Tag Archive: 'opnet simulator'

Coherent Detection and Channel Coding for Bistatic Scatter Radio Sensor Networking

With rapid advances of scatter radio systems, the principle of reflection rather than active transmission employed by backscatter sensor networks, has emerged as a potential key enabler for low-cost, large-scale and dense ubiquitous sensor networks. Despite the presence of three different unknown channel links due to the bistatic setup (i.e., carrier emitter and receiver are dislocated), as […]

The Interplay Between Massive MIMO and Underlaid D2D Networking

In a device-to-device (D2D) underlaid cellular network, the uplink spectrum is reused by the D2D transmissions, causing mutual interference with the ongoing cellular transmissions. Massive MIMO is appealing in such a context as the base station’s (BS’s) large antenna array can nearly null the D2D-to-BS interference. The multi-user transmission in massive MIMO, however, may lead to increased […]

Software defined synergistic IP+optical resilient transport networks [Invited]

Integrated orchestration of the IP+optical transport network has been well studied in recent years and has become a realistic trend in telecommunication network deployments. OpenFlow-based softwaredefined network architecture is among the emerging and intensively investigated unified control plane solutions. Numerous previous works have focused on enabling optical networks to support the OpenFlow control plane, but mostly […]

Matching theory for future wireless networks: fundamentals and applications

The emergence of novel wireless networking paradigms such as small cell and cognitive radionetworks has forever transformed the way in which wireless systems are operated. In particular, the need for self-organizing solutions to manage the scarce spectral resources has become a prevalent theme in many emerging wireless systems. In this article, the first comprehensive tutorial on the […]

Scalable mobile backhauling via information-centric networking

The rapid traffic growth fueled by mobile devices spread and high speed network access calls for substantial innovation at network layer. The content-centric nature of Internet usage highlights the limitations of the host-centric model in coping with dynamic content-to-location binding, mobility, multicast, multi-homing, etc. If transmission capacity speedups in the backhaul may hide inefficiencies in the short term, the […]

WA-Method-TLV improves reliability of GMPLS WDM networks against multiple link failures

Concurrent multi-link failures in GMPLS Wavelength Division Multiplexing (WDM) networks can disrupt a large number of active optical circuits. These circuits need to be quickly restored in order to avoid prolonged traffic disruptions at the higher layers. The distributed nature of the GMPLS control plane requires that independent restoration attempts are conducted for each disrupted […]

ID-based communication for realizing IoT and M2M in future heterogeneous mobile networks

Internet of Things (IoT) and Machine to Machine (M2M) communication are expected to be the major paradigm of communications in the future Internet, where trillion of devices will be connected through heterogeneous mobile networks that will vary in both networking and link technologies. The IoT/M2M devices need to remain connected despite they change their points of […]

Simultaneous Schedule-Based Transmission by Primary and Secondary Users for Heavy-Traffic Cognitive Radio Networks

We develop cognitive radio networking methods for a heavy-traffic model in which the channel is always occupied by primary users. This contrasts with the interference-avoidance approach for the non-heavy-traffic model, in which primary users have idle times, and secondary users are allowed to use the channel at those idle times. We use an “underlay” approach to cognitive […]

Social Networking Sites and Computer Encodings in China, 2008–2012

Technical objects constrain what users do with them. They are not neutral entities but embody information, choices, values, assumptions, or even mistakes embedded by designers. What happens when a technology is designed in one culture and used in another? What happens, for example, when a Chinese user is confronted by Roman-alphabet-embedded interfaces? In this book, Basile […]