首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
In this paper we evaluate several routing protocols for mobile, wireless, ad hoc networks via packetlevel simulations. The ad hoc networks are multihop wireless networks with dynamically changing network connectivity owing to mobility. The protocol suite includes several routing protocols specifically designed for ad hoc routing, as well as more traditional protocols, such as link state and distance vector, used for dynamic networks. Performance is evaluated with respect to fraction of packets delivered, endtoend delay, and routing load for a given traffic and mobility model. Both small (30 nodes) and medium sized (60 nodes) networks are used. It is observed that the new generation of ondemand routing protocols use much lower routing load, especially with small number of peertopeer conversations. However, the traditional link state and distance vector protocols provide, in general, better packet delivery and endtoend delay performance.  相似文献   

2.
The effects of asymmetry on TCP performance   总被引:2,自引:0,他引:2  
In this paper, we study the effects of network asymmetry on endtoend TCP performance and suggest techniques to improve it. The networks investigated in this study include a wireless cable modem network and a packet radio network, both of which can form an important part of a mobile ad hoc network. In recent literature (e.g., [18]), asymmetry has been considered in terms of a mismatch in bandwidths in the two directions of a data transfer. We generalize this notion of bandwidth asymmetry to other aspects of asymmetry, such as latency and mediaaccess, and packet error rate, which are common in widearea wireless networks. Using a combination of experiments on real networks and simulation, we analyze TCP performance in such networks where the throughput achieved is not solely a function of the link and traffic characteristics in the direction of data transfer (the forward direction), but depends significantly on the reverse direction as well. We focus on bandwidth and latency asymmetries, and propose and evaluate several techniques to improve endtoend performance. These include techniques to decrease the rate of acknowledgments on the constrained reverse channel (ack congestion control and ack filtering), techniques to reduce source burstiness when acknowledgments are infrequent (TCP sender adaptation), and algorithms at the reverse bottleneck router to schedule data and acks differently from FIFO (acksfirst scheduling).  相似文献   

3.
We consider digital wireless multimedia LANs and timevarying traffic rates. To deal effectively with the dynamics of the timevarying traffic rates, a Traffic Monitoring Algorithm (TMA) is deployed to dynamically allocate channel capacities to the heterogeneous traffics. The TMA is implemented as a higher level protocol that dictates the capacity boundaries within two distinct framed transmission techniques: a Framed Time DomainBased (FTDB) technique and a Framed CDMA (FCDMA) technique. The performance of the TMA in the presence of the FTDB technique is compared to its performance in the presence of the FCDMA technique for some traffic scenarios. The performance metrics used for the TMAFTDB and TMAFCDMA combinations are channel capacity utilization factors, traffic rejection rates, and traffic delays. It is found that the TMAFTDB is superior to the TMAFCDMA when the speed of the transmission links is relatively low and the lengths of the transmitted messages are relatively short. As the speed of the transmission links and the length of the transmitted messages increase, the TMAFCDMA eventually outperforms the TMAFTDB.  相似文献   

4.
Network Assisted Power Control for Wireless Data   总被引:6,自引:1,他引:5  
The cellular telephone success story prompts the wireless communications community to turn its attention to other information services, many of them in the category of wireless data communications. One lesson of cellular telephone network operation is that effective power control is essential to promote system quality and efficiency. In recent we have applied microeconomic theories to power control taking into account notions of utility and pricing. Our earlier work has shown that this new approach to power control for wireless data performs better than traditional techniques applied for voice signals. However, the operating points of such a strategy result in an unfair equilibrium in that users operate with unequal signal-to-interference ratios. Further, the power control algorithms required to achieve such operating points are more complex than the simple signal-to-interference ratio balancing algorithms for voice. In this paper, we introduce a new concept, Network Assisted Power Control (NAPC) that maximizes utilities for users while maintaining equal signal-to-interference ratios for all users. The power control algorithm is easily implemented via signal-to-interference ratio balancing with the assistance of the network that broadcasts the common signal-to-interference ratio target.  相似文献   

