首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Design of 5.9 ghz dsrc-based vehicular safety communication   总被引:3,自引:0,他引:3  
The automotive industry is moving aggressively in the direction of advanced active safety. Dedicated short-range communication (DSRC) is a key enabling technology for the next generation of communication-based safety applications. One aspect of vehicular safety communication is the routine broadcast of messages among all equipped vehicles. Therefore, channel congestion control and broadcast performance improvement are of particular concern and need to be addressed in the overall protocol design. Furthermore, the explicit multichannel nature of DSRC necessitates a concurrent multichannel operational scheme for safety and non-safety applications. This article provides an overview of DSRC based vehicular safety communications and proposes a coherent set of protocols to address these requirements  相似文献   

2.
Safety message broadcasting may cause a broadcast storm in vehicular ad-hoc network without an effective feedback mechanism. In particular, with increasing number of vehicles, serious collisions and incurred long delays are not acceptable for emergency safety messages. In this paper, we proposed an advanced broadcast scheme by the functionality of distributed coordination function and multi-channel operation in dedicated short range communication to decrease collision probability and increase received ratio of safety messages. The proposed scheme can increases safety message transmission efficiency and reduce the latency by delicately designing a rebroadcast probability, choosing the channel and selecting the backoff timer. After broadcasting in the control channel, transmitters return to their original service channel. Then, the vehicles receiving the safety message should inform the others in the same service channel to switch to the control channel for the safety message. Afterwards, the vehicles broadcast the safety message once and go back to the original service channel. This method can inform the other vehicles in different channels to increase the broadcast penetration. The proposed scheme can work without global positioning system (GPS). However, GPS can adapt the rebroadcast probability on hot spots to enhance the efficiency of the proposed scheme. Through detailed simulations, the proposed scheme is shown to be more efficient compared to the existing ones.  相似文献   

3.
The wireless access in vehicular environment system is developed for enhancing the driving safety and comfort of automotive users. However, such system suffers from quality of service degradation for safety applications caused by the channel congestion in scenarios with high vehicle density. In the present work channel congestion is controlled jointly by road side unit, and vehicle. The present work supports vehicle to vehicle communication of authentic safe messages among authentic vehicles only. The road side unit reduces channel congestion by allowing only the authentic vehicles to participate in vehicle to vehicle communication, and by discarding unauthentic messages from the network. It revokes vehicles which are not authentic, and vehicles which are communicating unauthentic messages. Each vehicle also participates in the reduction of channel congestion by varying the size of beacon message dynamically, by removing the duplicate messages from message queue, and also by controlling the transmission power, and transmission range of a message during transmission. It further reduces the channel congestion by controlling the message generation rate using message generation rate control algorithm. Two different message generation rate control algorithm are proposed in the present work. In the first approach it maintains the channel load to an estimated initial value whereas the second approach increases the channel load till the percentage of message loss lies below a predefined threshold. The performance of the proposed scheme is studied on the basis of percentage of successful message reception, and percentage of message loss. The performance of the two message generation rate control algorithms are also compared in the present work.  相似文献   

4.
Competitive learning algorithms for robust vector quantization   总被引:1,自引:0,他引:1  
The efficient representation and encoding of signals with limited resources, e.g., finite storage capacity and restricted transmission bandwidth, is a fundamental problem in technical as well as biological information processing systems. Typically, under realistic circumstances, the encoding and communication of messages has to deal with different sources of noise and disturbances. We propose a unifying approach to data compression by robust vector quantization, which explicitly deals with channel noise, bandwidth limitations, and random elimination of prototypes. The resulting algorithm is able to limit the detrimental effect of noise in a very general communication scenario. In addition, the presented model allows us to derive a novel competitive neural networks algorithm, which covers topology preserving feature maps, the so-called neural-gas algorithm, and the maximum entropy soft-max rule as special cases. Furthermore, continuation methods based on these noise models improve the codebook design by reducing the sensitivity to local minima. We show an exemplary application of the novel robust vector quantization algorithm to image compression for a teleconferencing system  相似文献   

5.
Stochastic analysis of a slotted FIFO communication channel   总被引:3,自引:0,他引:3  
Messages arrive randomly at one end of a slotted communication channel. They are assigned to (packed in) packets of fixed duration which queue up for transmission in first-in-first-out order; the packets are sent one per time slot. In a stochastic setting, where message durations are also random, we analyze a model which yields statistics on message delays and the number of waiting messages, assuming that the assignment protocol is the well-known next-fit rule of one-dimensional bin packing. A stability condition is obtained as a function of general discrete message-length distributions. As a by-product, we contribute a new result to the literature on the probabilistic analysis of the static next-fit bin-packing rule, viz. the limiting expected bin occupancy for general discrete distributions. Specializations of the results to constant message lengths and to uniform message-length distributions are worked out in detail  相似文献   

