# IET Communications

## Filter Results

Displaying Results 1 - 18 of 18
• ### Transmission control protocol throughput optimisation in cooperative relaying networks through relay selection

Publication Year: 2011, Page(s):2257 - 2265
| | PDF (502 KB)

Cooperative relaying technology is considered as a promising solution for the high data-rate coverage required in future wireless communication systems, where provision of reliable multimedia or data services for transmission control protocol (TCP) applications is of extreme importance. However, while the performance of cooperative relaying protocols has been extensively studied over physical laye... View full abstract»

• ### Interference-aware joint user selection and quantised power control schemes for uplink cognitive multiple-input multiple-output system

Publication Year: 2011, Page(s):2266 - 2274
Cited by:  Papers (5)
| | PDF (610 KB)

The authors investigate the interference-aware joint secondary user (SU) selection/scheduling and quantised power control (JSUS-QPC) schemes for the uplink communication in the cognitive multiple-input multiple-output (MIMO) system. The main objective of JSUS-QPC is to maximise the sum-rate capacity of the cognitive MIMO uplink communication system under the constraint that the interference to the... View full abstract»

• ### Cross-layer combining of adaptive pilot-symbolassisted modulation with truncated automatic repeat request in the presence of imperfect channel state information at both the receiver and the transmitter

Publication Year: 2011, Page(s):2275 - 2284
| | PDF (874 KB)

In this study the authors provide an adaptive cross-layer design that maximises the spectral efficiency under prescribed quality of services (QoSs) such as error rate and delay. The considered scheme combines adaptive modulation at physical layer with a truncated automatic repeat request at data link layer in the presence of both channel estimation and prediction errors. Both the channel estimatio... View full abstract»

• ### Effect of pedestrian traffic on fade statistics of fixed wireless links in public spaces

Publication Year: 2011, Page(s):2285 - 2290
| | PDF (357 KB)

This study presents an empirical characterisation of the wireless channel observed by static users in settings that correspond to populated open public spaces, where wireless services are increasingly being deployed. Link stability is analysed in terms of the temporal K-factor of the Ricean distribution. Second-order statistics were parameterised in terms of the Doppler shift, coherence time and l... View full abstract»

• ### Link availability prediction-based reliable routing for mobile ad hoc networks

Publication Year: 2011, Page(s):2291 - 2300
Cited by:  Papers (9)
| | PDF (728 KB)

Mobile ad hoc networks (MANETs) are becoming increasingly important. The most challenging issue in conjunction with MANETs is reliable routing, that is, the procedure that determines the trajectory of packets travelling over the network. The authors present a novel link availability-based routing protocol (LBRP) for MANETs. Compared with other routing protocols, LBRP takes unpredictable topology c... View full abstract»

• ### Joint source and relay power allocation in amplify-and-forward relay networks: a unified geometric programming framework

Publication Year: 2011, Page(s):2301 - 2309
Cited by:  Papers (4)
| | PDF (561 KB)

This study presents some joint source and relay power allocation algorithms in the amplify-and-forward (AF) relay networks using the efficacious geometric programming (GP). According to the constraints, approximate expressions of the received signal-to-noise ratio are first obtained. Thereafter, the problems are cast into appropriate GP forms according to the constraints. The power allocated to th... View full abstract»

• ### Simple path diversity algorithm for interdomain routing

Publication Year: 2011, Page(s):2310 - 2316
| | PDF (405 KB)

The border gateway protocol (BGP) handles the task of establishing paths between autonomous systems (AS). As the BGP does not incorporate measures of round-trip time into the decision and does not provide path diversity for a destination, this study proposes a simple path diversity algorithm (SPDA) for interdomain routing. The SPDA comprises three steps. First, the BGP is extended to allow the BGP... View full abstract»

• ### Robust correction of repeating errors by non-linear codes

Publication Year: 2011, Page(s):2317 - 2327
Cited by:  Papers (1)
| | PDF (403 KB)

For many devices and circuits, even a single fault can result in errors of a large Hamming weight at the output of a device, complicating the task of error detection and correction. Traditional error detection and correction techniques are based on linear error-detecting codes that are designed to detect or correct errors of a small multiplicity or burst errors. The authors present codes and archi... View full abstract»

• ### Efficient resource allocation algorithm for uplink in multicarrier-based cognitive radio networks with fairness consideration

Publication Year: 2011, Page(s):2328 - 2338
Cited by:  Papers (3)
| | PDF (875 KB)

An efficient fairness-aware uplink resource allocation algorithm in orthogonal frequency-division multiplexing-based cognitive radio systems is presented. The proposed resource allocation algorithm is divided into two steps. The subcarriers to user assignment is first performed, and then the power is allocated to the different subcarriers. The objective is to maximise the total data rate while gua... View full abstract»

• ### Average capacity performance of opportunistic relay selection with outdated CSI

Publication Year: 2011, Page(s):2339 - 2344
Cited by:  Papers (7)
| | PDF (353 KB)

