首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 554 毫秒
1.
本文提出了一种新型的自选路由ATM多路径交换结构,采用虚拟FIFO缓冲器技术,即能保持信元次序的完整性,又避免了螺旋式交换结构中虚拟信元引起的饱和吞吐量、延迟和信元丢失性能的下降。在均匀通信量和非均匀通信量情况下分析了它的性能,结果表明其最大可达到的饱和吞吐量为7/8,延迟和信元丢失率都比螺旋式结构小很多。同时,该系统无需内部加速,适于VLSI集成。  相似文献   

2.
Two types of commutation signaling for combating multipath are introduced:M times Nsignaling, in which the signal set cycles successively amongNdifferent sets ofMsigals each; andM + Nsignaling, in which the signal set at any time consists ofMmembers of an alphabet ofM + Nsignals,Nof which are inactive at any epoch. In both cases, the objective is to remove from use any signal sent recently enough that it is still "ringing" in the multipath channel. We consider the problems of minimization ofMandN, hence the total number signals used; analysis of2 times Nsets (M = 2is almost uniformly optimal); analysis of the simplestM + Nset, i.e., a 2 + 1 set; and presentation of the results of simulation ofM times NandM + Nsignaling through realistic urban/suburban radio channels. Comparison of these simulations to simulations of other antimultipath techniques is also made. The simulation results are due to Kamil [3].  相似文献   

3.
This work addresses data acquisition problems associated with an improved air traffic control system. A mathematical theory of scattering which describes the multipath process is developed. From this model, the optimum signal structure required for ranging and communicating data through the multipath propagation medium is derived. It is shown that the Reed-Solomon Codes have near optimum properties for ranging and data communications. A baseline data transmission system for air traffic control is designed which will accommodate 4000 aircraft per second at the rate of 100 bits per second in a 60 by 120 mile area. The baseline system combines coding with frequency hopping as the best means of combating severe multipath interference. Several coding systems are compared and curves relating error rate to Eb/N0(signal-to-noise energy per bit) for a channel characterized by Rayleigh fading are presented. This paper concludes that a ground-to-air and air-to-ground high capacity data link at a reasonable cost will be feasible for an improved air traffic control system.  相似文献   

4.
Network communication traditionally only uses encryption techniques for privacy and a single path for routing, which makes the communication vulnerable to attackers. Attackers easily obtain much important information by eavesdropping on the path and analyzing the communication traffic. To overcome the problem, we propose concurrent multipath traffic impersonating (CMTI), which obscures traffic features by camouflaging the traffic flow and dividing it into multiple parts. We propose a traffic impersonating technique based on statistical simulation, which make the secret traffic look like another normal and inconspicuous class to deceive attackers. And we present the packet scheduling algorithm to transfer the impersonating flows on multipath, for enhancing the communication efficiency and further increasing significantly the cost inflicted on attackers who wish to eavesdrop communication sessions. The empirical analysis demonstrates that concurrent multipath traffic imitating can effectively thwart traffic analysis and enhance communication efficiency. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

5.
Today's data center networks are designed using densely interconnected hosts in the data center.There are multiple paths between source host and destination server.Therefore,how to balance traffic is key issue with the fast growth of network applications.Although lots of load balancing methods have been proposed,the traditional approaches cannot fully satisfy the requirement of load balancing in data center networks.The main reason is the lack of efficient ways to obtain network traffic statistics from each network device.As a solution,the OpenFlow protocol enables monitoring traffic statistics by a centralized controller.However,existing solutions based on OpenFlow present a difficult dilemma between load balancing and packet reordering.To achieve a balance between load balancing and packet reordering,we propose an OpenFlow based flow slice load balancing algorithm.Through introducing the idea of differentiated service,the scheme classifies Internet flows into two categories:the aggressive and the normal,and applies different splitting granularities to the two classes of flows.This scheme improves the performance of load balancing and also reduces the number of reordering packets.Using the trace-driven simulations,we show that the proposed scheme gains over 50%improvement over previous schemes under the path delay estimation errors,and is a practical and efficient algorithm.  相似文献   