5.
A framework for delivering multicast messages in networks with mobile hosts   总被引:6,自引:0,他引:6  
To accommodatemobile hosts (MHs) within existing data networks, the static network is augmented with mobile support stations (MSSs) that communicate directly with MHs, usually via wireless links. Connectivity of the overall network changes dynamically as MHs connect to the static network from different locations (MSSs) at different times. Compared to their desktop counterparts, mobile hosts face a new set of constraints namely, low bandwith of the wireless links, tight constraints on power consumption and a significantly lower computing capability. Thus, even without considering failures, integration of mobile computer within existing networks pose a new set of problems. In this paper, we look at the problems associated with delivering multicast meassages to mobile hosts. First, we identify how a mobile host's ability to connect to different MSSs at different times, affects delivery of multicast messages and present schemes to deliver multicast messages to MHs fromatleast-one location, fromatmost-one location, and fromexactly-one location. Next, we introduce multicast groups of mobile hosts wherein each multicast group is associated with a host view, a set of MSSs representing theaggregate location information of the group. A host-view membership algorithm is then presented and combined with the multicast scheme for exactly-once delivery. As a result, to deliver a multicast message to a specified group, copies of the message need be propagated only to the MSSs in the group's host-view.This work was done while the author was a graduate student at Rutgers University.This research work was supported in part by ARPA under contract number DAAH04-95-1-0596, NSF grant numbers CCR 95-09620, IRIS 95-09816 and sponsors of WINLAB.  相似文献   

6.
A generalized -bit least-significant-digit (LSD) first, serial/parallel multiplier architecture is presented with 1n wheren is the operand size. The multiplier processes both the serial input operand and the double precision product -bits per clock cycle in an LSD first, synchronous fashion. The complete two's complement double precision product requires 2n/ clock cycles. This generalized architecture creates a continuum of multipliers between traditional bit-serial/parallel multipliers (=1) and fully-parallel multipliers (=n). -bit serial/parallel multipliers allow anoptimized integrated circuit arithmetic to be designed based on a particular application's area, power, throughput, latency, and numerical precision constraints.This project was pratically funded by the UCSD-NSF I/UCR Center on Ultra-High Speed Intergrated Circuits and Systems.  相似文献   

7.
We describe a new replicatedobject protocol designed for use in mobile and weaklyconnected environments. The protocol differs from previous protocols in combining epidemic information propagation with voting, and in using fixed perobject currencies for voting. The advantage of epidemic protocols is that data movement only requires pairwise communication. Hence, there is no need for a majority quorum to be available and simultaneously connected at any single time. The protocols increase availability by using voting, rather than primarycopy or primarycommit schemes. Finally, the use of perobject currencies allows voting to take place in an entirely decentralized fashion, without any server having complete knowledge of group membership. We show that currency allocation can be used to implement diverse policies. For example, uniform currency distributions emulate traditional voting schemes, while allocating all currency to a single server emulates a primarycopy scheme. We present simulation results showing both schemes, as well as the performance advantages of using currency proxies to temporarily reallocate currency during planned disconnections. Furthermore, we discuss an initial design of the underlying replicatedobject system and present a basic API.  相似文献   

8.
Scheduling Real-Time Traffic With Deadlines over a Wireless Channel   总被引:2,自引:0,他引:2  
Recently, there has been widespread interest in the extension of data networks to the wireless domain. However, scheduling results from the wireline domain do not carry over to wireless systems because wireless channels have unique characteristics not found in wireline channels, namely, limited bandwidth, bursty channel errors and location-dependent channel errors.In this paper, we study the problem of scheduling multiple real-time streams with deadlines, over a shared channel. We show that, in general, unlike the wireline case, the earliest due date (EDD) or shortest time to extinction (STE) policy is not always the optimal policy, even if the channel state is perfectly known and EDD is implemented only over channels in a Good state. Here, optimality is measured with respect to the number of packets lost due to deadline expiry. However, for most values of the channel parameters that are of practical interest, we show through analytical and numerical results that the EDD policy over Good channels is nearly optimal. Finally, through simulations, we also show that by combining this policy with fair scheduling mechanisms would result in scheduling algorithms that provide some degree of isolation between the sources as well as provide a natural way of compensating channels that see prolonged error bursts.  相似文献   

