首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
针对3G和4G中广泛的IP业务接入能力及多媒体应用的服务质量保证,接纳控制(CAC)和资源配置是必不可少的。基于虚拟信道/缓冲分析方案,在综合考虑多重服务质量(QoS)标准的基础上,提出一种用于无线IP网络的有效带宽/缓冲计算方法。仿真实例和计算机模拟结果表明所提方案能够通过减少负载处理来提高系统的资源利用率。  相似文献   

2.
吴振强  马建峰 《计算机应用》2005,25(8):1730-1733
由于BWIP网络的非对称性特点,现有ISO/IEC7498-2、IPsec、WAP、3GPP、CDSA等安全体系结构框架都不能完全满足未来BWIP网络的安全需求。提出了一种适合未来BWIP网络的安全体系结构模型,该模型对BWIP网络所涉及的网络管理、安全操作、AAA、PKI、安全策略实施等技术进行了有机集成。给出了BWIP网络安全体系结构流入和流出的详细处理流程,并指出未来BWIP安全体系结构的研究方向。  相似文献   

3.
Mobility support for Wireless Sensor Networks (WSN) can significantly extend the use of WSN in many fields, such as industrial control, healthcare and smart home. And high-efficiency mobility support schemes are essential for WSN because this is a typical energy constrained network. This paper proposes a LoW cost inter-PAN Mobility Support Scheme (LoWMS) for IPv6 based WSN, which follows the network based idea. The scheme aims at reducing signaling cost when sensor nodes move between two Personal Area Networks. In order to realize it, the handoff related control messages are designed to transmit in link layer, and resolution for ping-pong handoff is also given. Simulation results show the novel scheme efficiently reduces the amount of handoff messages, which is benefit for energy saving of WSN. At the end of the paper, we illustrate two possible application scenarios which could be beneficial from LoWMS, one is healthcare system, and another is logistics and storage.  相似文献   

4.
Mobility protocols allow hosts to change their location or network interface while maintaining ongoing sessions. While such protocols can facilitate vertical mobility in a cost-efficient and access agnostic manner, they are not sufficient to address all security issues when used in scenarios requiring local mobility management. In this paper, we propose a new scheme that makes Host Identity Protocol (HIP) able to serve as an efficient and secure mobility protocol for wireless heterogeneous networks while preserving all the advantages of the base HIP functions as well. Our proposal, called Heterogeneous Mobility HIP (HMHIP), is based on hierarchical topology of rendezvous Servers (RVSs), signaling delegation, and inter-RVS communication to enable secure and efficient network mobility support in the HIP layer. Formal security analysis using the AVISPA tool and performance evaluation of this method are provided; they confirm the safety and efficiency of the proposed solution. HMHIP reduces handover latency and packet overhead during handovers by achieving registration locally.  相似文献   

5.
对无线视频传感器节点的图像通信活动进行研究,分析了其在资源受限的无线多媒体传感器网络中进行图像编码和传输的性能。对基于DCT和DWT的图像编码与传输的能量消耗和率失真进行建模分析。根据所建立的能量消耗与率失真模型,对有限的能量和传输带宽进行优化分配。根据监测场景的统计信息,调整编码中所使用的参数,以使得能量消耗最小化。仿真实验结果表明,所提出的方法在保证应用所需图像质量的情况,有效地降低了无线传感器节点的数据通信量和计算过程的能耗。  相似文献   

6.
Due to multifaceted human behavior, synthetic models are inept at realistically modeling long term mobility characteristics of users. The diversity in mobility character adds yet another dimension to this complex problem. Empirical studies are essential and are capable of providing realistic user models. This paper examines the real-time mobility traces of users and identifies key mobility parameters, which are used to classify users and create homogenized groups. Based on mobility and degree of predictability, a mobile user classification is attempted. As per-user mobility management schemes proposed in the literature are difficult to implement, it is essential to adopt a class or group based approach to facilitate implementation of dynamic schemes. Further, this paper characterizes in-session and out-of-session Cell Residence Time (CRT), the feature that critically influences several management tasks. The out-of-session CRT distribution has been represented using a heavy tail distribution. The applicability of the model for various classes of users has been studied. The results of this study can be used to spawn a more realistic user model, for simulation studies.  相似文献   

7.
Substantial works have recently been reported on the mobility management in single-hop wireless networks (e.g. cellular networks and WLAN hotspots), while there has been an increased interest in multi-hop communications. This has made mobility management in heterogeneous multi-hop wireless networks (HMWNs) really interesting so that both single-hop and multi-hop communication paradigms can be integrated. One of the main research challenges for 4G wireless systems is the identification of a mobility management technique that could integrate different wireless technologies such as WLANs, WMANs and WWANs, operating in infrastructure (single-hop) and infrastructureless (ad hoc or multi-hop) modes. In this article we envision a futuristic HMWN where heterogeneous networks, operating in single-hop and multi-hop modes are integrated to provide increased capacity and enhanced coverage for the users. We summarize various existing mobility management solutions and discuss why these schemes are not adequate for HMWNs, as well as highlighting our view of mobility management issues in HMWNs.  相似文献   