6.
MPLS网络中保证服务质量的多径路由选择策略   总被引:4,自引:0,他引:4       下载免费PDF全文
牛志升  段翔  刘进 《电子学报》2001,29(12):1638-1641
本文提出了一种在多协议标签交换(MPLS, Multiple Protocol Label Switching) 网络中保证服务质量 (QoS,Quality-of-Service) 的多径路由选择策略,其核心思想是引入多路径分散业务量机制,在保证用户服务质量要求的同时达到增加网络呼叫接受率和平衡网络负载的目的.文中着重讨论了用户端对端服务质量要求的多路分解和分配问题,在此基础上提出了多径路由的分支路径选择策略,并研究了策略中的关键参数K对该策略性能的影响.数值结果显示出多路径分散业务量在网络负载均衡方面的重要意义,并且表明用户的要求相对网络资源越高使用多径传输的优势越明显.  相似文献   

7.
An amplify-and-forward multicarrier cooperative system was proposed in this paper. The optimal resource-allocation problem was investigated in terms of improving data rate. An effective resource-allocation algorithm was proposed based on three techniques, adaptive modulation, subchannel reassignment design and transmit power adaptation. The designed subchannel reassignment not only increases the average data rate, but also raises the threshold of "water-filling" in optimizing power allocation that can further increase data rate. Since the power allocation is based on the designed subchannel reassignment, the complexity of the proposed algorithm is reduced greatly. Simulation results show that the proposed algorithm effectively increases the system's average data rate.  相似文献   

8.
The emergence of Grid Computing settings lays a solid foundation for designing and constructing a next generation E-commerce environment. This work presents a new E-commerce architecture based on a Grid Computing environment, and models and analyzes the architecture using Temporal Petri nets (TPNs). It can make sufficiently use of the Grid resources to implement various electronic bargains between the geographically dispersed users. By means of its TPN model, some main temporal properties are represented and verified formally.  相似文献   

9.
Cognitive radio (CR) is regarded as a promising technology for providing a high spectral efficiency to mobile users by using heterogeneous wireless network architectures and dynamic spectrum access techniques. However, cognitive radio networks (CRNs) may also impose some challenges due to the ever increasing complexity of network architecture, the increasing complexity with configuration and management of large-scale networks, fluctuating nature of the available spectrum, diverse Quality-of-Service (QoS) requirements of various applications, and the intensifying difficulties of centralized control, etc. Spectrum management functions with self-organization features can be used to address these challenges and realize this new network paradigm. In this paper, fundamentals of CR, including spectrum sensing, spectrum management, spectrum mobility and spectrum sharing, have been surveyed, with their paradigms of self-organization being emphasized. Variant aspects of self- organization paradigms in CRNs, including critical functionalities of Media Access Control (MAC)- and network-layer operations, are surveyed and compared. Furthermore, new directions and open problems in CRNs are also identified in this survey.  相似文献   

10.
Traditional fuzzy clustering algorithms based on objective function is unable to determine the optimum number of clusters, sensitive to the initial cluster centers, and easily sunk into the issue of local optimum. A Fuzzy similarity-based clustering (FSBC) algorithm is proposed in this paper. This method consists three phases: first, the objective function is modified by integrating Fuzzy C-means (FCM) and Possibilistic C-means (PCM) method; second, using the density function from data for similarity-based clustering to automatically generate initial prototype without requesting users to specify; finally, the iteration process optimized by Particle swarm optimization (PSO) to obtain appropriate adjustment parameters that can provide better results, which avoids the local minimum problems of traditional methods. The experimental results on the synthetic data and UCI standard data sets show that the proposed algorithm has greater searching capability, less computational complexity, higher clustering precision.  相似文献   

