for spectrum have led to surge of interests in opportunistic spectrum access (OSA based paradigms like cognitive radio and unlicensed LTE. In OSA for decentralized networks, frequency band selection from wideband spectrum is a challenging task since secondary users (SUs do not share any information with each other. In this paper, a new decision making policy (DMP has been proposed for OSA in the multi-user decentralized networks. First contribution is an accurate characterization of frequency bands using Bayes-UCB algorithm. Then, a novel SU orthogonization scheme using Bayes-UCB algorithm is proposed replacing randomization based scheme. At the end, USRP testbed has been developed for analyzing the performance of DMPs using real radio signals. Experimental results show that the proposed DMP offers significant improvement in spectrum utilization, fewer subband switching and collisions compared to other DMPs.

  18. Filter Bank Multicarrier (FBMC) for long-reach intensity modulated optical access networks

    Science.gov (United States)

    Saljoghei, Arsalan; Gutiérrez, Fernando A.; Perry, Philip; Barry, Liam P.

    2017-04-01

    Filter Bank Multi Carrier (FBMC) is a modulation scheme which has recently attracted significant interest in both wireless and optical communications. The interest in optical communications arises due to FBMC's capability to operate without a Cyclic Prefix (CP) and its high resilience to synchronisation errors. However, the operation of FBMC in optical access networks has not been extensively studied either in downstream or upstream. In this work we use experimental work to investigate the operation of FBMC in intensity modulated Passive Optical Networks (PONs) employing direct detection in conjunction with both direct and external modulation schemes. The data rates and propagation lengths employed here vary from 8.4 to 14.8 Gb/s and 0-75 km. The results suggest that by using FBMC it is possible to accomplish CP-Less transmission up to 75 km of SSMF in passive links using cost effective intensity modulation and detection schemes.

  19. Spectrally efficient next-generation optical access network incorporating a novel CWDM uplink combiner.

    Science.gov (United States)

    Ha, J Y; Wonfor, A; Ghiggino, P; Penty, R V; White, I H

    2009-01-19

    A novel wavelength division multiplexed subcarrier multiplexed (WDM/SCM) broadband (1-Gb/s per user) optical access network (OAN) architecture incorporating a coarse WDM (CWDM) uplink combiner is proposed. The concept is demonstrated through theoretical and experimental validation of a 10 x1-Gb/s quadurature-phase-shift keying (QPSK) SCM optical network. Low penalty transmission is demonstrated for a proof-of-principle dual channel system with a range of 25 km. In agreement with simulation, experiments show that channel spacings of only 1 GHz are viable for Q factors of more than 18 dB. Simulations indicate that the system will operate with 40 wavelengths, each carrying 10 SCM channels at 1 Gb/s.

  20. Reducing the power consumption in LTE-Advanced wireless access networks by a capacity based deployment tool

    Science.gov (United States)

    Deruyck, Margot; Joseph, Wout; Tanghe, Emmeric; Martens, Luc

    2014-09-01

    As both the bit rate required by applications on mobile devices and the number of those mobile devices are steadily growing, wireless access networks need to be expanded. As wireless networks also consume a lot of energy, it is important to develop energy-efficient wireless access networks in the near future. In this study, a capacity-based deployment tool for the design of energy-efficient wireless access networks is proposed. Capacity-based means that the network responds to the instantaneous bit rate requirements of the users active in the selected area. To the best of our knowledge, such a deployment tool for energy-efficient wireless access networks has never been presented before. This deployment tool is applied to a realistic case in Ghent, Belgium, to investigate three main functionalities incorporated in LTE-Advanced: carrier aggregation, heterogeneous deployments, and Multiple-Input Multiple-Output (MIMO). The results show that it is recommended to introduce femtocell base stations, supporting both MIMO and carrier aggregation, into the network (heterogeneous deployment) to reduce the network's power consumption. For the selected area and the assumptions made, this results in a power consumption reduction up to 70%. Introducing femtocell base stations without MIMO and carrier aggregation can already result in a significant power consumption reduction of 38%.

  1. Speaking and Nonspeaking Voice Professionals: Who Has the Better Voice?

    Science.gov (United States)

    Chitguppi, Chandala; Raj, Anoop; Meher, Ravi; Rathore, P K

    2017-04-18

    Voice professionals can be classified into two major subgroups: the primarily speaking and the primarily nonspeaking voice professionals. Nonspeaking voice professionals mainly include singers, whereas speaking voice professionals include the rest of the voice professionals. Although both of these groups have high vocal demands, it is currently unknown whether both groups show similar voice changes after their daily voice use. Comparison of these two subgroups of voice professionals has never been done before. This study aimed to compare the speaking voice of speaking and nonspeaking voice professionals with no obvious vocal fold pathology or voice-related complaints on the day of assessment. After obtaining relevant voice-related history, voice analysis and videostroboscopy were performed in 50 speaking and 50 nonspeaking voice professionals. Speaking voice professionals showed significantly higher incidence of voice-related complaints as compared with nonspeaking voice professionals. Voice analysis revealed that most acoustic parameters including fundamental frequency, jitter percent, and harmonic-to-noise ratio were significantly higher in speaking voice professionals, whereas videostroboscopy did not show any significant difference between the two groups. This is the first study of its kind to analyze the effect of daily voice use in the two subgroups of voice professionals with no obvious vocal fold pathology. We conclude that voice professionals should not be considered as a homogeneous group. The detrimental effects of excessive voice use were observed to occur more significantly in speaking voice professionals than in nonspeaking voice professionals. Copyright © 2017 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  2. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  3. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  4. Coordinated scheduling for the downlink of cloud radio-access networks

    KAUST Repository

    Douik, Ahmed S.

