首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Due to the limitation of resources in mobile handheld devices and bandwidth constraints in wireless networks, it is important to efficiently manage image content and traffic to improve network throughput and response time. The efficient distribution of images in wireless networks is based on many parameters like the quality of service requirement, available bandwidth, restricted memory and diverse user profiles. We consider digital images as data objects accessed in a hierarchical mobile ad-hoc peer-to-peer network, referred as M-P2P. Our objective is to optimize the number of replicas of images in such a network architecture based on the resource limitations of the requesting peers equipped with miniature mobile devices as well as of wireless constraints in mobile ad-hoc networks (MANET). While replicating images, fragments of different resolution and their residues are used to optimize the traffic in the network and to decrease the search turnaround time. We call this replication algorithm as Ada-Rep. Performance evaluation is done by simulating Ada-Rep, base replication and uniform replication methods to evaluate parameters such as response time, failure rate, memory usage, traffic etc. Our results prove the efficiency and better performance of Ada-Rep.  相似文献   

2.
A mobile Ad-Hoc networks (MANETs) is a continuously self-configuring, infrastructure-less network of wireless mobile devices. In which multicast is one of the efficient way of communication. Currently, several research have been conducted to design multicast routing protocols for wireless mobile ad-hoc networks (MANETs). Multicasting is a technique that allow to send the same message to a group of destinations simultaneously. However, it faces several challenges against its implementation in ad-hoc network due to its dynamic nature, lack of bandwidth, short battery lifetime of the mobile devices. The multicast routing protocol MAODV have several constraints as mentioned above. Hence to address these constraints a reliable neighbour nodes selection scheme has been integrated over MAODV. This paper attempt a Quality of Service (QoS) based multicast routing protocol using reliable neighbour nodes selection scheme (QMRPRNS) for same. The simulation has been conducted to compare the performance of the proposed scheme against some existing multicast routing protocols which shows significant improvement over EMAODV and MAODV.  相似文献   

3.
Vasiu  L. Mahmoud  Q.H. 《Computer》2004,37(2):104-105
The networks that connect handheld wireless devices such as cell phones and PDAs suffer from low bandwidth and a high incidence of network errors. By employing mobile agents, such devices could provide a reliable technology for message transport over wireless links. Mobile agents are inherently distributed software entities that reduce the load on the network when they move. Mobile agents can be employed in wireless handheld devices in two ways: An agent platform could be installed on the device, enabling mobile agents to run directly on it, or devices could access and use remote mobile agents running on wired networks. Each approach is viable and has its own advantages and domain-specific applications. Some high-end devices would benefit from running a mobile agent platform that lets agents run locally, but this would not be beneficial to others because of processing power and memory constraints or for security reasons.  相似文献   

4.
Wireless networks introduce new opportunities for music delivery. The trend of using mobile devices on wireless networks can significantly extent the recent change of paradigm in the model of music distribution by allowing mobile clients to search for audio music in a network of wireless mobile hosts. This paper introduces the application of content-based music information retrieval (CBMIR) in wireless ad-hoc networks. We investigate, for the first time in the literature, the challenges posed by the wireless medium and recognize the factors that require optimization. We propose novel techniques that attain a significant reduction in both response time and network traffic, compared to naive approaches. Extensive experimental results illustrate the appropriateness, effectiveness, and efficiency of the proposed method to this bandwidth-starving and volatility due to mobility and environment.   相似文献   

5.
We are currently witnessing a growing interest of network operators to migrate their existing 2G/3G networks to 4G technologies such as long-term evolution (LTE) to enhance the user experience and service opportunities in terms of providing multi-megabit bandwidth, more efficient use of radio networks, latency reduction, and improved mobility. Along with this, there is a strong deployment of packet data networks such as those based on IEEE 802.11 and 802.16 standards. Mobile devices are having increased capabilities to access many of these wireless networks types at the same time. Reinforcing quality of service (QoS) in 4G wireless networks will be a major challenge because of varying bit rates, channel characteristics, bandwidth allocation and global roaming support among heterogeneous wireless networks. As a mobile user moves across access networks, to the issue of mapping resource reservations between different networks to maintain QoS behavior becomes crucial. To support global roaming and interoperability across heterogeneous wireless networks, it is important for wireless network operators to negotiate service level agreement (SLA) contracts relevant to the QoS requirements. Wireless IP traffic modeling (in terms of providing assured QoS) is still immature because the majority of the existing work is merely based on the characterization of wireless IP traffic without investigating the behavior of queueing systems for such traffic. To overcome such limitations, we investigate SLA parameter negotiation among heterogeneous wireless network operators by focusing on traffic engineering and QoS together for 4G wireless networks. We present a novel mechanism that achieves service continuity through SLA parameter negotiation by using a translation matrix, which maps QoS parameters between different access networks. The SLA matrix composition is modeled analytically based on the G/M/1 queueing system. We evaluate the model using two different scheduling schemes and we derive closed form expressions for different QoS parameters for performance metrics such as packet delay and packet loss rate. We also develop a discrete event simulator and conduct a series of simulation experiments in order to understand the QoS behavior of corresponding traffic classes.  相似文献   

