首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
The wireless sensor networks (Wsn) are a novel technology that has appeared after great advancements in the development of intelligent sensors, powerful microprocessors, and communication protocols, their basic components. This kind of network is composed by hundreds to thousands of elements and has the objective of data collecting, processing, and disseminating to a point of interest. The network elements, named sensors nodes, have small dimensions and resource restrictions, especially the energy, the processing, and the communication capacities. It is expected that theWsn are intelligent, autonomic, and context aware. To reach such an objective, they are supposed to perform the management of themselves, i.e., be self-managed. In this article, we propose a management solution for such a sort of network, based on the autonomic computing paradigm. In order to show that self-management can improve the productivity of the network and control the quality of the provided services, we present a case study of a heterogeneous and hierarchicWsn that collects and disseminates data continuously.  相似文献   

2.
Wireless sensor networks (Wsns) tend to be highly optimized due to severely restricted constraints. Various medium access control (Mac) protocols forWsns have been proposed, being specially tailored to a target application. This paper proposes a taxonomy for the different mechanisms employed in those protocols. The taxonomy characterizes the protocols according to the methods implemented to handle energy consumption, quality of service and adaptability requirements. We also present an overview of the transceptors found inWsns, identifying how events on communication affect the energy consumption. Based on the taxonomy, we classify existingMac protocols. Finally, we discuss challenging trends inMac protocols forWsns, such as security issues and software radios.  相似文献   

3.
Several sensitive applications deployed within wireless networks require group communications. A high level of security is often required in such applications, like military or public security applications. The most suitable solution to ensure security in these services is the deployment of a group key management protocol, adapted to the characteristics ofManets, especially to mobility of nodes. In this paper, we present theOmct (Optimized Multicast Cluster Tree) algorithm for dynamic clustering of multicast group, that takes into account both nodes localization and mobility, and optimizes the energy and bandwidth consumptions. Then, we show how we integrateOmct within our group key management protocolBalade, in a sequential multi-source model. The integration ofBalade andOmct allows an efficient and fast key distribution process, validated through simulations, by applying various models of mobility (individual mobility and group mobility). The impact of the mobility model on the performance and the behaviour of the group key management protocolBalade coupled withOmct, is also evaluated.  相似文献   

4.
This paper presents an overview of the facilities that should be provided by theAtm layer and the adaptation layer (Aal) in order to support multimedia communications. From the analysis of data flows generated by well known multimedia applications and the services that could be offered byAtm networks both in the public and the private domain, we propose solutions enabling the availability of such applications onAtm networks taking into account both economical andQos parameters.  相似文献   

5.
We study the effect of Explicit Congestion Notification (ecn) ontcp for relatively large but finite file transfers inip networks, and compare it to other congestion avoidance mechanisms, namely Drop Tail (dt) and Random Early Detection (red). We use simulation to measuretcp performance for transfers initiated by a varying number of end hosts. In contrast to previous work, we focus on situations in which all nodes in the network operate uniformly under the same mechanism (dt orred orecn). Our results show that under such uniform conditionsecn does not necessarily lead to significant improvement intcp goodput, although in no case does it lead to an actual degradation in performance. Our results also show that, withecn, tcp flows benefit from lower overhead for unsuccessful transmissions. Furthermore, lockouts are largely avoided. In other words, in an all-ecn network resources are shared more fairly. Finally, we show that global synchronization is no longer an issue, and argue that currenttcp versions have essentially solved the problem, regardless of the queue management scheme employed.  相似文献   

6.
Bit rate announced for the future standards of telecommunication, as well as the level of integration reached are, as many factors, determining for the establishment of new applications in mobile terminals. Nowadays, mobile video streaming services are possible. Mobile users expect to receive multimedia traffic with some performance guarantees, so we must ensure the necessary quality of service during the video transmission. This paper aims at investigating quality of service issue inUmts network. More specifically, we explore the main challenge of quality of service management to dynamically optimize the distribution of load inUmts networks. Our investigation is organized in the following way. We formalize the optimization problem which is based on the graph theory and modellingUmts network as well as mobile users and applications to be used. The simulation of our optimization model show a clear improvement of the quality of service perceived by anUmts user in terms of bit rate, blocking and connection drop.  相似文献   

