摘要:
Internet of Things (IoT) devices (101A) continuously capture raw data over a regular interval of time. The captured raw data is transmitted to gateway devices (101B) deployed in an environment, for example, a warehouse. Continuous transmission of such data leads to data redundancy, continuous channel utilization and bandwidth usage, etc. To overcome this problem, present disclosure implements a Compressive Sensing based Data Prediction (CS-DP) model that predicts data at the gateway devices by learning the data pattern received from IoT devices, estimates and computes, using a Compressive Sensing based Data Estimation (CS-DE) model, optimal data instead of considering the overall data captured at the gateway devices and reconstructs, using a Compressive Sensing based Data Reconstruction (CS-DR) model, missing data and/or corrupted data using the partial information received at the gateway devices.
摘要:
Conventional protocols for live media streaming are not lightweight and hence not suitable for constrained video transmitting devices. The protocols are poor in terms of delay performance under lossy conditions and need to maintain a lot of states at the constrained transmitting end leading to load on the memory and draining energy of the devices. The conventionally used protocols do not perform well for intermittent connectivity. Usually the existing streaming solutions act either in completely reliable manner, using reliable transport protocol like TCP, or in completely unreliable manner using best effort unreliable transport protocol like UDP. The present disclosure provides a single streaming solution which can change the protocol semantics and maintains a balance between reliability and delay-performance, thereby optimizing the overall system goodput. The protocol does this intelligently by inferring the criticality of the segment in flight and enable live video streaming for Internet of Things (IoT).
摘要:
The present application provides a method and system for sharing of unlicensed spectrum. The disclosed method and system when implement improves the spectral efficiency of LTE users and also improves the overall performance of LAA and Wi-Fi users. A BS senses the channel for any ongoing transmissions for a CCA period which is equal to DIFS time period of Wi-Fi. If the channel is busy (CCA-busy), it enters into back-off stage by selecting a uniform random number from [0, C0−1] as the back-off counter, where C0 is the fixed congestion window size. If the channel is free for a CCA period (CCA-idle), the back-off counter gets decremented by unity until it reaches zero. Once the back-off counter reaches zero, LAA again senses and schedules its down-link transmissions for a maximum channel occupancy period, provided the channel is free.
摘要:
Fifth generation and beyond (5G+) systems are expected to adopt new network architectures, services, and deployment schemes for compatibility with the latest technologies and end user's needs. With increase in user equipment (UE), also come variety of advanced applications and use-cases, wherein each application type has its own KPI requirements. Existing resource allocation schemes in cellular networks are not able to handle such dynamic requirements due to which network slice can lead to unwanted mismanagement of resources. Present application provides systems and methods for application-aware dynamic slicing in radio access network (RAN), wherein RAN slicing is proactively managed by learning historical slice demands and consumptions. Once slices are created, the system allocates resources to user equipment by following optimal inter-slice and intra-slice mechanisms based on application type(s), traffic demand(s) and wireless characteristics of UE. Upon resource allocation the UE are further monitored to avoid resource misutilization and resource wastage.
摘要:
The present application provides a method and system for optimal caching of content in the Information Centric Networks (ICN) and a cache replacement based on a content metric value. The method and system comprises requesting for a plurality of content by a user to a nearest local or edge ICN cache router; delivering by the local or edge ICN cache router the requested plurality of content to the user if it is available in its cache; else forwarding the request for the plurality of content to any of intermediate ICN cache router for finding source of the requested plurality of content; downloading the plurality of content in its downstream path; and storing the downloaded plurality of content based on a content metric value derived by a content metric system (CMS) based on a plurality of network parameters for the requested plurality of content.
摘要:
Methods and systems for providing requested content to a user device in an Overlay Information Centric Network (O-ICN) architecture are disclosed herein. The method may include receiving a request for accessing content, from the user device. The request is routed to the ICN manager from an ICN router. The method may also include parsing the request to determine whether the request is an ICN based request. The ICN-based request is associated with a flag. Further, the method includes based on the determination, identifying at least one network entity hosting the requested content. The identification is based on a name of the content. The method also includes sending a notification to the at least one identified network entity for providing the requested content to the user device.
摘要:
In order to make use of computational resources available at runtime through fog networked robotics paradigm, it is critical to estimate average performance capacities of deployment hardware that is generally heterogeneous. It is also not feasible to replicate runtime deployment framework, collected sensor data and realistic offloading conditions for robotic environments. In accordance with an embodiment of the present disclosure, computational algorithms are dynamically profiled on a development testbed, combined with benchmarking techniques to estimate compute times over the deployment hardware. Estimation in accordance with the present disclosure is based both on Gustafson's law as well as embedded processor benchmarks. Systems and methods of the present disclosure realistically capture parallel processing, cache capacities and differing processing times across hardware.
摘要:
A method and system is provided for device-to-device (D2D) offloading in long term evolution (LTE) networks. The present application provides a method and system for device-to-device (D2D) offloading in long term evolution (LTE) networks, comprising processor implemented steps of selecting an offloader by a eNodeB (eNB) for a user device out of a plurality of user devices based on location of the user device and other closed proximity user devices, corresponding load and channel conditions upon receiving the offloading request from the user device; exchanging a control messages between the user device and the eNB; and between the eNB and the offloader; and scheduling of resource blocks (RBs) by the eNB for the user device and the offloader in D2D offloading.
摘要:
A technique for estimating cache size for cache routers in information centric networks (ICNs) is disclosed. In an example, an average rate of incoming requests and a probability of occurrence of each request at a cache router in a predefined time interval is determined. Further, a relation between cache hit and cache miss with and without replacement is derived based on the probability of occurrence of each request. Furthermore, an entropy of the requests is computed based on the probability of occurrence of each request. Moreover, a diversity index of the requests is calculated based on the entropy and the average rate of the requests. A cache size for the cache router is then estimated based on a user defined probability of cache hit, the average rate of the requests, the diversity index of the requests and the relation between the cache hit and cache miss with and without replacement.
摘要:
A system and method for enhancing lifetime and throughput in a distributed wireless network is disclosed herein. The method may include sensing, by a first machine, different parameters of at least one neighboring machine; updating, by the first machine, at least one parameter of said first machine based on said sensed parameters of said neighboring machine; generating, by the first machine, a signed-graph on the basis of the updated parameter, wherein said generated graph comprises at least two nodes representing said updated parameter and at least one edge interconnecting said two nodes; iteratively updating, by the first machine, the at least one parameter at different time-scales until convergence is achieved; and communicating, by the first machine, inter-layer updates in individual layers of a transmission protocol stack of the first machine due to said update of at least one parameter.