9.
A relation between the types of symmetries that exist in signal and Fourier transform domain representations is derived for continuous as well as discrete domain signals. The symmetry is expressed by a set of parameters, and the relations derived in this paper will help to find the parameters of a symmetry in the signal or transform domain resulting from a given symmetry in the transform or signal domain respectively. A duality among the relations governing the conversion of the parameters of symmetry in the two domains is also brought to light. The application of the relations is illustrated by a number of two-dimensional examples.Notation R the set of real numbers - R m R × R × ... × R m-dimensional real vector space - continuous domain real vector - L {¦ – i , i = 1,2,..., m} - m-dimensional frequency vector - W {i ,i=1,2,..., m} - m-dimensional normalized frequency vector - P {¦ – i , i=1,2,...,m} - g(ol) g (1,2,..., m ) continuous domain signal - () ( 1 2,..., m )=G (j 1,j 2,..., j m ) Fourier transform ofg (ol) - (A,b,,,) parameters ofT- symmetry - N the set of integers - N m N × N × ... × N m-dimensional integer vector spacem-dimensional lattice - h(n) h (n 1,.,n m ) discrete domain signal - H() Fourier transform ofh (n) - v 1,v 2,..., vm m sample-direction and interval vectors - V (v 1 v 2 ...v m ) sampling basis matrix - [x]* complex conjugate ofx - detA determinant ofA - X {x¦ – x i , i=1,2,..., m} - A t [A –1] t ,t stands for transpose This work was supported in part by the Natural Sciences and Engineering Research Council of Canada under Grant A-7739 to M. N. S. Swamy and in part by Tennessee Technological University under its Faculty Research support program to P. K. Rajan.  相似文献   

10.
Wireless transmissions are highly susceptible to noise and interference. As a result, the error characteristics of a wireless link may vary widely depending on environmental factors such as location of the communicating systems and activity of competing radiation sources, making error control a difficult task. In this paper we evaluate error control strategies for a wireless LAN. Based on low-level packet traces of WaveLAN, we first show that forward error correction (FEC) is effective in recovering from bit corruptions and that packet length adjustment can reduce packet truncation. However, as expected, fixed error control policies can perform very poorly, because they either introduce too much overhead in good environments or are not aggressive enough in bad environments. We address this problem through adaptive error control, i.e., error control policies that adapt the degree of FEC redundancy and the packet size to the environment. The effectiveness of adaptive error control depends on the characteristics of the error environment, e.g., the type of errors and the frequency with which the error environment changes. Our evaluation shows that adaptive error control can improve throughput consistently across a wide range of wireless LAN error environments. The reason for this effectiveness is that changes in the error environment are often caused by human mobility-related events such as the motion of a cordless phone, which take place over seconds, while adaptation protocols can respond in tens of milliseconds. Evaluating adaptive error control in a wireless environments is challenging because repeatable experiments are difficult: the wireless environment cannot easily be isolated and the adaptation process itself changes the environment, which may make trace-based evaluation difficult. We introduce a trace-based evaluation methodology that deals appropriately with changes in packet content and size.  相似文献   

11.
On many battery-powered mobile computing devices, the wireless network is a significant contributor to the total energy consumption. In this paper, we investigate the interaction between energy-saving protocols and TCP performance for Web-like transfers. We show that the popular IEEE 802.11 power-saving mode (PSM), a static protocol, can harm performance by increasing fast round trip times (RTTs) to 100 ms; and that under typical Web browsing workloads, current implementations will unnecessarily spend energy waking up during long idle periods. To overcome these problems, we present the Bounded-Slowdown (BSD) protocol, a PSM that dynamically adapts to network activity. BSD is an optimal solution to the problem of minimizing energy consumption while guaranteeing that a connections RTT does not increase by more than a factor p over its base RTT, where p is a protocol parameter that exposes the trade-off between minimizing energy and reducing latency. We present several trace-driven simulation results that show that, compared to a static PSM, the Bounded-Slowdown protocol reduces average Web page retrieval times by 5–64%, while simultaneously reducing energy consumption by 1–14% (and by 13× compared to no power management).  相似文献   