7.
This paper introduces a new environment for developing distributed systems. It is based on theTurtle uml profile. Analysis and design phases, described in previous papers, have been extended with an additional deployment phase. In this new step,Turtle components are deployed over hardware execution nodes, and nodes are connected together throughout links,Turtle deployment diagrams are given a formal semantics inRt-lotos, therefore following the approach used forTurtle analysis and design diagrams. Moreover, the paper presents a Java code generator which outputs appropriate Java code forTurtle deployment diagrams. This code is automatically deployable on networks because it implements node communication using network protocols such asUdp orRmi. ttool, the turtle toolkit has been extended to support these new diagrams and code generators. The attack of protected data exchanged throughout securedHttp sessions serves as example.  相似文献   

8.
Recent years have seen dramatic increases of the use of multimedia applications on the Internet, which typically either lack congestion control or use proprietary congestion control mechanisms. This can easily cause congestion collapse or compatibility problems. Datagram Congestion Control Protocol (Dccp) fills the gap betweenUdp andTcp, featuring congestion control rather than reliability for packet-switched rich content delivery with high degree of flexibility. We present aDccp model designed and implemented withOpnet Modeler, and the experiments and evaluation focused on largely the smoothness of the data rates, and the fairness between concurrentDccp flows andTcp flows. We foundDccp-ccid3 demonstrates stable data rates under different scenarios, and the fairness betweenDccp andTcp is only achieved under certain conditions. We also validated that the throughput ofDccp-Ccid3 is proportional to the average packet size, and relatively fixed packet size is critical for the optimal operation ofDccp. Problems in the slow start phase and insufficient receiver buffer size were identified and we hereby proposed solutions on this.  相似文献   

9.
This paper presents some results of a study concerning the radio propagation at 60GHZ in residential environments performed by theIETR (Electronic and Telecommunication Institute of Rennes, France). This study is part of aRNTR project named “COMMINDOR”. This exploratory project concerns the very high data rate (155 Mbit/s) and small range (about 10 m) radio communication systems for future home networks, which will permit multimedia equipment interconnection and control. The study is based on several measurement campaigns realized with a channel sounder based on the sliding correlation technique. This channel sounder has a 500MhZ bandwidth and a 2.3 ns effective time resolution. The measurements have been performed in residential furnished environments. The study of the angles-of-arrival (AOA) emphases the importance of openings (such as doors, staircase, etc.) for the radio propagation between adjacent rooms. A particular attention is paid to the influence of human activity on radio propagation. It is shown that people movements can make the propagation channel unavailable during about one second. From the characterization study of the indoor radio propagation, several recommendations concerning the deployment of the very high data rate 60GHZ wireless networks are derived.  相似文献   

10.
In this paper we study some turbo receiver architectures employing low-density parity check (Ldpc) codes together with orthogonal frequency division multiplexing (Ofdm) for high data rate wireless transmissions. Different demodulation schemes based on expectation-maximization (Em) algorithm are studied along with the channel impulse response (Em) algorithms. We studied differentCir guessing algorithms including the EM-based algorithms such as a space-alternating generalized expectation-maximization algorithm (Sage). It is shown that the proposed turbo-Em receiver employing a soft maximum a posteriori (Map)Em demodulator and a belief propagationLdpc decoder can perform within 1 dB from the ergodic capacity of the studiedMimo ofdm channels. Besides, we find that a suboptimum structure based on a soft interference cancellationMmse filtering demodulator exhibits negligible loss in non-correlated fadingMimo channels but suffer extra performance loss in highly correlatedMimo channels.  相似文献   