6.
Spectral efficient protocols for half-duplex fading relay channels   总被引:7,自引:0,他引:7  
We study two-hop communication protocols where one or several relay terminals assist in the communication between two or more terminals. All terminals operate in half-duplex mode, hence the transmission of one information symbol from the source terminal to the destination terminal occupies two channel uses. This leads to a loss in spectral efficiency due to the pre-log factor one-half in corresponding capacity expressions. We propose two new half-duplex relaying protocols that avoid the pre-log factor one-half. Firstly, we consider a relaying protocol where a bidirectional connection between two terminals is established via one amplify-and-forward (AF) or decode-and-forward (DF) relay (two-way relaying). We also extend this protocol to a multi-user scenario, where multiple terminals communicate with multiple partner terminals via several orthogonalize-and-forward (OF) relay terminals, i.e., the relays orthogonalize the different two-way transmissions by a distributed zero-forcing algorithm. Secondly, we propose a relaying protocol where two relays, either AF or DF, alternately forward messages from a source terminal to a destination terminal (two-path relaying). It is shown that both protocols recover a significant portion of the half-duplex loss  相似文献   

7.
Technologies are advancing at a rapid rate in the current era. People are advancing with the advancement of technologies, be it in education industry, health industry, and providing luxury. With the advent of autonomous luxury‐in‐motion car that provides in‐car‐entertainment (ICE), vehicular communication is the prerequisite towards achieving this goal. Dedicated short range communication (DSRC) is a matured vehicular communication standard, and Long‐Term Evolution (LTE) is the most competing technologies in the cellular communication. In this paper, we focus on the uplink performance of the LTE‐DSRC hybrid infrastructure. The basic transmission scheme for uplink direction is based on single carrier transmission in the form of discrete Fourier transform (DFT)‐spread Orthogonal Frequency Division Multiplexing (OFDM) with a minimum mean square error (MMSE) receiver at the LTE Evolved Node B (eNodeB) and a DSRC OFDM transmitter. A comprehensive bit error rate (BER) performance simulative study has been made on a color image transmission in uplink hybrid LTE‐DSRC system, and the results obtained are encouraging that the proposed convergence is possible, as it provides a substantial decrease in the BER with a gradual increase in the signal ‐to‐ noise ratio Signal to Noise Ratio (SNR).  相似文献   

8.
基于频域单源区间的具有延迟的欠定盲分离   总被引:4,自引:3,他引:4       下载免费PDF全文
肖明  谢胜利  傅予力 《电子学报》2007,35(12):2279-2283
本文研究如何分离具有延迟而无回波的混叠信号.提出了欠定情况(即感知器少于源信号)下具有时间延迟的信道估计算法,称为单源区间衰减和延迟恢复(AD-MRISSI)算法;它在理论上能无偏差地估计信道,在应用中能准确地估计延迟和精确地估计衰减.也提出了一个基于稀疏原则的源信号重建算法,能避免Bofill算法中的求解二阶锥规划问题.几个语音信号实验展示了其有效性和实用性.  相似文献   

9.
The design of a medium access control scheme for a single-hop, wavelength-division-multiplexing-(WDM) multichannel local lightwave network poses two major difficulties: relatively large transmitter/receiver tuning overhead and large ratio of propagation delay to packet transmission time. Most schemes proposed so far have ignored the tuning overhead, and they can only schedule fixed-length packet transmissions. To overcome these two difficulties, the authors propose several scheduling algorithms which can reduce the negative impact of tuning overhead and schedule variable-length messages. A separate channel (control channel) is employed for transmission of control packets, and a distributed scheduling algorithm is invoked at each node every time it receives a control packet. By allowing the length of messages to be variable, a long message can be scheduled with a single control packet transmission, instead of fragmenting it into many fixed-length packets, thereby significantly reducing the overhead of control packet transmissions and improving the overall system performance. Three novel scheduling algorithms are proposed, varying in the amount of global information and processing time they need. Two approximate analytical models are formulated to study the effect of tuning time and the effect of having a limited number of data channels. Extensive simulations are conducted. Average message delays are compared for all of the algorithms  相似文献   