6.
Mobile ad-hoc networks are networks spontaneously deployed from a set of mobile devices without requiring any fixed infrastructures. The increasing interest in this technology raises new research challenges towards providing them a management framework. Network users expect a service level as close as in regular fixed networks. A primary expectation is the capability to communicate (end-to-end) with the other network users. We present in this paper a framework for monitoring and optimizing this capability in mobile ad-hoc networks. Our normalized metric, called end-to-end connectivity degree, characterizes the number of nodes, that a node can reach in the entire network. We describe a management architecture to monitor this metric together with the network density, and illustrate how routing configuration can be performed to optimize it.  相似文献   

7.
Web services are gaining high popularity and importance on mobile devices. Connected to ad-hoc networks, they provide the possibility to establish spontaneously even complex service-based workflows and architectures. However, usually these architectures are only as stable and reliable as the underlying network infrastructure. Since topologies of mobile ad-hoc networks behave unpredictably, dependability within them can be only achieved with a dynamic replication mechanism. In this paper we present a highly flexible solution for replication and synchronization of stateful Web services and discuss the behavior of the implemented prototype in large-scale simulations.  相似文献   

8.
《Computer Networks》2002,38(1):25-41
Multimedia wireless networks are seen today as one of the key factors for the success of the global communication infrastructure in the near future. Such networks will have to handle a range of heterogeneous traffic classes with different QoS requirements. Their design, planning and control must be supported by suitable traffic models capable of dealing with a new set of constraints where QoS management and mobility play an important role.This paper proposes a traffic model for a cellular multimedia wireless network characterized by the integration of mobility and traffic management aspects. User mobility is modeled through a Markov renewal process, which allows for non-exponential cell residence times and may restrict the user mobility to existent paths in the system. A Markov-modulated fluid process is used to describe the changes in the bandwidth requirements of each mobile over the duration of its calls, including the periods where the mobile is inactive (without call).Based on the proposed model, the number of mobiles per class of traffic in a cell and the handoff processes are characterized. System performance results, such as new and handoff call blocking probabilities, for network planning are derived. Also, the distribution of the required capacity in a short time interval for network control is obtained. Simulations were carried out to validate the analytical results. The comparisons have shown that the integrated model may be regarded as a good basis to build useful teletraffic engineering tools for multimedia wireless networks.  相似文献   

9.
In the past, several authors have expressed their concerns over the poor congestion control in mobile wireless ad-hoc networks using traditional reference layer model. Many solutions were proposed to handle growing traffic and congestion in the network, using link layer information. Existing solutions have shown difficulties in dealing with congestion with varying packets drop. Moreover, ensuring the superior performance of congestion control schemes with traditional referenced layer model is a challenging issue, due to quick topology changes, dynamic wireless channel characteristics, link-layer contentions, etc. In this paper, we propose an effective cross-layer adaptive transmission method to handle the congestion in mobile wireless ad-hoc networks adequately. Simulation results exemplify the usefulness of the proposed method in handling congestion, and yields better results compared to existing approaches.  相似文献   

10.
王宴平  王一丁 《计算机工程》2007,33(11):196-198
移动终端的多样性和无线通信网络带宽不足、性能不稳定的特性,会造成移动终端无法快速和正确地访问互联网图像信息。针对此问题该文开展了WAP图像自适应传递技术的研究。该技术根据图像质量、移动终端和网络性能,构造图像自适应传递的最优目标函数,用改进的遗传算法求解出图像的调整参数,在保证信息服务质量的前提下,实现对互联网图像的快速和正确访问。试验结果证明了该方案的可行性。  相似文献   

11.
《Computer Networks》2002,38(5):631-643
In future wireless multimedia networks, user mobility management for seamless connection regarding realtime multimedia applications is one of the most important problems. In this paper we propose an opportunity-cost concept-based approach for adaptive bandwidth reservation with admission control for handover calls utilizing network traffic information. Excessive reservation guarantees low blocking probability of handover calls at the cost of high blocking probability of new calls. According to our survey, however, it may degrade bandwidth utilization while no prioritization for handover admissions degrades quality of service (QoS) for ongoing calls. We consider both QoS assurance and bandwidth utilization in order to optimize the amount of bandwidth to reserve for handover admissions. We believe that our scheme could be utilized as a guideline for cost-effective radio resource allocation in mobile multimedia networks.  相似文献   

12.
针对无线多媒体传感器网络对带宽和实时性等的高要求,建立了一种基于能量优化和跨层协同交互的分布式多路径路由技术,并应用于移动通信领域。该技术采用了遗传算法优化节点传输多媒体数据能耗,建立节点剩余能量预测模型,根据感知能量建立跨层协同工作体系,以较小代价在动态无线网络拓扑中选择最优路径。仿真实验和数学分析表明,该技术能够高效地支持实时移动视频通信,适合于计算能力、存储能力和能量等受限的无线多媒体传感器网络。  相似文献   