8.
This paper investigates a class of mobile wireless sensor networks that are unconnected most of the times; we refer to them as delay-tolerant wireless sensor networks (DTWSN). These networks inherit their characteristics from both delay tolerant networks (DTN) and traditional wireless sensor networks. After introducing DTWSNs, three main problems in the design space of these networks are discussed: routing, data gathering, and neighbor discovery. A general protocol is proposed for DTWSNs based on opportunistic broadcasting in delay-tolerant networks with radio device on-off periods. Three performance measures are defined in the study: the energy for sending queries to ask for data from possible neighbors (querying energy), data transfer energy, and absorption time (delay). A simple yet accurate approximation for the data-transfer energy is proposed. An analytic model is provided to evaluate the querying energy per contact (epc). Simulation results for the data propagation delay show that the querying energy per contact measure obtained from the analytic model is proportional to the product of the querying energy and the delay. A practical rule of thumb for an optimal query interval in terms of delay and energy is derived from different parts of the study.  相似文献   

9.
《Computer Networks》2002,38(2):181-206
The original design of the Internet and its underlying protocols did not anticipate users to be mobile. With the growing interest in supporting mobile users and mobile computing, a great deal of work is taking place to solve this problem. For a solution to be practical, it has to integrate easily with existing Internet infrastructure and protocols, and offer an adequate migration path toward what might represent the ultimate solution. In that respect, the solution has to be incrementally scalable to handle a large number of mobile users and wide geographical scopes, and well performing so as to support all application requirements including voice and video communications and a wide range of mobility speeds. In this paper, we present a survey of the state-of-the-art and propose a scalable infrastructure to support mobility in Internet protocol networks. In that respect, we exploit local area network (LAN) technologies to create the network infrastructure necessary to offer connectivity to mobile users across any geographical area (building, campus and metropolis). The intrinsic properties of LAN technologies and their underlying protocols, namely flat address space, transparent learning and low complexity renders this solution particularly cost effective for supporting user mobility. In particular, we propose a network topology and a set of protocols that render the infrastructure scalable to a large geographical area and many users.  相似文献   

10.
在无线移动环境中无线信道环境十分恶劣,移动切换和无线链路丢包经常发生.目前的TCP通常把这些丢包错误的当作网络拥塞处理,结果造成网络吞吐量下降.本文中,在支持网络移动性的基础上我们介绍了一种跨层优化方案来全面解决这两方面的问题,让链路层检测链路状态是恶劣的无线环境或是网络拥塞;同时,网络层检测移动主机是否处于移动切换状态,然后将这一信息通知给传输层,当传输层收到来自低层的信号时,根据情况调节自己的行为以适应当前网络状况,从而获得较好的网络传输性能.  相似文献   

11.
In this paper, we present an analytic model to estimate the performance of cut-through buffered banyan networks with finite buffer size. Two conflict resolution policies are considered in order to resolve conflicts when two packets are destined to the same output link, and their performances are compared. Our analytic model enables analysis of the networks in which buffers are unevenly distributed, i.e., each stage has a different buffer size. It is shown that if buffers are properly distributed in the network, higher throughput and lower delay are possible, although the improvement is considered small. Finally, in order to validate our model, some analytic results are compared to simulation.  相似文献   

12.
Health promotion in hospital environments can be improved using the most recent information and communication technologies. The Internet connectivity to small sensor nodes carried by patients allows remote access to their bio-signals. To promote these features the healthcare wireless sensor networks (HWSN) are used. In these networks mobility support is a key issue in order to keep patients under real-time monitoring even when they move around. To keep sensors connected to the network, they should change their access points of attachment when patients move to a new coverage area along an infirmary. This process, called handover, is responsible for continuous network connectivity to the sensors. This paper presents a detailed performance evaluation study considering three handover mechanisms for healthcare scenarios (Hand4MAC, RSSI-based, and Backbone-based). The study was performed by simulation using several scenarios with different number of sensors and different moving velocities of sensor nodes. The results show that Hand4MAC is the best solution to guarantee almost continuous connectivity to sensor nodes with less energy consumption.  相似文献   

13.
This paper analyzes the performance of clustered decode-and-forward multi-hop relaying (CDFMR) wireless Rayleigh fading networks, and sheds light on their design principles for energy and spectral efficiency. The focus is on a general performance analysis (over all SNR range) of heterogeneous wireless networks with possibly different numbers of relays in clusters of various separations. For clustered multi-hop relaying systems, hop-by-hop routing is known as an efficient decentralized routing algorithm which selects the best relay node in each hop using local channel state information. In this article, we combine hop-by-hop routing and cooperative diversity in CDFMR systems, and we derive (i) a closed-form expression for the probability distribution of the end-to-end SNR at the destination node; (ii) the system symbol error rate (SER) performance for a wide class of modulation schemes; and (iii) exact analytical expressions for the system ergodic capacity, the outage probability and the achievable probability of the SNR (power) gain. We also provide simple analytical asymptotic expressions for SER and the outage probability in high SNR regime. Numerical results are provided to validate the correctness of the presented analyses.  相似文献   