    2015-09-11

    This paper addresses the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit frames across the connected base-stations (BS). The transmitted frame of every BS consists of several time/frequency blocks, called power-zones (PZ), maintained at fixed transmit power. The paper considers the problem of scheduling users to PZs and BSs in a coordinated fashion across the network, by maximizing a network-wide utility under the practical constraint that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the scheduling graph in which each vertex represents an association of users, PZs and BSs. The problem is formulated as a maximum weight clique, in which the weight of each vertex is the benefit of the association represented by that vertex. The paper further presents heuristic algorithms with low computational complexity. Simulation results show the performance of the proposed algorithms and suggest that the heuristics perform near optimal in low shadowing environments. © 2015 IEEE.

  5. Performance Evaluation of Peer-to-Peer Progressive Download in Broadband Access Networks

    Science.gov (United States)

    Shibuya, Megumi; Ogishi, Tomohiko; Yamamoto, Shu

    P2P (Peer-to-Peer) file sharing architectures have scalable and cost-effective features. Hence, the application of P2P architectures to media streaming is attractive and expected to be an alternative to the current video streaming using IP multicast or content delivery systems because the current systems require expensive network infrastructures and large scale centralized cache storage systems. In this paper, we investigate the P2P progressive download enabling Internet video streaming services. We demonstrated the capability of the P2P progressive download in both laboratory test network as well as in the Internet. Through the experiments, we clarified the contribution of the FTTH links to the P2P progressive download in the heterogeneous access networks consisting of FTTH and ADSL links. We analyzed the cause of some download performance degradation occurred in the experiment and discussed about the effective methods to provide the video streaming service using P2P progressive download in the current heterogeneous networks.

  6. Effect of switching time on timer-based burst assembly and its effect on voice-over-Internet protocol quality of service over optical burst switching networks

    Science.gov (United States)

    Tachibana, Takuji; Kurita, Kaori; Kasahara, Shoji

    2006-07-01

    It is well known that performance, such as burst loss probability and transmission delay, for optical burst switching (OBS) networks greatly depends on the switching time of the OBS switch. We analyze the switching-time effect on the burst loss probability using a continuous-time Markov chain. In our analysis, the transmission time of a burst is characterized with both the burst size and the switching time, and the burst loss probability, burst throughput, and data throughput are explicitly derived using the Geo,M/M/c/c queueing model. Numerical examples show that our analysis is quite useful for investigating the effect of the switching time on the timer-based burst assembly. We also consider voice-over-Internet Protocol (VoIP) service as a delay-sensitive application, and we investigate the switching time on the VoIP service. From our performance analysis, we derive an appropriate switching time and a burst processing time of the VoIP service in terms of the transmission distance.

  7. Feeling voices.

    Directory of Open Access Journals (Sweden)

    Paolo Ammirante

    Full Text Available Two experiments investigated deaf individuals' ability to discriminate between same-sex talkers based on vibrotactile stimulation alone. Nineteen participants made same/different judgments on pairs of utterances presented to the lower back through voice coils embedded in a conforming chair. Discrimination of stimuli matched for F0, duration, and perceived magnitude was successful for pairs of spoken sentences in Experiment 1 (median percent correct = 83% and pairs of vowel utterances in Experiment 2 (median percent correct = 75%. Greater difference in spectral tilt between "different" pairs strongly predicted their discriminability in both experiments. The current findings support the hypothesis that discrimination of complex vibrotactile stimuli involves the cortical integration of spectral information filtered through frequency-tuned skin receptors.

  8. Cross-layer Framework for Fine-grained Channel Access in Next Generation High-density WiFi Networks

    OpenAIRE

    ZHAO, HAITAO; Zhang, Shaojie; Garcia-Palacios, Francisco

    2016-01-01

    Densely deployed WiFi networks will play a crucial role in providing the capacity for next generation mobile internet. However, due to increasing interference, overlapped channels in WiFi networks and throughput efficiency degradation, densely deployed WiFi networks is not a guarantee to obtain higher throughput. An emergent challenge is how to efficiently utilize scarce spectrum resources, by matching physical layer resources to traffic demand. In this aspect, access control allocation strat...