10.
The authors consider the problem of random access communication over a time-slotted channel, with binary success/failure feedback. The feedback informs the users only whether or not there was a success (single transmission) in the previous slot. They propose and analyze a limited feedback-sensing algorithm (each user is required to observe the channel feedback, from the time he generates a packet to the time that this packet is successfully transmitted). The algorithm requires central control implemented by a central receiver. The limit Poisson user model is adopted. The algorithm achieves a throughput of 0.322 and induces low delays for relatively low input rates  相似文献   

11.
This paper focuses on the design of a multiuser receiver structure for the reverse link of a code-division multiple-access communication system, in the presence of multipath effects and using an antenna array at the base station receiver. The algorithm presented solves the complex multidimensional problem of channel estimation in this complex scenario using a maximum-likelihood approach. This channel estimation technique requires the transmission of a training sequence or feedback of detected data. Once a composite channel-impulse response of each user is estimated, it is directly used in the detection process instead of first extracting the individual channel parameters, such as path delays and attenuation factors. The paper presents a framework that facilitates a computationally efficient solution to the combined problem of channel estimation and detection in a scenario involving multiple users, multiple paths, and multiple sensors at the receiver  相似文献   

12.
Multiple access interference (MAI) is one of the major impediments in the reverse link of wide band CDMA systems, due to the synergy of the users' spreading codes, transmission delays and the channel characteristics. We propose to dynamically assign the users' spreading codes and transmission delays, i.e., to assign the user signature, in order to minimize mutual cross-correlations at the receiver. This dynamic signature assignment (DSA) approach helps to avoid (as opposed to combating) MAI at the base station. In assigning the signatures, we present a low-complexity iterative algorithm which utilizes channel information and is able to minimize signal-to-interference-plus-noise (SINR) ratio at receivers. Computer simulation results are presented which show a potential 2-3 fold capacity increase over conventional systems  相似文献   

13.
Two distributed reservation control protocols are described, analyzed, and simulated for the transmission of datagramtype messages, encoded into fixed length packets, over a synchronous communication satellite channel. These protocols are of a hybrid form between pure random access contention protocols of the ALOHA variety and reservation control protocols such as CPODA. Simulations have shown that certain versions of these protocols can support throughput rates in excess of 97 percent of the channel capacity, maintain stability even under overload conditions, and incur waiting time delays ranging from 0.5 s under light traffic load to 0.88 s for saturated traffic conditions.  相似文献   

14.
DNS(domain name system)作为互联网基础设施的重要组成部分,其数据一般不会被防火墙等网络安全防御设备拦截。以DNS协议为载体的隐蔽信道具有较强的穿透性和隐蔽性,已然成为攻击者惯用的命令控制和数据回传手段。现有研究中缺乏对真实APT(advanced persistent threat)攻击中DNS隐蔽信道的检测技术或方法,且提取的特征不够全面。为深入分析攻击流量和行为特征,基于有限状态机对真实APT攻击中DNS隐蔽通信建模,剖析了APT攻击场景下DNS隐蔽信道的构建机理,详细阐述了其数据交互过程,通过总结和分析DNS隐蔽通信机制,基于有限状态机建立通信模型,提出通信过程中存在关闭、连接、命令查询、命令传输等7种状态,控制消息和数据消息等不同类型消息的传输将触发状态迁移。利用泄露的Glimpse工具模拟真实APT攻击下DNS隐蔽通信,结合Helminth等恶意样本实验验证了模型的适用性和合理性,为人工提取特征提供了充分的依据。  相似文献   

15.
Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users is not deterred by spread spectrum, as they know the required spreading sequences. For the case of internal adversaries, we propose a framework for control channel access schemes using the random assignment of cryptographic keys to hide the location of control channels. We propose and evaluate metrics to quantify the probabilistic availability of service under control channel jamming by malicious or compromised users and show that the availability of service degrades gracefully as the number of colluding insiders or compromised users increases. We propose an algorithm called GUIDE for the identification of compromised users in the system based on the set of control channels that are jammed. We evaluate the estimation error using the GUIDE algorithm in terms of the false alarm and miss rates in the identification problem. We discuss various design trade-offs between robustness to control channel jamming and resource expenditure.  相似文献   