11.
A novel surface treatment method of plat-ing Cu+PPS film/coating on a mobile phone's stainless steel frame for improving the antenna system efficiencies is proposed. The mobile phone was measured in free space, in a silicon cover, and in the hand and cover si- multaneously. It's found that with this surface treat-ment, the total efficiency of the antenna system can be improved in all the four cases respectively by 14.22%, 1.38%, 15.19% and 1.72% at 940MHz (GSM900:880- 960MHz), 2.59%, 3.21%, 4.81% and 1.43% at 1720MHz (DCS:1710-1880MHz) and 6.34%, 2.85%, 9.83% and 2.32% at 2100 MHz (WCDMA:1920-2170MHz). This low- cost surface treatment method is an important break- through to improve antenna system performance of mobile phones especially for those with a stainless steel frame, and suitable for mass production.  相似文献   

12.
Due to its opportunistic spectrum sharing capability, cognitive radio (CR) has been proposed as a fundamental solution to alleviate the contradiction between spectrum scarcity and inefficient utilization of licensed spectrum. In CR system (CRS), to efficiently utilize the spectrum resource, one important issue is to allocate the sensing and transmission duration reasonably. In this paper, the evaluation metric of energy efficiency, which represented the total number of bits that were delivered with per joule of energy consumed, is adopted to evaluate the proposed scheme. We study a joint design of energy efficient sensing and transmission durations to maximize energy efficiency capacity (EEC) of CRS. The tradeoff between EEC and sensing and transmission durations are formulized as an optimization problem under constraints on target detection probability of secondary users (SUs) and toleration interference threshold of primary users (PUs). To obtain the optimal solution, optimizing sensing duration and transmission duration will be first performed separately. Then, a joint optimization iterative algorithm is proposed to search the optimal pair of sensing and transmission durations. Analytical and simulation results show that there exists a unique duration pair where the EEC is maximized, and that the EEC of the proposed joint optimization algorithm outperforms that of existed algorithms. Furthermore, the simulation results also reveal that the performance of the proposed low complexity iterative algorithm is comparable with that of the exhaustive search scheme.  相似文献   

13.
The paper proposes a new contention based Time division multiple access (TDMA) Medium access control (MAC) protocol in wireless ad hoc networks, which can be termed Quadri-stage contention protocol (QSCP). The QSCP protocol is free of both the "hidden terminal" and the "exposed terminal" problems. It is distributive and arbitrarily scalable. In the dedicated contention stage, nodes exchange their "Normalized accumulation and dissipation rate of payload (NADROP)" messages in 2-hop neighborhood, and then run a contention probability calculation algorithm to decide the probability of sending a contention frame. The algorithm guaran- tees that the number of time slot reserved by a node is proportional to its NADROP value, which can remarkably improve the end-to-end throughput when network load is heavy, and is more efficient in energy consumption. The simulation results demonstrate that QSCP performs better than the existing protocols.  相似文献   

14.
A motion segmentation framework that effectively exploited the multiple sources of image information and fused these sources of the information synergisti-cally was proposed to serve the purpose of motion segmen- tation. A Markov process was formulated for motion seg- mentation in which two feature spaces were established to estimate the state transition Probability density function (PDF) and the initial state, respectively. An information fusion space was developed such that each motion struc-ture was described as a single distribution in this space. The proposed framework can naturally embed the evolution equations of the active contour methods into the seg-mentation to achieve contour-based segmentation results. Extensive empirical evaluations demonstrate the robust-ness and the promise of this framework.  相似文献   