The authors investigate the effect of feedback delay on the average capacity of a decode-and-forward cooperative network with relay selection. In particular, a multi-relay cooperative scenario is considered, where the best relay is selected from a subset of relays that are able to decode the source information correctly. In this selection scenario, the authors assume that the destination terminal ... View full abstract»

• ### Chain routing: a new routing framework for the internet based on complete orders

Publication Year: 2011, Page(s):2345 - 2355
| | PDF (328 KB)

A new framework to perform routing at the autonomous system (AS) level is proposed here. This mechanism, called chain routing framework (CRF), uses complete orders as its main topological unit. Since complete orders are acyclic digraphs that possess a known topology, it is possible to use these acyclic structures to route consistently packets between a group of ASs. The adoption of complete orders... View full abstract»

• ### Simple algorithm for solving broadcast storm in mobile ad hoc network

Publication Year: 2011, Page(s):2356 - 2363
Cited by:  Papers (2)
| | PDF (583 KB)

In recent years, mobile ad hoc network (MANET) has gained a lot of attention because of its self-organising and infrastructure-free characteristics. Unlike the traditional wireless networks, each node in MANET can act as a router to receive and forward packets. All nodes can randomly move around, leave the network or switch off. Hence, broadcasting has been widely used in diffusing data, routing o... View full abstract»

• ### Euclidean distance soft-input soft-output decoding algorithm for low-density parity-check codes

Publication Year: 2011, Page(s):2364 - 2370
Cited by:  Papers (2)
| | PDF (270 KB)

A new antilog-sum algorithm for decoding error-correcting codes is described. The soft-input, soft-output (SISO) algorithm uses squared Euclidean distance as the metric, does not require knowledge of the signal-to-noise ratio of the received signal and is less complex to implement than other SISO algorithms. The results of simulations show that the performance is very close to that of the log-sum-... View full abstract»

• ### On unified quality of service resource allocation scheme with fair and scalable traffic management for multiclass internet services

Publication Year: 2011, Page(s):2371 - 2385
Cited by:  Papers (7)
| | PDF (1077 KB)

This study concerns the problem of controlling multiclass (elastic, inelastic and unresponsive) Internet traffic without sacrificing quality of service (QoS) by adopting a unified resource allocation and traffic management approach. The aim is to minimise the need for relying on dedicated QoS traffic control mechanisms in order to avoid spiralling complicatedness that, in practice, leads to `rob... View full abstract»

• ### Throughput maximisation in non-coherent cooperative networks

Publication Year: 2011, Page(s):2386 - 2396
Cited by:  Papers (4)
| | PDF (534 KB)

An incremental relaying protocol based on the adaptive decode-and-forward relaying scheme is presented for a cooperative wireless network with binary frequency-shift keying modulation. To reduce error propagation and satisfy bit-error-rate (BER) requirement, the proposed protocol employs two thresholds. One threshold is used to select reliable relays: if a relay is requested to re-transmit, it wil... View full abstract»

• ### Injection-level optimisation for digital television transmitter identification systems using Kasami sequences

Publication Year: 2011, Page(s):2397 - 2406
Cited by:  Papers (4)
| | PDF (385 KB)

The transmitter identification (TxID) of digital television (DTV) systems becomes crucial nowadays. TxID (or transmitter fingerprinting) technique is used to detect, diagnose and classify the operating status of any radio transmitter of interest. The TxID system is specified in Advanced Television System Committee (ATSC) A/110 standard where pseudorandom sequences are proposed to be embedded into ... View full abstract»

• ### Accurate packet error rate analysis of variable spreading gain-code division multiaccess and multicode-code division multiaccess wireless communication networks

Publication Year: 2011, Page(s):2407 - 2417
Cited by:  Papers (5)
| | PDF (595 KB)

This study presents a system-level theoretical analysis of two different types of multirate code division multiaccess (CDMA) wireless communication systems, which include both variable spreading gain (VSG) CDMA and multicode (MCD) CDMA systems. Based on the accurate interference models, the authors derive unified expressions of the cumulative density function of the signal-to-interference-plus-noi... View full abstract»

• ### Shared carrier vertical network transformation algorithm for constant bit rate service

Publication Year: 2011, Page(s):2418 - 2429
| | PDF (1095 KB)

At present, the fixed spectrum allocation is the accepted strategy employed by the wireless industry and regulators and a large number of spectrum resources have been wasted because of the traffic load variation in different heterogeneous wireless networks. Through the analysis of recent research about dynamic spectrum allocation (DSA), vertical handoff and multi-mode base stations, the authors ha... View full abstract»

## Aims & Scope

IET Communications covers the theory and practice of systems, networks and applications involving line, mobile radio, satellite and optical technologies for telecommunications, and Internet and multimedia communications.

Full Aims & Scope

## Meet Our Editors

IET Research Journals
iet_com@theiet.org