11.
G. Jennes  G. Leduc  M. Tufail 《电信纪事》2002,57(1-2):83-104
We propose a new delay-based scheduler called asRD-VC (Relative Delay VirtualClock). Since it performs a delay-based service differentiation among flow aggregates, the quality at microflow level is the same as that at aggregate level. This is not easily achievable when the service differentiation is bandwidth-based or loss-based. Unlike theEDF (Earliest Deadline First) scheduler [1], our proposed scheduler self-regulates and adapts the delays according to load changes. This characteristic permits us to implement it in an AF-likePHB providing the relative quantification service in a DiffServ network. Finally, we compare our proposedrd-vc scheduler with two important existing propositions:WTP (Waiting Time Priority) [2, 3] andex-vc (Extended VirtualClock) [4]. Both these propositions are delay-based and have self-regulation property. All three schedulers (RD-VC, WTP andEX-VC) maintain the required service differentiation among aggregates and have comparable long term average performance like mean throughput per aggregate and packet loss ratio etc. However,RD-VC and WTP take an edge overEX-VC at short-term performance like jitter. Bothrd-vc andWTP have good long term and short-term performance. Our proposedrd-vc, compared to existingWTP, has two additional characteristics, i.e. unlike WTP which is limited to architectures with one queue per Qos class, it has no limitation on implementation scope (with or without separate queues per class) and it has lower complexity. This rendersRD-VC an interesting proposition.  相似文献   

12.
We address the problem of detecting a rogue base station (Bs) in WiMax/802.16 wireless access networks. A rogueBs is a malicious station that impersonates a legitimate access point (Ap). The rogueBs attack represents a major denial-of-service threat against wireless networks. Our approach is based on the observation that inconsistencies in the signal strength reports received by the mobile stations (Mss) can be seen if a rogueBs is present in a network. These reports can be assessed by the legitimate base stations, for instance, when a mobile station undertakes a handover towards anotherBs. Novel algorithms for detecting violations of received signal strength reports consistency are described in this paper. These algorithms can be used by an intrusion detection system localized on the legitimateBss or on a global network management system operating theBss.  相似文献   

13.
Optical communication in Space is now a reality. In this paper we present the recent developments that were undertaken in Europe for this application. We first describe the different missions where optical communications are useful: link between two geostationary satellites (geo-geo), Data Relay Mission (leo-geo) and High Data Rate Satellite Constellation Network. Then we detail the different candidate laser technologies from the most straightforward technologies that have been developed for optical fiber applications (λ=1.55 µm) and 0.8 µm technology based on Silicon detector to the recent developments based on high power fiber amplifiers. In the last chapter we describe thesilex (Semi conductor Intersatellite Link Experiment) program which performs optical communication betweenspot4 Earth observation satellite (cnes) andartemis (esa). The excellent results based on 0.8 µm laser diode technology are considered to be a major milestone in optical intersatellite communication  相似文献   

14.
Wireless Local Area Networks technologies have known an important technological and commercial development. Multiplicity of standards and variety of domains of use make necessary to compose with different technologies that can be seen either as concurrent or complementary. In this article, after positioning the different types of wireless networks (IEEE 802.11, HomeRF,HIPERLAN/2, Bluetooth) for mass market and professional applications destination, some generalities are briefly reminded such as centralised and ad-hoc architectures, regulatory constraints in the 2.45 and 5GHZ frequency bands used forWLAN, typical ranges, mobility and security features and limitations. Then the differentIEEE (802.11, 802.11a et 802.11b) andETSI (HIPERLAN/2) standards are described in details as well as their foreseen evolutions. It appears that 802.11 family of standards would take benefit of the currently existing products to evolve smoothly while integrating new features (broadband 802.11a physical layer, necessary radio features to meet European regulatory requirements, future introduction of Quality of Service schemes…). In the meantime,HIPERLAN/2 which has been specified as a complete system already supports most of those important features and is able to be adapted to various kinds of higher network layers. Lastly, it is shown that interworking schemes between 3G cellular systems andWLAN currently under investigations in 3GPP andETSI BRAN should permit in the future to easily operate wide area and multi-access technology based mobile networks.  相似文献   

