371 research outputs found

    Practical Power and Rate Control for WiFi

    Get PDF
    While there has been extensive theoretical work on sophisticated joint resource allocation algorithms for wireless networks, their applicability to WiFi (IEEE 802.11) networks is very limited. One of the main reasons is the limitations in changing MAC parameters in current driver implementations. To this end, in this work, we developed a general cross-layer communication interface in the Linux kernel between the IEEE 802.11 PHY and MAC to enable per packet TPC. Based on this implementation, we realize an decentralized rate-power controller (Minstrel-Piano). Our initial evaluation shows that Minstrel-Piano is able to significantly decrease the power levels while maintaining the same link performance. These results are encouraging for a better interference management and consequently, better resource allocation in WiFi networks

    An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)

    Get PDF
    The recent innovations in network application and the internet have made data and network security the major role in data communication system development. Cryptography is one of the outstanding and powerful tools for ensuring data and network security. In cryptography, randomization of encrypted data increases the security level as well as the Computational Complexity of cryptographic algorithms involved. This research study provides encryption algorithms that bring confidentiality and integrity based on two algorithms. The encryption algorithms include a well-known RSA algorithm (1024 key length) with an enhanced bit insertion algorithm to enhance the security of RSA against different attacks. The security classical RSA has depreciated irrespective of the size of the key length due to the development in computing technology and hacking system. Due to these lapses, we have tried to improve on the contribution of the paper by enhancing the security of RSA against different attacks and also increasing diffusion degree without increasing the key length. The security analysis of the study was compared with classical RSA of 1024 key length using mathematical evaluation proofs, the experimental results generated were compared with classical RSA of 1024 key length using avalanche effect in (%) and computational complexity as performance evaluation metrics. The results show that RBMRSA is better than classical RSA in terms of security but at the cost of execution time.publishedVersio

    Self-optimization of coverage and capacity based on a fuzzy neural network with cooperative reinforcement learning

    Get PDF
    Self-organization is a key concept in long-term evolution (LTE) systems to reduce capital and operational expenditures (CAPEX and OPEX). Self-optimization of coverage and capacity, which allows the system to periodically and automatically adjust the key radio frequency (RF) parameters through intelligent algorithms, is one of the most important tasks in the context of self-organizing networks (SON). In this paper, we propose self-optimization of antenna tilt and power using a fuzzy neural network optimization based on reinforcement learning (RL-FNN). In our approach, a central control mechanism enables cooperation-based learning by allowing distributed SON entities to share their optimization experience, represented as the parameters of learning method. Specifically, SON entities use cooperative Q-learning and reinforced back-propagation method to acquire and adjust their optimization experience. To evaluate the coverage and capacity performance of RL-FNN, we analyze cell-edge performance and cell-center performance indicators jointly across neighboring cells and specifically consider the difference in load distribution in a given region. The simulation results show that RL-FNN performs significantly better than the best fixed configuration proposed in the literature. Furthermore, this is achieved with significantly lower energy consumption. Finally, since each self-optimization round completes in less than a minute, RL-FNN can meet the need of practical applications of self-optimization in a dynamic environment
    • …
    corecore