14.
朱赟  徐友云  潘成康 《电子技术应用》2012,38(3):124-126,133
分析了分簇结构无线传感器网络中随机功率控制的成功通信概率,并提出由网络对成功通信概率的要求来决定簇内通信时节点发送功率的最大值和最小值。仿真数据表明,在节点密度较高的分簇结构无线传感器网络中,随机功率控制与固定功率控制相比,有更高的能量效率。  相似文献   

15.
加密环境中的无线TCP性能优化   总被引:1,自引:0,他引:1  
TCP是一种广泛使用的可靠传输协议,它的设计基于拥塞是引起丢包主要原因的假设。但在无线网络中,丢包通常是传输差错的缘故,这导致了TCP传输性能的急剧下降。现有不少无线TCP传输性能优化方法要求中间节点能够获得TCP连接信息,因此不适用于数据流被加密的情况。文中提出的丢包识别机制可应用于加密环境,它通过TCP发送端判断丢包原因并采取相应措施来提高传输速率,仿真结果证明该方法是有效的、鲁棒的,在局域网和广域网环境中都能明显提高TCP端到端传输性能。  相似文献   

16.
In the next generation Internet, we have seen the convergence of multimedia services and Internet with the mobility of users. Vertical handover decision (VHD) algorithm are essential components of the mobility management architecture in mobile wireless networks. VHD algorithms help mobile users to choose the best mobile network to connect among available candidates. It also can help the network manager to optimize easily the limited resources shared among the network providers and the users. In this article, we formulate VHD algorithm as a resource allocation problem for down-link transmission power in multiple W-CDMA networks and show how combinatorial double-sided auctions can be applied to this specific problem. The proposed pricing schemes make use of the signal interference to noise ratio, achievable data rates, power allocation at mobile networks, and monetary cost as decision criteria and our model differentiate between new calls and on-going communications to take into account that the last category has somewhat more importance. Several combinatorial double-sided auction are proposed to maximize the social welfare and /or to provide incentives for mobile users and mobile operators to be truth-telling in terms of valuation or cost. Finally, the economic properties of the different proposed pricing schemes are also studied by means of simulations.  相似文献   

17.
We propose an adaptive and energy-efficient TDMA-based MAC protocol that significantly reduces energy consumption in the network, while efficiently handling network traffic load variations and optimizing channel utilization through a timeslot stealing mechanism and a timeslot reassignment procedure. We have analytically derived the average delay performance of our MAC protocol, with and without the timeslot stealing mechanism. Our delay model, validated via simulations, shows that the timeslot stealing mechanism can substantially improve the protocol throughput in scenarios with varying and asymmetric traffic patterns. Evaluation results show that the timeslot reassignment procedure is efficient in handling the longer timescale changes in the traffic load, while the timeslot stealing mechanism is better in handling the shorter timescale changes in the traffic patterns.  相似文献   

18.
针对现有基于P2P的无线传感器网络互联技术存在的不足,提出了一种基于P2P的三层无线传感器网络互联技术。该技术采用P2P技术实现多无线传感器网络互联系统所需的伸缩性、鲁棒性、容错能力和自组织性;通过在系统中引入超级端,提高了传感数据的复用率,降低了通信复杂度,减少进出传感器网络的消息量,使得无线传感器网络的生命周期得以延长。  相似文献   

19.
Sensor nodes of a typical wireless sensor network (WSN) are battery driven, so energy conservation is a critical factor for node's life time. Thus optimisation of energy consumption is a major objective in the area of WSNs. One such method is asymmetric communication which uses different channel codes and modulation schemes for downlink (base station (BS) to node link) and uplink (node to BS link). In this paper, a performance analysis of different channel code–modulation pair for energy efficient asymmetric communication is carried out followed by the field programmable gate array implementation of channel codes required at the node. The per information bit node energy for the uplink has been calculated for efficient channel code–modulation pair, for three different channels, viz. additive white gaussian noise, Rayleigh flat-fading and log-normal shadowing channels, resulting in reduction in energy consumption at sensor nodes.  相似文献   

20.
Access control policy in wireless networks has a significant impact on QoS satisfaction and resource utilization efficiency. The design of access control policy in heterogeneous wireless networks (HWNs) becomes more challenging especially for the heterogeneous multiple access protocols of each radio network. In this paper, a Markov model is proposed to analyze the performance of three access control policies for HWNs. The first policy is the optimal radio access technology (O-RAT) selection, where the incoming traffic always tries to access one network with the maximum service rate before admission. The second policy intends to allocate the same data to all networks. And the traffic will leave the system if it is accomplished first by one of these networks, which is formulated as the aggregated multi-radio access (A-MRA) technology. The third policy is named the parallel multi-radio access (P-MRA) transmission, in which the incoming traffic is split into different networks. The traffic is served with the sum of the service rates provided by overall networks. Numerical and simulate results show the effectiveness of our analytical framework and the performance gain of the three access control policies. As illustrated with some representative results, the P-MRA policy shows superior performance gain to the other two policies independent on the specific parameters of the different multiple access protocols due to the multiplexing gain.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号