  9. Voice Quality in Mobile Telecommunication System

    Directory of Open Access Journals (Sweden)

    Evaldas Stankevičius

    2013-05-01

    Full Text Available The article deals with methods measuring the quality of voice transmitted over the mobile network as well as related problem, algorithms and options. It presents the created voice quality measurement system and discusses its adequacy as well as efficiency. Besides, the author presents the results of system application under the optimal hardware configuration. Under almost ideal conditions, the system evaluates the voice quality with MOS 3.85 average estimate; while the standardized TEMS Investigation 9.0 has 4.05 average MOS estimate. Next, the article presents the discussion of voice quality predictor implementation and investigates the predictor using nonlinear and linear prediction methods of voice quality dependence on the mobile network settings. Nonlinear prediction using artificial neural network resulted in the correlation coefficient of 0.62. While the linear prediction method using the least mean squares resulted in the correlation coefficient of 0.57. The analytical expression of voice quality features from the three network parameters: BER, C / I, RSSI is given as well.Article in Lithuanian

  10. Fiber-Wireless (FiWi Broadband Access Networks in an Age of Convergence: Past, Present, and Future

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2014-01-01

    Full Text Available After describing the beginnings and state of the art of integrated fiber-wireless (FiWi broadband access networks in great detail, we briefly review recent progress and point to various ongoing research activities, including the design of energy-efficient “green” FiWi access networks, advanced survivability techniques, and integration of wireless and fiber optic sensors, towards realizing adaptable, dependable, and ecoconscious future-proof broadband access networks based on both wireless and shared passive fiber media. Furthermore, we discuss service, application, business, and operation related aspects, which motivate access technology to move into a substantially different direction in the long run than continued capacity provisioning. Given that most 4G cellular mobile network researches so far have been focusing on the achievable performance gains in the wireless front-end only without looking into the details of backhaul implementations and possible backhaul bottlenecks, we identify open key research challenges for FiWi broadband access networks. We explore ways of how they can be deployed across relevant economic sectors other than telecommunications per se, taking major paradigm shifts such as the Third Industrial Revolution, Energy Internet, smart grid, and explosion of mobile data traffic in today’s cellular networks into account.

  11. Joint Mode Selection and Resource Allocation for Downlink Fog Radio Access Networks Supported D2D

    Directory of Open Access Journals (Sweden)

    Xiang Hongyu

    2015-09-01

    Full Text Available Presented as an innovative paradigm incorporating the cloud computing into radio access network, Cloud radio access networks (C-RANs have been shown advantageous in curtailing the capital and operating expenditures as well as providing better services to the customers. However, heavy burden on the non-ideal fronthaul limits performances of CRANs. Here we focus on the alleviation of burden on the fronthaul via the edge devices’ caches and propose a fog computing based RAN (F-RAN architecture with three candidate transmission modes: device to device, local distributed coordination, and global C-RAN. Followed by the proposed simple mode selection scheme, the average energy efficiency (EE of systems optimization problem considering congestion control is presented. Under the Lyapunov framework, the problem is reformulated as a joint mode selection and resource allocation problem, which can be solved by block coordinate descent method. The mathematical analysis and simulation results validate the benefits of F-RAN and an EE-delay tradeoff can be achieved by the proposed algorithm.

  12. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    KAUST Repository

    Radaydeh, Redha M.

    2016-03-28

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered that closed-access small cells (i.e., femtocells) can not reuse available channels, and can serve only active authorized user equipments (UEs). On the other hand, the macrocell base station can unconditionally reuse available channels to serve active macrocell UEs. The analysis characterizes UEs identities, their likelihoods of being active, and their likelihoods of initiating interference. Moreover, it quantifies interference sources observed from effective femtocells considering their over-loaded and under-loaded cell scenarios. The developed results to characterize an active UE performance and the impact of the number of available channels are thoroughly examined. The obtained results are generally applicable for any performance measure and any network channel models. Numerical and simulation examples are presented to clarify the main outcomes of this paper.

  13. A Novel Multiple Access Protocol for Mobile Ad Hoc Network with Smart Antennas

    Institute of Scientific and Technical Information of China (English)

    YANGJun; LIJiandong; ZHOUXiaodong

    2004-01-01

    The approach to employ smart antennas in Mobile ad hoc network (MANET) nodes is presented. An adaptive beamforming-Carrier-Sense multiple access/collison avoidance) (ABF-CSMA/CA) protocol is proposed. In the ABF-CSMA/CA, Request-to-Send/Clear-to-Send (RTS/CTS) dialogue is used to distribute channel reservation information. Training sequences are transmitted just before RTS and CTS packets, so the Temporal reference beamforming (TRB) can be performed by the source node and the destination node.An improved virtual carrier-sense mechanism is also proposed to enhance Collision avoidance (CA) and obtain efficient Space division multiple access (SDMA). In this scheme, every node has two kinds of Network allocation vector (NAV): an oNAV maintains the interval of ongoing transmission of neighbors whose smart antennas operate in omnidirectional mode, and multiple bNAVs maintain those intervals of neighbors whose smart antennas operate in beamforming mode. Theoretical analysis of channel utilization of the proposed protocol is presented. Results show that ABF-CSMA/CA protocol combining with smart antennas can provide higher channel utilization.