15.
The design of threshold based distributed Certification authority (CA) has been proposed to provide secure and efficient key management service in Mobile ad hoc networks (MANETs), but most of previous work ig- nore the efficiency and effectiveness and assuming there are always honest nodes performing the service. Focus- ing on developing a model to select a coalition of nodes dynamically and optimally to carry out the threshold key management service in MANETs, we formulate the dy- namic nodes selection problem as combinatorial optimiza- tion problem, with the objectives of maximizing the success ratio of the service and minimizing the nodes, cost of secu- rity and energy, and then extend the payment structure of the classical Vickrey, Clarke and Groves (VCG) mechanism design framework to ensure truth-telling is the dominant strategy for any node in our scenario. Compared with ex- isting works in the presence of selfish nodes, the proposed model enjoys an improvement of both the success ratio of key management service and lifetime of the network, and a reduction of both the cost of participating nodes and compromising probability of MANETs.  相似文献   

16.
This research presents an algorithm for face detection based on color images using three main components: skin color characteristics, hair color characteristics, and a decision structure which converts the obtained information from skin and hair regions to labels for identifying the object dependencies and rejecting many of the incorrect decisions. Here we use face color characteristics that have a good resistance against the face rotations and expressions. This algorithm is also capable of being combined with other methods of face recognition in each stage to improve the detection.  相似文献   

17.
In orthogonal frequency division multiple access(OFDMA) based femtocell networks,the co-tier interference among femto base stations(FBS) becomes important in multiuser and densely deployed environment.In order to mitigate the co-tier interference and enhance the system total throughput,this paper proposed a best effort spectrum allocation scheme based on the extension of graph theory.In the scheme,a controller was proposed to collect the channel state information(CSI)of all femtocell user equipments(FUEs) in a certain range.Then,the controller evaluated the signal-to-interference Ratio(SIR) of each FUE and determined the set of its interference neighbors.By calculating the received power matrix(RPM) among FUEs and building interference graph matrix(IGM),different spectrum resource blocks(RBs) were assigned to the users with interference relation,while users without interference relation shared the same RBs,which could increase the spectrum efficiency.Simulation results show that the proposed algorithm can significantly improve the RB usage efficiency compared with the basic graph coloring theory,and more than 80% improvement can be acquired in dense deployment scenario.Besides,the throughput of both cell edge macro user equipments(MUEs) and cell edge FUEs is guaranteed on the premise of low interference.  相似文献   

18.
Construction and count of 1-resilient Rotation symmetric Boolean functions (RSBFs) on pr variables are demonstrated. It is proved that constructions of 1-resilient RSBFs on pr variables are equivalent to solving an equation system. An accurate enumeration formula of all 1-resilient RSBFs on pr variables is also proposed. Some examples are given, and the exact numbers of 1-resilient RSBFs on 8 and 9 variables are obtained respectively.  相似文献   

19.
The growing number of web services advocates distributed discovery infrastructures which are semantics-enabled. We introduce a novel approach for semantic discovery of web services in structured P2P-based (Peer-to-Peer) registries. We partition concepts into different CGs (Concept groups) and index these ordered concept sets in a two-phase semantic routing mechanism. Each node and query has one concept set as its unique ID. For each concept in the query, current node first route the query to a node with nodeID that shares a prefix as long as with the query, but a longer CG. Second, the query will be routed to a node sharing a longer prefix than that of the current node. Combining with semantic similarity calculation, our proposal guarantees that most existing services matching a query will be found with bounded costs in terms of number of nodes involved. The scalability and reliability of our approach are also confirmed through emulation tests.  相似文献   

20.
Li Li 《现代传输》2008,(6):75-79
In the unlicensed 2.4GHz ISM band, there is not only IEEE 802.11 wireless systems being used, but also some other devices, such as residential microwave oven, Bluetooth devices, and cordless phone. All these devices that are not used for the data communications cause unintentional interference that will degrade the WI-FI system. In this paper, the transmission powers for common RF devices are measured and the SIR (signal-to-interference ratio) of different interferers to Wi-Fi is also studied. With this information, the effect of different interference on WI-Ft signal can hence be quantified. Furthermore, the ability of the interference avoidance protocols, which is built into the AP, to address interference problems caused by that device is determined.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号