13.
蒋青  吉莉莉  唐伦  柴蓉  吕翊 《计算机应用研究》2010,27(11):4248-4250
针对异构网络中的带宽分配及网络的负载均衡问题,提出了一种异构无线网络负载均衡的联合优化模型,该模型在一定条件下利用用户的带宽进行负载成本和网络效用的建立,并通过求解网络与用户的关联矩阵来得到带宽在网络中的优化分配方案,使异构无线网络达到负载均衡。仿真结果表明,联合优化模型的结果在最小化负载成本以及优化网络总效用性能之间,它让用户通过在不同网络间的切换使网络带宽优化分配、网络负载达到均衡。  相似文献   

14.
Wireless mobile services are computing applications that run on handheld wireless devices. Such applications must work within the daunting constraints of the devices, which include memory, processing power, input capabilities, and size of display. It is therefore important that mobile services take into account the user’s context, optimize resource usage, and minimize input effort imposed on the user. In this paper, we present the design and implementation of a smart agent-enabled system for personalizing wireless mobile services and advertisements for Java 2 Micro Edition (J2ME) or Java ME, and Wireless Application Protocol (WAP) enabled devices. We use software agents for context filtering because such autonomous software entities have characteristics that can benefit mobile devices and the wireless environment, and the Composite Capability/Preference Profiles (CC/PP) standard for defining profiles for user preferences and device capabilities. The system incorporates the use of artificial neural networks to adaptively and iteratively learn to select the best available service based on contextual information. The system is evaluated using practical operating scenarios, as well as empirical data and results show an 87% success rate in the selection of the best available service.  相似文献   

15.
张行功  郭宗明 《软件学报》2011,22(10):2412-2424
随着无线网络技术的发展,基于无线多跳网的视频通信在智能交通、灾难应急和军事指挥等多个领域得到越来越广泛的应用.但是,如何保证无线视频的传输质量,是亟待解决的一个关键问题.已有多路径视频传输研究忽略了信道变化和路径间干扰.针对该问题,提出一种基于率失真预测的多路径选择优化算法.该算法不仅分析了网络拥塞对传输质量的影响,而...  相似文献   

16.
17.
Despite the popularity of watching videos online, challenges still remain in video streaming in many scenarios. Limited home broadband and mobile phone 3G bandwidths mean many users stream videos at compromised quality. To provide additional bandwidth for streaming, we propose CStream, a system that aggregates bandwidth from multiple cooperating users in a neighborhood environment for better video streaming. CStream exploits the fact that wireless devices have multiple network interfaces and connects cooperating users with a wireless ad-hoc network to aggregate their unused downlink Internet bandwidth. CStream dynamically generates a streaming plan to stream a single video using multiple connections, continuously adapting to changes in the neighborhood and variations in the available bandwidth. CStream is developed and evaluated on a test bed of computers, allowing for a detailed, controlled evaluation of performance. Analysis of the results shows a linear increase in throughput over single-connection streaming and improved video quality as the number of cooperating users in a neighborhood increase.  相似文献   

18.
The rapid increase of wireless networks and mobile computing applications has changed the landscape of networks security. The traditional way to protect networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new techniques to protect the wireless networks and mobile computing application. In this paper, we introduce the demands of ad-hoc environment. We focus on two areas of ad-hoc networks, wireless firewall and wireless intrusion detection. Furthermore, we particularly analyze the architecture, the problems and the challenges of current IDS techniques for wireless ad-hoc networks.  相似文献   

19.
ABSTRACT

A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. Example applications include battlefield communication, disaster recovery operations, and mobile conferencing. The dynamic nature of ad-hoc networks makes them more vulnerable to security attacks compared with fixed networks. Providing security in mobile ad-hoc networks has been a major issue in recent years. Most of the secure routing protocols proposed by researchers need a centralized authority or a trusted third party to provide authentication. This destroys the self-organizing nature of ad-hoc networks. Black Hole attack is one of the routing attacks that occur in MANETs. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this article, we propose an enhanced certificate based authentication mechanism, where nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme uses Multicast Ad-hoc On Demand Distance Vector Routing (MAODV) protocol as a support for certification. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2.  相似文献   

20.
移动Ad—hoc网络又称移动自组网、多跳网络,是一种特殊的、在不借助中心管理的情况下,在有限的范围内实现多个移动终端临时互联的网络。由于Adhoc网络自身的特殊性,其路由协议的设计与传统固定网络有很大不同,而且种类繁多,DSR协议便是其中一种。DSR协议也被称做动态源路由协议,它作为Ad—hoc网络的路由协议之一,最大特点是在发送的每个数据包中放入一个完整的、按序排列的路由信息,并且在传递数据包的过程中依赖着这些路由信息去完成工作。文章主要介绍了Ad—hoc网络中的DSR协议的工作方式,针对其安全性提出一种新的攻击模型——数据包攻击,并通过模拟实验,给出了数据包攻击的检测方法和防御策略,能够成功地发现并有效地阻碍数据包攻击。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号