  14. JavaScript Access to DICOM Network and Objects in Web Browser.

    Science.gov (United States)

    Drnasin, Ivan; Grgić, Mislav; Gogić, Goran

    2017-01-30

    Digital imaging and communications in medicine (DICOM) 3.0 standard provides the baseline for the picture archiving and communication systems (PACS). The development of Internet and various communication media initiated demand for non-DICOM access to PACS systems. Ever-increasing utilization of the web browsers, laptops and handheld devices, as opposed to desktop applications and static organizational computers, lead to development of different web technologies. The DICOM standard officials accepted those subsequently as tools of alternative access. This paper provides an overview of the current state of development of the web access technology to the DICOM repositories. It presents a different approach of using HTML5 features of the web browsers through the JavaScript language and the WebSocket protocol by enabling real-time communication with DICOM repositories. JavaScript DICOM network library, DICOM to WebSocket proxy and a proof-of-concept web application that qualifies as a DICOM 3.0 device were developed.

  15. An Efficient Medium Access Control Protocol with Parallel Transmission for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mitsuji Matsumoto

    2012-08-01

    Full Text Available In this paper, we present a novel low power medium access control protocol for wireless sensor networks (WSNs. The proposed protocol, EP-MAC (Efficient MAC with Parallel Transmission achieves high energy efficiency and high packet delivery ratio under different traffic load. EP-MAC protocol is basically based on the Time Division Multiple Access (TDMA approach. The power of Carrier Sense Multiple Access (CSMA is used in order to offset the fundamental problems that the stand-alone TDMA method suffers from, i.e., problems such as lack of scalability, adaptability to varying situations, etc. The novel idea behind the EP-MAC is that it uses the parallel transmission concept with the TDMA link scheduling. EP-MAC uses the methods for the transmission power adjustment, i.e., uses the minimum level power necessary to reach the intended neighbor within a specified bit error rate [BER] target. This reduces energy consumption, as well as further enhances the scope of parallel transmission of the protocol. The simulation studies support the theoretical results, and validate the efficiency of our proposed EP-MAC protocol.

  16. Layer-specific chromatin accessibility landscapes reveal regulatory networks in adult mouse visual cortex

    Science.gov (United States)

    Gray, Lucas T; Yao, Zizhen; Nguyen, Thuc Nghi; Kim, Tae Kyung; Zeng, Hongkui; Tasic, Bosiljka

    2017-01-01

    Mammalian cortex is a laminar structure, with each layer composed of a characteristic set of cell types with different morphological, electrophysiological, and connectional properties. Here, we define chromatin accessibility landscapes of major, layer-specific excitatory classes of neurons, and compare them to each other and to inhibitory cortical neurons using the Assay for Transposase-Accessible Chromatin with high-throughput sequencing (ATAC-seq). We identify a large number of layer-specific accessible sites, and significant association with genes that are expressed in specific cortical layers. Integration of these data with layer-specific transcriptomic profiles and transcription factor binding motifs enabled us to construct a regulatory network revealing potential key layer-specific regulators, including Cux1/2, Foxp2, Nfia, Pou3f2, and Rorb. This dataset is a valuable resource for identifying candidate layer-specific cis-regulatory elements in adult mouse cortex. DOI: http://dx.doi.org/10.7554/eLife.21883.001 PMID:28112643

  17. DataBus-based hybrid routing approach for orbit access networks in lunar exploration

    Science.gov (United States)

    Zeng, Hui; Meng, Ke; Deng, Julia

    2012-06-01

    One of the major challenges for lunar exploration missions is how to achieve dynamic and robust routing. To reduce the development cost, it is desirable to leverage existing technologies, such as routing in mobile ad hoc networks (MANETs) and delay tolerant networks (DTN). However, these technologies are developed for the Earth environment and hence need further investigation for the lunar environment. To support robust access and dynamic mission operations, we propose a DataBus-based Hybrid Routing (DBHR) approach that combines MANET reactive routing protocol (such as AODV) and DTN-based bundle delivery. Our DBHR approach is designed for a tiered architecture where remote nodes communicate with upper-tier gateways through data carriers (DataBus) using short-range radio interfaces. Our scheme explores the (non)availability of the end-to-end path between two peers using MANET routing and provides diverse route options based upon different parameters. This interaction between hop-by-hop DTN technologies and end-to-end MANET protocol will result in a reliable and robust routing protocol for orbit access and improve the overall communication capabilities. To evaluate its performance, we implemented our proposed scheme on commercial-off-theshelf (COTS) routers with the custom OpenWRT and tailored IBR-DTN bundle protocol distribution. The on-demand service request and grant mechanisms are also developed in our implementation to allow certain DTN nodes to reserve the future access opportunities. Finally, we demonstrate the achieved capabilities and performance gains through experiments on a hardware test bed that consists of several COTS routers with our implementation.

