Browsing by Subject "Wireless LANs"
Now showing items 1-20 of 408
-
5G framework for automated network adaptation in mission critical services
(Institute of Electrical and Electronics Engineers (IEEE), 2018)
Conference report
Open AccessMission Critical Services (MCS) are gaining interest among network operators to offer alternative communications than conventional trunked radio systems. They promise a simplified management of cloud and radio resources ... -
A 125-143-GHz frequency-reconfigurable BiCMOS compact LNA using a single RF-MEMS switch
(2019-05-01)
Article
Open AccessIn this letter, a 125-143-GHz frequency-reconfigurable BiCMOS compact low-noise amplifier (LNA) is presented for the first time. It consists of two cascode stages and was fabricated using a 0.13-µm SiGe:C BiCMOS process, ... -
A case of acquisition, transmission and use of information to control a manufacturing process
(Universitat Politècnica de Catalunya, 2009-10-08)
Master thesis
Open Access -
A channel allocation algorithm for OSA-Enabled IEEE 802.11 WLANs
(2009)
Conference report
Open AccessChannel allocation problem is a major challenge in wireless local area networks (WLANs), especially in dense deployments of access points (APs) where congestion of the unlicensed spectrum bands (i.e., ISM bands) could ... -
A channel allocation algorithm for OSA-Enabled IEEE 802.11 WLANs
(2009-09)
Conference report
Open AccessChannel allocation problem is a major challenge in wireless local area networks (WLANs), especially in dense deployments of access points (APs) where congestion of the unlicensed spectrum bands (i.e., ISM bands) could ... -
A cross-layer energy-saving mechanism for an enhancement of 802.11 WLAN systems
(Institute of Electrical and Electronics Engineers (IEEE), 2004)
Conference lecture
Restricted access - publisher's policyMost multiple access collision avoidance-based (MAC) protocols for WLAN systems have been using fixed transmission power and have not considered energy-saving techniques targeted on channel estimation models. In order to ... -
A cross-layer scheduling algorithm for DQCA-based WLAN systems with heterogeneous voice-data traffic
(ieee, 2005-09-30)
Conference lecture
Restricted access - publisher's policyThis paper proposes a cross-layer priority-based scheduling algorithm for WLAN systems using the DQCA MAC protocol where heterogeneous voice-data traffic is present. In this algorithm voice users have always the highest ... -
A distributed energy-aware routing protocol for underwater wireless sensor networks
(2011-04-01)
Article
Restricted access - publisher's policyThe design of routing protocols for Underwater Wireless Sensor Networks (UWSNs) poses many challenges due to the intrinsic properties of underwater environments. In this paper we present DUCS (Distributed Underwater ... -
A dynamic multimetric weights distribution in a multipath routing protocol using video-streaming services over MANETs
(2015)
Conference report
Restricted access - publisher's policyMobile ad hoc networks (MANETs) are infrastructureless networks formed by wireless mobile devices. Routing in MANETs is a process where the best path will be selected so that packets will be forwarded. When a MANET ... -
A MAC protocol for reliable broadcast communications in wireless network-on-chip
(Association for Computing Machinery (ACM), 2016)
Conference report
Restricted access - publisher's policyThe Wireless Network-on-Chip (WNoC) paradigm holds considerable promise for the implementation of fast and efficient on-chip networks in manycore chips. Among other advantages, wireless communications provide natural ... -
A machine learning-based approach for virtual network function modeling
(Institute of Electrical and Electronics Engineers (IEEE), 2018)
Conference report
Restricted access - publisher's policyRecent trends in networking are proposing the use of Machine Learning (ML) techniques for the control and operation of the network. The application of ML to networking brings several use-cases as well as challenges. The ... -
A model for the mobile market based on customers profile to analyze the churning process
(Springer, 2016-08-04)
Article
Open AccessIn the current telecommunications market that is reaching high saturation levels, mobile network operators (MNOs) try to position themselves among customers through aggressive marketing campaigns and offers. In this ... -
A multi-armed bandit model for wireless network selection
(Universitat Politècnica de Catalunya, 2021-07-06)
Bachelor thesis
Open AccessThe number of networks and technologies such as 5G have been rapidly increasing in the last years. With this growth in number it has become more relevant to be able to select the best network with the goal of maximizing ... -
A near-optimum cross-layered distributed queuing protocol for wireless LAN: medium access control protocols for wireless LANs
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2008-02)
Article
Open AccessDistributed Queuing Collision Avoidance (DQCA) is a distributed MAC protocol for WLAN systems that offers near optimum performance. The protocol implements a reservation scheme that ensures collision-free data transmissions ... -
A new auto-provisioned squat-based traffic management strategy for multiclass networks
(2009)
Conference report
Open AccessIn search of being able to offer better quality of service (QoS) in multiclass networks, a strategy that aims to allow resources between different classes of service (CoS) to be shared according to the class’s needs and ... -
A new MAC approach in wireless body sensor networks for health care
(INTECH, 2011-02)
Part of book or chapter of book
Open Access -
A new medium access protocol based on distributed queues for a CDMA environment
(Institute of Electrical and Electronics Engineers (IEEE), 1999)
Conference report
Restricted access - publisher's policyThis paper presents and analyses a new stable near-optimum random access protocol. The proposed access scheme is adapted for being used in a CDMA environment. It is based on distributed queues and a collision resolution ... -
A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs
(2015-07-05)
Article
Open AccessThe proliferation of IEEE 802.11 networks has made them an easy and attractive target for malicious devices/adversaries which intend to misuse the available network. In this paper, we introduce a novel malicious entity ... -
A novel MAC protocol for dynamic ad hoc wireless networks with dynamic self-configurable master-slave architecture
(Suvisoft IEEE catalog number 04TH8754C, 2004)
Conference lecture
Restricted access - publisher's policyThis paper proposes and analyses a novel MAC protocol for wireless ad hoc networks that makes use of distributed queues to achieve an efficient use of the radio channel. The protocol includes a dynamic self-configurable ... -
A novel power efficient location-based cooperative routing with transmission power-upper-limit for wireless sensor networks
(2013-05-15)
Article
Open AccessThe extensive usage of wireless sensor networks (WSNs) has led to the development of many power- and energy-efficient routing protocols. Cooperative routing in WSNs can improve performance in these types of networks. In ...