Protocol Architecture

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 70902 Experts worldwide ranked by ideXlab platform

Ramon Agusti - One of the best experts on this subject based on the ideXlab platform.

  • On 5G Radio Access Network Slicing: Radio Interface Protocol Features and Configuration
    IEEE Communications Magazine, 2018
    Co-Authors: Ramon Ferrus, Jordi Perez Romero, Oriol Sallent, Ramon Agusti
    Abstract:

    Network slicing is a fundamental capability for future Fifth Generation (5G) networks to facilitate the cost-effective deployment and operation of multiple logical networks over a common physical network infrastructure in a way that each logical network (i.e. network slice) can be customized and dimensioned to best serve the needs of specific applications (e.g. mobile broadband, smart city, connected car, public safety, fixed wireless access) and users (e.g. general public, enterprise customers, virtual operators, content providers). The practical realization of such capability still raises numerous technical challenges, both in the Core and RAN parts of the 5G system. Through a comprehensive analysis of the impact that the realization of RAN slicing has on the different layers of the radio interface Protocol Architecture, this article proposes a framework for the support and specification of RAN slices based on the definition of a set of configuration descriptors that characterize the features, policies and resources to be put in place across the radio Protocol layers of a next-generation RAN node.

Ali H Sayed - One of the best experts on this subject based on the ideXlab platform.

  • reaca an efficient Protocol Architecture for large scale sensor networks
    IEEE Transactions on Wireless Communications, 2007
    Co-Authors: Zhi Quan, A Subramanian, Ali H Sayed
    Abstract:

    The emergence of wireless sensor networks has imposed many challenges on network design such as severe energy constraints, limited bandwidth and computing capabilities. This kind of networks necessitates network Protocol Architectures that are robust, energy-efficient, scalable, and easy for deployment. This paper proposes a robust energy-aware clustering Architecture (REACA) for large-scale wireless sensor networks. We analyze the performance of the REACA network in terms of quality-of-service, asymptotic throughput capacity, and power consumption. In particular, we study how the throughput capacity scales with the number of nodes and the number of clusters. We show that by exploiting traffic locality, clustering can achieve performance improvement both in capacity and in power consumption over general-purpose ad hoc networks. We also explore the fundamental trade-off between throughput capacity and power consumption for single-hop and multi-hop routing schemes in cluster-based networks. The Protocol Architecture and performance analysis developed in this paper provide useful insights for practical design and deployment of large-scale wireless sensor network.

Ramon Ferrus - One of the best experts on this subject based on the ideXlab platform.

  • On 5G Radio Access Network Slicing: Radio Interface Protocol Features and Configuration
    IEEE Communications Magazine, 2018
    Co-Authors: Ramon Ferrus, Jordi Perez Romero, Oriol Sallent, Ramon Agusti
    Abstract:

    Network slicing is a fundamental capability for future Fifth Generation (5G) networks to facilitate the cost-effective deployment and operation of multiple logical networks over a common physical network infrastructure in a way that each logical network (i.e. network slice) can be customized and dimensioned to best serve the needs of specific applications (e.g. mobile broadband, smart city, connected car, public safety, fixed wireless access) and users (e.g. general public, enterprise customers, virtual operators, content providers). The practical realization of such capability still raises numerous technical challenges, both in the Core and RAN parts of the 5G system. Through a comprehensive analysis of the impact that the realization of RAN slicing has on the different layers of the radio interface Protocol Architecture, this article proposes a framework for the support and specification of RAN slices based on the definition of a set of configuration descriptors that characterize the features, policies and resources to be put in place across the radio Protocol layers of a next-generation RAN node.

Hari Balakrishnan - One of the best experts on this subject based on the ideXlab platform.

  • an application specific Protocol Architecture for wireless microsensor networks
    IEEE Transactions on Wireless Communications, 2002
    Co-Authors: Wendi Heinzelman, Anantha P Chandrakasan, Hari Balakrishnan
    Abstract:

    Networking together hundreds or thousands of cheap microsensor nodes allows users to accurately monitor a remote environment by intelligently combining the data from the individual nodes. These networks require robust wireless communication Protocols that are energy efficient and provide low latency. We develop and analyze low-energy adaptive clustering hierarchy (LEACH), a Protocol Architecture for microsensor networks that combines the ideas of energy-efficient cluster-based routing and media access together with application-specific data aggregation to achieve good performance in terms of system lifetime, latency, and application-perceived quality. LEACH includes a new, distributed cluster formation technique that enables self-organization of large numbers of nodes, algorithms for adapting clusters and rotating cluster head positions to evenly distribute the energy load among all the nodes, and techniques to enable distributed signal processing to save communication resources. Our results show that LEACH can improve system lifetime by an order of magnitude compared with general-purpose multihop approaches.

  • application specific Protocol Architectures for wireless networks
    2000
    Co-Authors: Wendi Heinzelman, Anantha P Chandrakasan, Hari Balakrishnan
    Abstract:

    In recent years, advances in energy-efficient design and wireless technologies have enabled exciting new applications for wireless devices. These applications span a wide range, including real-time and streaming video and audio delivery, remote monitoring using networked microsensors, personal medical monitoring, and home networking of everyday appliances. While these applications require high performance from the network, they suffer from resource constraints that do not appear in more traditional wired computing environments. In particular, wireless spectrum is scarce, often limiting the bandwidth available to applications and making the channel error-prone, and the nodes are battery-operated, often limiting available energy. My thesis is that this harsh environment with severe resource constraints requires an application-specific Protocol Architecture, rather than the traditional layered approach, to obtain the best possible performance. This dissertation supports this claim using detailed case studies on microsensor networks and wireless video delivery. The first study develops LEACH (Low-Energy Adaptive Clustering Hierarchy), an Architecture for remote microsensor networks that combines the ideas of energy-efficient cluster-based routing and media access together with application-specific data aggregation to achieve good performance in terms of system lifetime, latency, and application-perceived quality. This approach improves system lifetime by an order of magnitude compared to general-purpose approaches when the node energy is limited. The second study develops an unequal error protection scheme for MPEG-4 compressed video delivery that adapts the level of protection applied to portions of a packet to the degree of importance of the corresponding bits. This approach obtains better application-perceived performance than current approaches for the same amount of transmission bandwidth. These two systems show that application-specific Protocol Architectures achieve the energy and latency efficiency and error robustness needed for wireless networks. (Copies available exclusively from MIT Libraries, Rm. 14-0551, Cambridge, MA 02139-4307. Ph. 617-253-5668; Fax 617-253-1690.)

Lajos Hanzo - One of the best experts on this subject based on the ideXlab platform.

  • a survey on wireless security technical challenges recent advances and future trends
    Proceedings of the IEEE, 2016
    Co-Authors: Yulong Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
    Abstract:

    Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network Protocol Architecture, where the potential security threats are discussed at each Protocol layer. We also provide a survey of the existing security Protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

  • a survey on wireless security technical challenges recent advances and future trends
    arXiv: Information Theory, 2016
    Co-Authors: Xianbin Wang, Lajos Hanzo
    Abstract:

    Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network Protocol Architecture, where the potential security threats are discussed at each Protocol layer. We also provide a survey of the existing security Protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

  • a survey on wireless security technical challenges recent advances and future trends
    arXiv: Information Theory, 2015
    Co-Authors: Yulong Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
    Abstract:

    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network Protocol Architecture, where the potential security threats are discussed at each Protocol layer. We also provide a survey of the existing security Protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.