  18. PERFORMANCE OF OPPORTUNISTIC SPECTRUM ACCESS WITH SENSING ERROR IN COGNITIVE RADIO AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    N. ARMI

    2012-04-01

    Full Text Available Sensing in opportunistic spectrum access (OSA has a responsibility to detect the available channel by performing binary hypothesis as busy or idle states. If channel is busy, secondary user (SU cannot access and refrain from data transmission. SU is allowed to access when primary user (PU does not use it (idle states. However, channel is sensed on imperfect communication link. Fading, noise and any obstacles existed can cause sensing errors in PU signal detection. False alarm detects idle states as a busy channel while miss-identification detects busy states as an idle channel. False detection makes SU refrain from transmission and reduces number of bits transmitted. On the other hand, miss-identification causes SU collide to PU transmission. This paper study the performance of OSA based on the greedy approach with sensing errors by the restriction of maximum collision probability allowed (collision threshold by PU network. The throughput of SU and spectrum capacity metric is used to evaluate OSA performance and make comparisons to those ones without sensing error as function of number of slot based on the greedy approach. The relations between throughput and signal to noise ratio (SNR with different collision probability as well as false detection with different SNR are presented. According to the obtained results show that CR users can gain the reward from the previous slot for both of with and without sensing errors. It is indicated by the throughput improvement as slot number increases. However, sensing on imperfect channel with sensing errors can degrade the throughput performance. Subsequently, the throughput of SU and spectrum capacity improves by increasing maximum collision probability allowed by PU network as well. Due to frequent collision with PU, the throughput of SU and spectrum capacity decreases at certain value of collision threshold. Computer simulation is used to evaluate and validate these works.

  19. Modeling MAC layer for powerline communications networks

    Science.gov (United States)

    Hrasnica, Halid; Haidine, Abdelfatteh

    2001-02-01

    The usage of electrical power distribution networks for voice and data transmission, called Powerline Communications, becomes nowadays more and more attractive, particularly in the telecommunication access area. The most important reasons for that are the deregulation of the telecommunication market and a fact that the access networks are still property of former monopolistic companies. In this work, first we analyze a PLC network and system structure as well as a disturbance scenario in powerline networks. After that, we define a logical structure of the powerline MAC layer and propose the reservation MAC protocols for the usage in the PLC network which provides collision free data transmission. This makes possible better network utilization and realization of QoS guarantees which can make PLC networks competitive to other access technologies.

  20. QoS Differentiated and Fair Packet Scheduling in Broadband Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Zhang Yan

    2009-01-01

    Full Text Available This paper studies the packet scheduling problem in Broadband Wireless Access (BWA networks. The key difficulties of the BWA scheduling problem lie in the high variability of wireless channel capacity and the unknown model of packet arrival process. It is difficult for traditional heuristic scheduling algorithms to handle the situation and guarantee satisfying performance in BWA networks. In this paper, we introduce learning-based approach for a better solution. Specifically, we formulate the packet scheduling problem as an average cost Semi-Markov Decision Process (SMDP. Then, we solve the SMDP by using reinforcement learning. A feature-based linear approximation and the Temporal-Difference learning technique are employed to produce a near optimal solution of the corresponding SMDP problem. The proposed algorithm, called Reinforcement Learning Scheduling (RLS, has in-built capability of self-training. It is able to adaptively and timely regulate its scheduling policy according to the instantaneous network conditions. Simulation results indicate that RLS outperforms two classical scheduling algorithms and simultaneously considers: (i effective QoS differentiation, (ii high bandwidth utilization, and (iii both short-term and long-term fairness.

  1. Energy-Efficient Reservation-Based Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kohvakka Mikko

    2010-01-01

    Full Text Available In Wireless Sensor Networks (WSNs, a robust and energy-efficient Medium Access Control (MAC protocol is required for high energy efficiency in harsh operating conditions, where node and link failures are common. This paper presents the design of a novel MAC protocol for low-power WSNs. The developed MAC protocol minimizes the energy overhead of idle time and collisions by strict frame synchronization and slot reservation. It combines a dynamic bandwidth adjustment mechanism, multi-cluster-tree network topology, and a network channel allowing rapid and low-energy neighbor discoveries. The protocol achieves high scalability by employing frequency and time division between clusters. Performance analysis shows that the MAC protocol outperforms current state-of-the-art protocols in energy efficiency, and the energy overhead compared to an ideal MAC protocol is only 2.85% to 27.1%. The high energy efficiency is achieved in both leaf and router nodes. The models and the feasibility of the protocol were verified by simulations and with a full-scale prototype implementation.

  2. Non-Orthogonal Multiple Access for Large-Scale 5G Networks: Interference Aware Design

    KAUST Repository

    Ali, Konpal S.