16.
In this work, we investigate the problem of bit-rate adaptation transcoding for transmitting video over burst-error wireless channels, i.e., channels such that errors tend to occur in clusters during fading periods. In particular, we consider a scenario consisting of packet-based transmission with an Automatic Repeat reQuest (ARQ) error control and a feedback channel. With the acknowledgements received through the feedback channel and a statistical channel model, we have an estimate of the current channel state, and effective channel bandwidth. In this paper, we analyze the buffering implications of inserting a video transcoder at the wireless access point with the variable bit-rate channel as the target. We derive the conditions that both the source encoder and transcoder buffers have to meet for preventing the end decoder buffer from underflowing. Furthermore, we propose a bit-rate adaptation algorithm for VBR transcoders used in the wireless access point. Our experimental results demonstrate that the proposed algorithm can accurately control the bit-rate of the transcoded video stream and reduce the number of frames been skipped without violating the end-to-end delay requirement.  相似文献   

17.
Multiple-access interference is one of the major impediments in the reverse link of code-division multiple-access (CDMA) systems, due to the synergy of the users' spreading codes, transmission delays, and the channel characteristics. A space-time dynamic signature-assignment (DSA) algorithm was briefly described by the authors in a previous paper. In this paper, we further elaborate on the space-time DSA approach and its receiver structure for the reverse link of direct-sequence (DS)-CDMA systems using multiple antennas at the receiver. The space-time DSA dynamically assigns the users' spreading codes and transmission delays, i.e., to assign the user signatures, in order to minimize mutual crosscorrelations. In assigning the signatures, the DSA adopts a low-complexity iterative algorithm which utilizes channel information and aims to maximize the signal-to-interference-plus-noise ratio of the poorest performing user at the base station. Analytic results as well as further simulation results are provided to support our arguments.  相似文献   

18.
Code-division multiple-access (CDMA) schemes appear to be very promising access techniques for coping with the requirements of third-generation mobile systems, mainly because of their flexibility. This paper proposes an adaptive S-ALOHA DS-CDMA access scheme as a method for integrating nonreal-time (i.e., Internet applications) and real-time (i.e., voice) services in a multicell scenario by exploiting the potentials of CDMA under time-varying channel load conditions. The adaptive component makes data terminals autonomously change their transmission rate according to the total (voice+data) channel occupancy, so that the minimum possible data delay, which can be analytically obtained by defining a birth-death process, is almost always achieved. Moreover, by means of a simplified cellular model, the proposed algorithm revealed the same behavior, i.e., it tries to select the most suitable transmission rate at any time slot, when it is affected by intercell interference and even by power control imperfections. Finally, in order to gain more insight into the potentials of such an access strategy, the adaptive S-ALOHA CDMA scheme is then compared to a reservation time-division multiple-access (TDMA)-based protocol (PRMA++), showing the benefits of the CDMA-based solution in terms of capacity, flexibility, and data delay performance  相似文献   

19.
A real-time communication system with noisy feedback is considered. The system consists of a Markov source, forward and backward discrete memoryless channels, and a receiver with limited memory. The receiver can send messages to the encoder over the backward noisy channel. The encoding at the encoder and the decoding, the feedback, and the memory update at the receiver must be done in real-time. A distortion metric that does not tolerate delays is given. The objective is to design an optimal real-time communication strategy, i.e., design optimal real-time encoding, decoding, feedback, and memory update strategies to minimize a total expected distortion over a finite horizon. This problem is formulated as a decentralized stochastic optimization problem and a methodology for its sequential decomposition is presented. This results in a set of nested optimality equations that can be used to sequentially determine optimal communication strategies. The methodology exponentially simplifies the search for determining an optimal real-time communication strategy.  相似文献   

20.
The Internet of vehicles (IoV) is an emerging networking technology, which can support information sharing and interactions among users, vehicles, and infrastructures. Various applications can be provided by IoVs, and they have very different quality‐of‐service (QoS) requirements. It is a great challenge to design an efficient MAC protocol to meet the different QoS demands of various applications in IoVs, because of unreliable links and high vehicle mobility. On the other hand, cooperative communication is effective in mitigating wireless channel impairments by utilizing the broadcast nature of wireless channels. In this paper, a multi‐channel cooperative clustering‐based MAC (MCC‐MAC) protocol, under the Dedicated Short Range Communication (DSRC) multi‐channel architecture, is presented to improve the transmission reliability of safety messages and provision QoS for different applications in IoVs. Further, we analyze the performance of MCC‐MAC, in terms of average transmission delay. In addition, extensive simulations with ns‐2 are conducted to demonstrate the performance of the proposed MCC‐MAC. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号