15.
Quality of Service (QoS) has become a very important issue in networking, covering many performance aspects and numerous measures. The deployment of next generation wireless system includes 2.5G General Packet Radio Service (Gprs), which is the packet-switched extension of the Global System for Mobile communications (Gsm), and Third-Generation (3G) Universal Mobile Telecommunications System (Umts) to meet the needs of larger capacity and higher bit rates. AnUmts packet core network is an IP-based network. The Internet Engineering Task Force (Ietf) Forum developed several IP QoS related mechanisms available for IP transport networks. Service Quality Management (Sqm), one component of Telecommunication Management Network (Tun), will enable providers to manage QoS against objectives set out in customer Service Level Agreements (Slas) and will enable customers to compare the service offerings of different service providers.  相似文献   

16.
Performance evaluation of tcp traffic in obs networks has been under intensive study, since tcp constitutes the majority of Internet traffic. As a reliable and publicly available simulator, ns2 has been widely used for studying tcp/ip networks; however ns2 lacks many of the components for simulating optical burst switching networks. In this paper, an ns2 based obs simulation tool (nobs), which is built for studying burst assembly, scheduling and contention resolution algorithms in obs networks is presented. The node and link objects in obs are extended in nobs for developing optical nodes and optical links. The ingress, core and egress node functionalities are combined into a common optical node architecture, which comprises agents responsible for burstification, routing and scheduling. The effects of burstification parameters, e.g., burstification timeout, burst size and number of burstification buffers per egress node, on tcp performance are investigated using nobs for different tcp versions and different network topologies.  相似文献   

17.
18.
This article sets forth the main findings of an empirical study carried out among the main actors in the sector of large-scale retailing in Europe, as regards their respective practical experience incrm (Customer Relationship Management) as well as the opportunities offered by the Internet technologies in this field. The evidence collected is checked against the problems expounded in the literature hinging on the following four main questions:
  • —the existence of national orientations that are taking shape in terms of the uses ofcrm
  • —the reality of the training processes of companies leading to e-crm as well as the acquisition of the technical and organisational maturity necessary to master these tools
  • —the variety of those uses and the issue of multichannelling
  • —the relative benefits of market relationship linked to the development ofcrm procedures
  • Thus this study offers an overview of emerging trends incrm peculiar to this sector.  相似文献   

    19.
    Ant colony optimization (Aco) has been proposed as a promising tool for adaptive routing in telecommunications networks. The algorithm is applied here to a simulation of a satellite telecommunications network with 72Leo nodes and 121 earth stations. Three variants ofAco are tested in order to assess the relative importance of the different components of the algorithm. The bestAco variant consistently gives performance superior to that obtained with a standard link state algorithm (Spf), under a variety of traffic conditions, and at negligible cost in terms of routing bandwidth.  相似文献   

    20.
    Electronic commerce (ec) is a combination of practices, strategies, processes, applications and technologies, enabling business transactions. This paper focuses on software and technologies forec. In the first part, the different categories of applications forec are reviewed. A fully integrated solution does not seem to be the major trend. However, the “best of breed” approach implies an integration problem. The second part of the paper includes modeling languages andec applications core technologies. Theuml appears to be used at different levels in the development of anec solution. Web technologies are continually evolving:XML could be the language of the future for information exchanges between heterogeneous applications. The third part deals with component and application integration. In spite of converging standards for languages as well as for models, system interoperability is a major problem, when informations are to be shared and processes to be jointed. Two major trends can be identified: Web services andEDI approaches.  相似文献   

    设为首页 | 免责声明 | 关于勤云 | 加入收藏

    Copyright©北京勤云科技发展有限公司  京ICP备09084417号