    2017-09-18

    Non-orthogonal multiple access (NOMA) is promoted as a key component of 5G cellular networks. As the name implies, NOMA operation introduces intracell interference (i.e., interference arising within the cell) to the cellular operation. The intracell interference is managed by careful NOMA design (e.g., user clustering and resource allocation) along with successive interference cancellation. However, most of the proposed NOMA designs are agnostic to intercell interference (i.e., interference from outside the cell), which is a major performance limiting parameter in 5G networks. This article sheds light on the drastic negative-impact of intercell interference on the NOMA performance and advocates interference-aware NOMA design that jointly accounts for both intracell and intercell interference. To this end, a case study for fair NOMA operation is presented and intercell interference mitigation techniques for NOMA networks are discussed. This article also investigates the potential of integrating NOMA with two important 5G transmission schemes, namely, full duplex and device-to-device communication. This is important since the ambitious performance defined by the 3rd Generation Partnership Project (3GPP) for 5G is foreseen to be realized via seamless integration of several new technologies and transmission techniques.

  3. Consensus of Multiagent Systems Subject to Partially Accessible and Overlapping Markovian Network Topologies.

    Science.gov (United States)

    Ge, Xiaohua; Han, Qing-Long

    2016-06-07

    This paper addresses the consensus problem for a continuous-time multiagent system (MAS) with Markovian network topologies and external disturbance. Different from some existing results, global jumping modes of the Markovian network topologies are not required to be completely available for consensus protocol design. A network topology mode regulator (NTMR) is first developed to decompose unavailable global modes into several overlapping groups, where overlapping groups refer to the scenario that there exist commonly shared local modes between any two distinct groups. The NTMR schedules which group modes each agent may access at every time step. Then a new group mode-dependent distributed consensus protocol on the basis of relative measurement outputs of neighboring agents is delicately constructed. In this sense, the proposed consensus protocol relies only on group and partial modes and eliminates the need for complete knowledge of global modes. Sufficient conditions on the existence of desired distributed consensus protocols are derived to ensure consensus of the MAS with a prescribed H∞ performance level. Two examples are provided to show the effectiveness of the proposed consensus protocol.

  4. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  5. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  6. Qos and Voice Over IP

    Directory of Open Access Journals (Sweden)

    Adrian GHENCEA

    Full Text Available As Voice over Internet Protocol (VoIP technology matures, companies are increasingly adopting it to cut costs, improve efficiency and enhance customer service. Using the Internet as an existing network for integrating data and telecom systems through intelligent VoIP, a range of benefits results: lower long distance costs, cost cuts in cabling processes and more flexible telephony management. However, as voice over IP services grow in popularity, major threats arise: this rapid growth leads to traffic congestion, security is jeopardizedand the poor quality of calls affects communication. The objective of this article is to present all the elements that can affect voicequality in a VoIP network and to provide methods for solving them. A detailed analysis to minimize the impact of implementation of QoS will be made, and at the end solutions to management strategies will be proposed.

  7. Mobile phone-based interactive voice response as a tool for improving access to healthcare in remote areas in Ghana - an evaluation of user experiences.

    Science.gov (United States)

    Brinkel, J; May, J; Krumkamp, R; Lamshöft, M; Kreuels, B; Owusu-Dabo, E; Mohammed, A; Bonacic Marinovic, A; Dako-Gyeke, P; Krämer, A; Fobil, J N

    2017-05-01

    To investigate and determine the factors that enhanced or constituted barriers to the acceptance of an mHealth system which was piloted in Asante-Akim North District of Ghana to support healthcare of children. Four semi-structured focus group discussions were conducted with a total of 37 mothers. Participants were selected from a study population of mothers who subscribed to a pilot mHealth system which used an interactive voice response (IVR) for its operations. Data were evaluated using qualitative content analysis methods. In addition, a short quantitative questionnaire assessed system's usability (SUS). Results revealed 10 categories of factors that facilitated user acceptance of the IVR system including quality-of-care experience, health education and empowerment of women. The eight categories of factors identified as barriers to user acceptance included the lack of human interaction, lack of update and training on the electronic advices provided and lack of social integration of the system into the community. The usability (SUS median: 79.3; range: 65-97.5) of the system was rated acceptable. The principles of the tested mHealth system could be of interest during infectious disease outbreaks, such as Ebola or Lassa fever, when there might be a special need for disease-specific health information within populations. © 2017 John Wiley & Sons Ltd.

  8. Effect Of Packet Delay Variation On Video/Voice Over Diffserv-Mpls In Ipv4/Ipv6 Networks

    Directory of Open Access Journals (Sweden)

    Md. Tariq Aziz

    2012-02-01

    Full Text Available Over the last years, we have witnessed a rapid deployment of real-time applications on the Internet as well as many research works about Quality of Service (QoS, in particular IPv4 (Internet Protocol version 4. The inevitable exhaustion of the remaining IPv4 address pool has become progressively evident. As the evolution of Internet Protocol (IP continues, the deployment of IPv6 QoS is underway.Today, there is limited experience in the deployment of QoS for IPv6 traffic in MPLS backbone networksin conjunction with DiffServ (Differentiated Services support. DiffServ itself does not have the ability to control the traffic which has been taken for end-to-end path while a number of links of the path are congested. In contrast, MPLS Traffic Engineering (TE is accomplished to control the traffic and can set up end-to-end routing path before data has been forwarded. From the evolution of IPv4 QoS solutions, we know that the integration of DiffServ and MPLS TE satisfies the guaranteed QoS requirement for realtime applications. This paper presents a QoS performance study of real-time applications such as voiceand video conferencing in terms of Packet Delay Variation (PDV over DiffServ with or without MPLS TE in IPv4/IPv6 networks using Optimized Network Engineering Tool (OPNET. We also study the interaction of Expedited Forwarding (EF, Assured Forwarding (AF traffic aggregation, link congestion, as well as the effect of performance metric such as PDV. The effectiveness of DiffServ and MPLS TE integration in IPv4/IPv6 network is illustrated and analyzed. This paper shows that IPv6 experiences more PDV than their IPv4 counterparts.