12.
In a cellular multimedia network like wireless ATM (WATM), self control seems primordial. Our new approach is based on the application of DAI (distributed artificial intelligence) techniques in order to build a selfadaptive network within random nonuniform traffic conditions. Attempting to achieve a high network capacity in terms of resource allocation and air interface BER (bit error rate), we propose to apply intelligent agent features to enhance the architecture of WATM systems. In fact, the intelligent platform MAWATM (multiagent wireless ATM) is used to provide a flexible integration of the multiagent technique in wireless entities, BSs (base stations), MSs (mobile stations) and MSCs (mobile switching centers). Two applications are investigated and explored by simulations in order to bear out the feasibility of the multiagent approach.  相似文献   

13.
This article introduces ATR's CAM-Brain Machine (CBM), an FPGA based piece of hardware which implements a genetic algorithm (GA) to evolve a cellular automata (CA) based neural network circuit module, of approximately 1,000 neurons, in about a second, i.e. a complete run of a GA, with 10,000 s of circuit growths and performance evaluations. Up to 65,000 of these modules, each of which is evolved with a humanly specified function, can be downloaded into a large RAM space, and interconnected according to humanly specified artificial brain architectures. This RAM, containing an artificial brain with up to 75 million neurons, is then updated by the CBM at a rate of 130 billion CA cells per second. Such speeds should enable real time control of robots and hopefully the birth of a new research field that we call brain building. The first such artificial brain, to be built by ATR starting in 2000, will be used to control the behaviors of a life sized robot kitten called Robokoneko.  相似文献   

14.
In this paper a new class-AB CMOS second generation current conveyor (CCII) based on a novel high-performance voltage follower topology is proposed. Post-layout simulation results from a 0.8 m design supplied at 3.3 V show very low resistance at node X (<50 ), high frequency operation (100 MHz), high precision in the voltage and current transference and reduced offset. As application examples, a V-I converter and a current feedback operational amplifier (CFOA) have been implemented. The latter presents slew-rate levels higher than ±100 V/s.  相似文献   

15.
The need for rapid deployment and user mobility suggest the use of a hybrid satellitewireless network infrastructure for important situation awareness and emergency response applications. An Intelligent Information Dissemination Service (IIDS) has been developed to support the dissemination and maintenance of extended situation awareness throughout such a network information infrastructure in a seamless manner. One of the goals of IIDS is to transparently handle the mismatches in characteristics of satellite and terrestrial wireless networks, allow effective utilization of available bandwidth, and support timely delivery of highly relevant information. IIDS achieves the above by implementing user profile aggregation that incrementally aggregates users into communities sharing common interests to enable multicastbased information dissemination. Based on the user grouping, semantic profile matching customizes information streams based on matching user group interest profiles. By taking into account expected changes in user profiles, profileoriented data dissemination achieves predictive push and caching that anticipates future user needs and minimizes latency of data request by making data available before they are explicitly requested. Finally, bandwidthaware filtering adapts information streams to resource bandwidth availability to gracefully hide the bandwidth mismatch between the satellite and wireless links in the hybrid network infrastructure. The IIDS software has been deployed on the Digital Wireless Battlefield Network (DWBN) that integrates commercial offtheshelf satellite and wireless products into a heterogeneous satellite/wireless hybrid network for supporting wireless mobile multimedia services.  相似文献   

