Academia.eduAcademia.edu

Cross layer

3,939 papers
7 followers
AI Powered
Cross layer refers to an approach in network design and communication protocols that enables interaction and coordination between different layers of the network architecture. This method aims to optimize performance by allowing layers to share information and make decisions based on the state and requirements of other layers.
The integration of a satellite system with a HAPS segment appears very suitable to provide communication services, including Internet access, for a large set of applications. In fact, the satellite capability to provide wide coverage and... more
In this paper, we develop a cross-layer model for downlink interference in heterogenous DS-CDMA wireless cellular networks. In this model, interference is described as a function of application layer parameters (traffic characteristics)... more
Technological Advances in microelectronic and telecommunication fields enable the existence of tiny computing units, very small and more efficient. In the context of these new technologies, Wireless Sensor Networks (WSN) have emerged. The... more
Contents 5.4 Visual results. [a] Frame no. 435 of the Foreman sequence -original; [b] Frame no. 435 of the Foreman sequence -MPEG-4 -no RoHC, no JSCC; [c] Frame no. 435 of the Foreman sequence -MPEG-4 -RoHC, JSCC. . . . 81 Contents ix 5.5... more
Mobile Ad hoc Network (MANET) is a self-organizing and self-configuring network that enables mobile devices to communicate in locations without a pre-existing communication infrastructure. To satisfy applications requiring QoS, like... more
The real time delivery of multimedia content (Multimedia streaming) becomes a prominent field with the development of different networking technology and multimedia technology. Most of the applications such as video conferencing, visual... more
With the increasing number and variety of Wireless Sensor Network (WSN) applications the need to define a suitable protocol design model that fits their specific requirements and operation has become even more pressing. The traditional... more
Call admission control (CAC) is a technique deployed in the management of network resources in mobile broadband networks. Despite its importance, the WiMAX technology like most mobile broadband networks does not make provision for CAC,... more
Nowadays, the cross-layer design approach is the most relevant concept in mobile ad hoc networks which is adopted to solve several open issues. It aims to overcome ad hoc networks performance problems by allowing protocols belonging to... more
Wireless Body Area Network is a collection of wireless sensors attached on or implanted in the body that are used to monitor physiological signs of the body. WBAN does not restrict patient to stay at the hospital for health monitoring... more
Recent critical application sectors of sensor networks like military, health care, and industry require the use of mobile sensor nodes, something that poses unique challenges in aspects like handoff delay, packet loss, and reliability. In... more
In this paper, we propose a new quality link metric, interference and bandwidth adjusted ETX (IBETX) for wireless multi-hop networks. As MAC layer affects the link performance and consequently the route quality, the metric therefore,... more
Vertical handover (VHO) procedure facilitates service continuity in a heterogeneous wireless scenario under varying network as well as channel conditions. Decision criteria for VHO are, mainly, designed to maximize a combination of... more
An analytical medium access control (MAC) and physical (PHY) cross-layer model for the saturation goodput and delay of IEEE 802.11 wireless local area networks (WLANs) operating under the Wireless-Fidelity Multimedia (WMM) specification... more
The flexible interface between the medium access layer and the custom physical layer of the Rice University Wireless Open-Access Research Platform (WARP) provides a high performance research tool for clean-slate cross layer designs. As we... more
Recently, Internet Engineering Task Force (IETF) has been considering the deployment of the Random Early Detection (RED) [5] in order to avoid the increasing of packet loss rates caused by an exponential increment of network traffic and... more
This paper presents an integrated view of cognitive radio technologies for efficient wireless services in dense spectrum environments. The rationale for cognitive radio based systems is discussed, leading to an identification of the... more
The objective of topology control in MANET is to reduce the transmission power at each node in order to sustain the network topology and energy consumption as well. Controlling the transmission radii of nodes decreases the radio... more
This paper addressed the impacts of latency on good throughputs of a computer network. The networks latency contributed largely on the performance of Covenant University network. Experiment using the University network were carried out... more
The self configuring dexterous autonomy of MANET imposes some network challenges constrained to traditional dynamic routing behaviour. So as working with different mobility and traffic patterns with normal management schemes may lead some... more
Personal Digital Assistants (PDAs) have become one of the important tools in our life. Their popularity are due to their small size and mobility which enable them to be carried anywhere. Along with their popularity, handheld devices are... more
Mobile communications has witnessed an exponential increase in the amount of users, services and applications. While 2G cellular networks were mainly optimized to support voice services, effective delivery of broadband multimedia... more
Video transmission is expected to be the next big thing in personal communication systems. While text messaging applications have already experienced an explosive growth, the exchange of multimedia content is still lacking architectural... more