  9. Women’s Voice in Mass Media

    Institute of Scientific and Technical Information of China (English)

    1997-01-01

    IN May of 1996, Women’s Media Monitoring Network was set up in Beijing. The organization was established on the commemorative convention for the 10th anniversary of The Capital Female Journalists Association, aiming to open women’s eyes and discover their voice in mass media. Just one year after its establishment, the Network aroused extensive attention from

  10. Sleeping Cluster based Medium Access Control Layer Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    T. R. Rangaswamy

    2012-01-01

    Full Text Available Wireless sensor networks play a vital role in remote area applications, where human intervention is not possible. In a Wireless Sensor Network (WSN each and every node is strictly an energy as well as bandwidth constrained one. Problem statement: In a standard WSN, most of the routing techniques, move data from multiple sources to a single fixed base station. Because of the greater number of computational tasks, the existing routing protocol did not address the energy efficient problem properly. In order to overcome the problem of energy consumption due to more number of computational tasks, a new method is developed. Approach: The proposed algorithm divides the sensing field into three active clusters and one sleeping cluster. The cluster head selection is based on the distance between the base station and the normal nodes. The Time Division Multiple Access (TDMA mechanism is used to make the cluster remain in the active state as well as the sleeping state. In an active cluster 50% of nodes will be made active and the remaining 50% be in sleep state. A sleeping cluster will be made active after a period of time and periodically changes its functionality. Results: Due to this periodic change of state, energy consumption is minimized. The performance of the Low Energy Adaptive and Clustering Hierarchy (LEACH algorithm is also analyzed, using a network simulator NS2 based on the number of Cluster Heads (CH, Energy consumption, Lifetime and the number of nodes alive. Conclusion: The simulation studies were carried out using a network simulation tool NS2, for the proposed method and this is compared with the performance of the existing protocol. The superiority of the proposed method is highlighted.

  11. Design of Active Queue Management for Robust Control on Access Router for Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Åhlund Christer

    2011-01-01

    Full Text Available The Internet architecture is a packet switching technology that allows dynamic sharing of bandwidth among different flows with in an IP network. Packets are stored and forwarded from one node to the next until reaching their destination. Major issues in this integration are congestion control and how to meet different quality of service requirements associated with various services. In other words streaming media quality degrades with increased packet delay and jitter caused by network congestion. To mitigate the impact of network congestion, various techniques have been used to improve multimedia quality and one of those techniques is Active Queue Management (AQM. Access routers require a buffer to hold packets during times of congestion. A large buffer can absorb the bursty arrivals, and this tends to increase the link utilizations but results in higher queuing delays. Traffic burstiness has a considerable negative impact on network performance. AQM is now considered an effective congestion control mechanism for enhancing transport protocol performance over wireless links. In order to have good link utilization, it is necessary for queues to adapt to varying traffic loads. This paper considers a particular scheme which is called Adaptive AQM (AAQM and studies its performance in the presence of feedback delays and its ability to maintain a small queue length as well as its robustness in the presence of traffic burstiness. The paper also presents a method based on the well-known Markov Modulated Poisson Process (MPP to capture traffic burstiness and buffer occupancy. To demonstrate the generality of the presented method, an analytic model is described and verified by extensive simulations of different adaptive AQM algorithms. The analysis and simulations show that AAQM outperforms the other AQMs with respect to responsiveness and robustness.

  12. Dimensionality in voice quality.

    Science.gov (United States)

    Bele, Irene Velsvik

    2007-05-01

    This study concerns speaking voice quality in a group of male teachers (n = 35) and male actors (n = 36), as the purpose was to investigate normal and supranormal voices. The goal was the development of a method of valid perceptual evaluation for normal to supranormal and resonant voices. The voices (text reading at two loudness levels) had been evaluated by 10 listeners, for 15 vocal characteristics using VA scales. In this investigation, the results of an exploratory factor analysis of the vocal characteristics used in this method are presented, reflecting four dimensions of major importance for normal and supranormal voices. Special emphasis is placed on the effects on voice quality of a change in the loudness variable, as two loudness levels are studied. Furthermore, the vocal characteristics Sonority and Ringing voice quality are paid special attention, as the essence of the term "resonant voice" was a basic issue throughout a doctoral dissertation where this study was included.