16.
Tree multicast strategies in mobile,multihop wireless networks   总被引:1,自引:0,他引:1  
Tree multicast is a well established concept in wired networks. Two versions, persource tree multicast (e.g., DVMRP) and shared tree multicast (e.g., Core Based Tree), account for the majority of the wireline implementations. In this paper, we extend the tree multicast concept to wireless, mobile, multihop networks for applications ranging from ad hoc networking to disaster recovery and battlefield. The main challenge in wireless, mobile networks is the rapidly changing environment. We address this issue in our design by: (a) using soft state (b) assigning different roles to nodes depending on their mobility (2level mobility model); (c) proposing an adaptive scheme which combines shared tree and persource tree benefits, and (d) dynamically relocating the shared tree Rendezvous Point (RP). A detailed wireless simulation model is used to evaluate various multicast schemes. The results show that persource trees perform better in heavy loads because of the more efficient traffic distribution; while shared trees are more robust to mobility and are more scalable to large network sizes. The adaptive tree multicast scheme, a hybrid between shared tree and persource tree, combines the advantages of both and performs consistently well across all load and mobility scenarios. The main contributions of this study are: the use of a 2level mobility model to improve the stability of the shared tree, the development of a hybrid, adaptive persource and shared tree scheme, and the dynamic relocation of the RP in the shared tree.  相似文献   

17.
This paper is the first in a two part sequence which studies nonlinear networks, containing capacitor-only cutsets and/or inductor-only loops from the geometric coordinate-free point of view of differentiable manifolds. Given such a nonlinear networkN, with °0 equal to the sum of the number of independent capacitor-only cutsets and the number of independent inductor-only loops, we establish the following: (i) circuit theoretic sufficient conditions to guarantee that the set 0, of equilibrium points is a 0-dimensional submanifold of the state space ofN; (ii) circuit theoretic sufficient conditions for the condition thatN has 0 independent conservation laws and hence that through each point of the state space ofN, there passes a codimension 0 invariant submanifold * of the network dynamics; (iii) circuit theoretic sufficient conditions to guarantee that the manifolds * and 0 intersect transversely.This work was supported by the Natural Sciences and Engineering Research Council of Canada, under Grant Number A7113, and by scholarships from the Natural Sciences and Engineering Research Council of Canada and the Ontario Provincial Government.  相似文献   

18.
A telecommunications network is isolated failure immune (IFI) if and only if communication between operative sites can be completed as long as network failures are isolated. It is known that the class of minimal IFI networks is equivalent to the class of spanning 2-trees. To the best of our knowledge, this work is the first computational study dealing with the construction of a minimum cost IFI network. The problem is known to be NP-complete. We develop a tabu search based heuristic for solving the minimum cost spanning 2-tree (MCS2T) problem. The complex structure of 2-trees makes the tabu search heuristic highly dependent on the starting solution. We develop four heuristic algorithms to obtain diversified good starting solutions. They are: completion of a 2-tree from a spanning tree, two greedy approaches, and a method based on the recursive definition of a 2-tree. We also formulate an integer programming problem (IP) whose objective function value is a lower bound to the MCS2T problem. We solve the IP by developing a constraint generation scheme. The algorithms were tested on complete random graphs with Euclidean distances and on two real data sets (Civil Aeronautics Board) with instances of 10, 15, 20 and 25 nodes. As a result of this research for small problems (10 and 15 nodes), the heuristic solutions are on average within 0.8% from the optimal solution and for large problems (20 and 25 nodes), the average error is less than 2.8%.  相似文献   

19.
In this paper, we consider the mobility management in large, hierarchically organized multihop wireless networks. The examples of such networks range from battlefield networks, emergency disaster relief and law enforcement etc. We present a novel network addressing architecture to accommodate mobility using a Home Agent concept akin to mobile IP. We distinguish between the physical routing hierarchy (dictated by geographical relationships between nodes) and logical hierarchy of subnets in which the members move as a group (e.g., company, brigade, battalion in the battlefield). The performance of the mobility management scheme is investigated through simulation.  相似文献   

20.
This paper presents novel low-voltage all-MOS analog circuit techniques for the synthesis of oversampling A/D converters. The new approach exploits the possibilities of Log-domain processing by using the MOSFET in subthreshold operation. Based on this strategy, a complete set of very low-voltage (down to 1 V) low-power (below 100 W) all-MOS basic building blocks is proposed. The resulting analog circuit techniques allow the integration of A/D converters for low-frequency (below 100 KHz) applications in digital CMOS technologies. Examples are given for a standard 0.35 m VLSI process.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号