Learn More
—The 4G standard Long Term Evolution (LTE) has been developed for high-bandwidth mobile access for today's data-heavy applications, consequently, a better experience for the end user. To extend the user equipment battery lifetime, plus further support various services and large amount of data transmissions, the 3GPP standards for LTE/LTE-Advanced has(More)
©2014 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Abstract— The 4G(More)
One of the limitations of wireless sensor nodes is their inherent limited energy resource. Besides maximizing the lifetime of the sensor node, it is preferable to distribute the energy dissipated throughout the wireless sensor network in order to minimize maintenance and maximize overall system performance. Any communication protocol that involves(More)
One of the limitations of wireless sensor nodes is their inherent limited energy resource. Besides maximizing the lifetime of the sensor node, it is preferable to distribute the energy dissipated throughout the wireless sensor network in order to minimize maintenance and maximize overall system performance. Any communication protocol that involves(More)
(TTI) is related to the size of the data block passed from the higher networks layers to the radio link layer, the DRX scheduler should vary the resource allocation of each user basis on TTI. In this paper, we have evaluated the influences of the TTI sizes as well as the effects of LTE DRX Light and Deep Sleep mode on power consumption for Voice and Web(More)
Traditional security research has been on privacy or authentication. Unfortunately, attacks on wireless media cannot be simply addressed using traditional security methods [1]. An example of a security threat which is difficult to address using traditional network security techniques is Denial of Service (DoS) attacks. Under DoS attacks it is difficult to(More)
The ubiquitous access to wired and wireless networks is making information access possible from anywhere, anytime, and any device. Today, end-users are also highly mobile, often equipped with a range of portable devices, and they expect service availability when they require it. In addition, they do not want to be burdened by complex configurations before(More)
Wireless Mesh Networks (WMNs) have emerged as a key technology for the next generation of wireless networking. Instead of being another type of ad-hoc networking, WMNs diversify the capabilities of ad-hoc networks. Several protocols that work over WMNs include IEEE 802.11a/b/g, 802.15, 802.16 and LTE-Advanced. To bring about a high throughput under varying(More)
As smartphone clients are restricted in computational power and bandwidth it is important to minimise the overhead of transmitted messages. This paper identifies and studies methods that reduce the amount of data being transferred via wireless links between a Web service client and a Web service. The goal is to improve the end-to-end service execution time(More)