  13. Voice box (image)

    Science.gov (United States)

    The larynx, or voice box, is located in the neck and performs several important functions in the body. The larynx is involved in swallowing, breathing, and voice production. Sound is produced when the air which ...

  14. Voice and Aging

    Science.gov (United States)

    ... dramatic voice changes are those during childhood and adolescence. The larynx (or voice box) and vocal cord tissues do not fully mature until late teenage years. Hormone-related changes during adolescence are ...

  15. Network Based Educational Environment How Libraries and Librarians Become Organizers of Knowledge Access and Resources

    CERN Document Server

    Pettenati, M C; Pettenati, Corrado

    2000-01-01

    In this paper we will highlight some important issues which will influence the redefinition of roles and duties of libraries and librarians in a networked based educational environment. Although librarians will also keep their traditional roles of faculty support services as well as reference service and research assistance, we identify the participation in the instructional design process, the support in the evaluation, development and use of a proper authoring system and the customization of information access, as being the domains where libraries and librarians should mainly involve themselves in the next future and make profit of their expertise in information and knowledge organization in order to properly and effectively support the institutions in the use of Information Technology in education.

  16. NRZ versus RZ over Absolute Added Correlative coding in optical metro-access networks

    Science.gov (United States)

    Dong-Nhat, Nguyen; Elsherif, Mohamed A.; Le Minh, Hoa; Malekmohammadi, Amin

    2017-03-01

    This paper comparatively investigates the transmission performance of absolute added correlative coding (AACC) using non-return-to-zero (NRZ) and return-to-zero (RZ) pulse shapes with a binary intensity modulation direct detection receiver in 40 Gb/s optical metro-access networks operating at 1550 nm. It is shown that, for AACC transmission, the NRZ impulse shaping is superior in comparison to RZ in spectral efficiency, dispersion tolerance, residual dispersion and self-phase modulation (SPM) tolerance. However, RZ-AACC experiences a 1-2 dB advantage in receiver sensitivity over NRZ-AACC for back-to-back configuration as well as after 300-km single-mode fiber delivery.

  17. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    Science.gov (United States)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  18. Hybrid mathematical and rule-based system for transmission network planning in open access schemes

    Energy Technology Data Exchange (ETDEWEB)

    Kandil, M. S. [Electrical Department, Mansura University, (Egypt); EI-Debeiky, S. M. [Electrical Department, Ain Shams University, (Egypt); Hasanien, N. E. [Egyptian Electricity Authority, Studies and Researches Department, (Egypt)

    2001-09-01

    The paper presents a planning methodology using an application of a mathematical and a rule-based expert system (ES) to expand the transmission network in open access schemes. In this methodology, the ES suggests a realistic set of generation additions with proper economic signals to the participants, before proceeding with the transmission expansion. A feasible list of transmission alternatives is then assumed to accommodate the proposals for generation. A mathematical method is performed based on marginal cost allocation to optimise the location for the new generation and its transmission expansion scheme simultaneously for each alternative. The optimum alternative, which minimises the overall system's cost function and satisfies the future demand under different operating conditions, is obtained. The ES interacts with the power system planning tools to produce the optimum expansion plan. A practical application is given to demonstrate the effectiveness of the developed prototype system. (Author)

  19. Enhancing the Performance of Random Access Networks with Random Packet CDMA and Joint Detection

    Directory of Open Access Journals (Sweden)

    Behrouz Farhang-Boroujeny

    2008-09-01

    Full Text Available Random packet CDMA (RP-CDMA is a recently proposed random transmission scheme which has been designed from the beginning as a cross-layer method to overcome the restrictive nature of the Aloha protocol. Herein, we more precisely model its performance and investigate throughput and network stability. In contrast to previous works, we adopt the spread Aloha model for header transmission, and the performance of different joint detection methods for the payload data is investigated. Furthermore, we introduce performance measures for multiple access systems based on the diagonal elements of a modified multipacket reception matrix, and show that our measures describe the upper limit of the vector of stable arrival rates for a finite number of users. Finally, we simulate queue sizes and throughput characteristics of RP-CDMA with various receiver structures and compare them to spread Aloha.

  20. A network collaboration implementing technology to improve medication dispensing and administration in critical access hospitals.

    Science.gov (United States)

    Wakefield, Douglas S; Ward, Marcia M; Loes, Jean L; O'Brien, John

    2010-01-01

    We report how seven independent critical access hospitals collaborated with a rural referral hospital to standardize workflow policies and procedures while jointly implementing the same health information technologies (HITs) to enhance medication care processes. The study hospitals implemented the same electronic health record, computerized provider order entry, pharmacy information systems, automated dispensing cabinets (ADC), and barcode medication administration systems. We conducted interviews and examined project documents to explore factors underlying the successful implementation of ADC and barcode medication administration across the network hospitals. These included a shared culture of collaboration; strategic sequencing of HIT component implementation; interface among HIT components; strategic placement of ADCs; disciplined use and sharing of workflow analyses linked with HIT applications; planning for workflow efficiencies; acquisition of adequate supply of HIT-related devices; and establishing metrics to monitor HIT use and outcomes.