Recent trends bring Identity concepts into the application layer, although usually focusing in web environments. While this enables new solutions, interactions and paradigms at the application layer, the lower layers are neglected, and... more
The foreseen explosion in online video traffic over the upcoming years has left current mobile operators struggling to maximize their networks capacity and efficiency. MEDIEVAL project aims to evolve existing architectures through... more
With the foreseen major increase in video traffic over the coming years, the current Internet's design is being perceived as inefficient for handling the demanding flow of video over wireless access networks, populated by an ever... more
Despite of several years of innovative research, indoor localization is still not mainstream. Existing techniques either employ cumbersome fingerprinting, or rely upon the deployment of additional infrastructure. Towards a solution that... more
In this paper, the performance of the carrier sense multiple access/ collision avoidance (CSMA/CA) protocol under the presence of carrier sensing error is analyzed. Based on our previous work [1], we extend the results to n-user case... more
In this paper, the performance of carrier-sense multiple access (CSMA)/collision-avoidance (CA) protocols in the presence of carrier-sensing errors is analyzed. Two types of carrier-sensing errors, i.e., false alarm and miss-detection,... more
This article 1 presents the design of a networked system for joint compression, rate control and error correction of video over resource-constrained embedded devices based on the theory of compressed sensing. The objective of this work is... more
This paper proposes a set of performance enhancements techniques aiming to improve the perceived performance of video transmission across the IEEE 802.11e network. The proposed mechanism preserves the video Quality of Experience (QoE) by... more
Cross-Layer design has been the focus of several recent research efforts. Due to the highly variable nature of the links used in wireless communication systems and the resource-poor nature of the wireless mobile devices, there have been... more
In this paper, the energy-limited wireless multihop mesh networks are considered. Minimizing the total transmission energy in the network, while satisfying the applications' delay constraints, is the target of our optimization problem. To... more
In this paper, a cross-layer algorithm that aims at minimizing the end-to-end transmission energy subject to a packet delay deadline constraint is proposed. The optimal transmission energy and rates, and the optimal route are computed to... more
A distributed joint routing and spectrum sharing algorithm for video streaming applications over cognitive radio ad hoc networks is proposed in this article. The proposed cross-layer control scheme dynamically allocates routes, spectrum... more
Throughput maximization is one of the main challenges in cognitive radio ad hoc networks, where local spectrum resources may change from time to time and hop-by-hop. For this reason, a crosslayer opportunistic spectrum access and dynamic... more
Throughput maximization is one of the main challenges in cognitive radio ad hoc networks, where the availability of local spectrum resources may change from time to time and hop-by-hop. For this reason, a cross-layer opportunistic... more
In this paper, we propose an approach to manage network resources for a direct sequence code division multiple access (DS-CDMA) visual sensor network where nodes monitor scenes with varying levels of motion. It uses cross-layer... more
Network performance degradation due to congestion is a major problem in the Internet. This performance degradation is mainly due to the uncoordinated interaction of congestion control mechanism of the TCP and that of the underlying... more
The paper presents a monitoring system for carrier grade mesh networks. First, the system architecture, components and interfaces are described. Then the measured and discovered network parameters are discussed. A link prediction and... more
Exascale systems will present considerable fault-tolerance challenges to applications and system software. These systems are expected to suffer several hard and soft errors per day. Unfortunately, many fault-tolerance methods in use, such... more
Forward Error Correction (FEC) techniques have been adopted with Automatic Repeat reQuest (ARQ) to overcome packet losses and avoid network congestion in various wireless network conditions. The number of FEC packets need to be generated... more
In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD-a novel adaptive diversification approach to provide resiliency against such attacks. SPREAD relies on a... more
Third-generation (3G) and beyond 3G mobile communication systems must provide interoperability with the Internet, increase throughput for mobile devices, and optimize their operation for multimedia applications. The limited ability of... more
The continuous success of NAND flash is a result of the enormous progress achieved over the past few decades. Initially driven by the scaling of the process technology node, then assisted by an increase in the number of bits stored per... more
Recently in modern wireless systems, the physical-layer authentication has been proved to be a viable technique that can be combined with the higherlayer cryptographic to enhance the communication security. The existing physical-layer... more
The recent development of high-speed data transmission over wireless cellular networks has enabled the delivery of multimedia broadcasting services to mobile users. These services involve a range of interactions among different system... more
In this paper, we will describe different Routing protocols in MANET. Routing protocols used in MANET have to face many challenges due to dynamically changing topologies, route discovery, device discovery, bandwidth constrained, low... more
In this paper, we firstly develop link state change of wireless error link to improve packet successful delivery percentage and reduce collision probability of wireless Mesh networks. Based on statistics of link layer quality and the... more