首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 219 毫秒
1.
Symmetric relaying is a method of relaying in which the relays can decode the message of other relays in the network in addition to the source message. In this paper an achievable rate is presented for a symmetric two-relay network based on partial decoding. The strategy make use of familiar techniques such as product binning, regular encoding/sliding window decoding and regular encoding/backward decoding. The proposed rate is shown to subsume the previously proposed rate for feed-forward relay network based on decode-andforward. This rate is also used to establish the capacity of a generalisation of Aref network called `semideterministic relay network with no interference at the relays? and independent relay inputs.  相似文献   

2.
The National Institute of Standards and Technology (NIST) has developed a number of complete fiber-based high-speed quantum key distribution (QKD) systems that includes an 850 nm QKD system for a local area network (LAN), a 1310 nm QKD system for a metropolitan area network (MAN), and a 3-node quantum network controlled by a network manager. This paper discusses the key techniques used to implement these systems, which include polarization recovery, noise reduction, frequency up-conversion detection based on a periodically polled lithium nitrate (PPLN) waveguide, custom high-speed data handling boards and quantum network management. Using our quantum network, a QKD secured video surveillance application has been demonstrated. Our intention is to show the feasibility and sophistication of QKD systems based on current technology.  相似文献   

3.
In future high-speed photonic packet switching networks, it is highly desirable to carry out robust alloptical header recognition to provide high-throughput routing. The authors present a pulse-position modulation header processing (PPM-HP) scheme, offering significantly reduced routing table size and employing a single bitwise AND operation to carry out correlation of the packet header with the entire routing table entries. The downsized routing table also offers multiple transmission modes (unicast, multicast and broadcast) in the optical layer and improves core network scalability where the number of core/edge nodes could be altered without the need for changing the number of routing table entries. The authors present modelling and simulation of the packet switching router based on PPM-HP. Noise propagation and crosstalk incurred in a multiple-hop routing scenario are investigated. The simulation results are presented and compared with the theoretical calculations.  相似文献   

4.
Seo SW  Yu BY  Prucnal PR 《Applied optics》1997,36(14):3142-3146
We propose an all-optical packet-switching scheme in multihop shuffle networks in which deflection routing is used as its contention-resolution principle. In our scheme only partial address information in the packet header is read before a routing decision is made. Because the new scheme does not involve a time-consuming look-up table, extremely low latency operation is possible at each node. Moreover, because the number of demultiplexers at each node can be kept constant even though the network size changes, cost-effective design of a node is possible.  相似文献   

5.
Loop free alternate (LFA) is a routing protection scheme that is currently deployed in commercial routers. However, LFA cannot handle all single network component failure scenarios in traditional networks. As Internet service providers have begun to deploy software defined network (SDN) technology, the Internet will be in a hybrid SDN network where traditional and SDN devices coexist for a long time. Therefore, this study aims to deploy the LFA scheme in hybrid SDN network architecture to handle all possible single network component failure scenarios. First, the deployment of LFA scheme in a hybrid SDN network is described as a 0-1 integer linear programming (ILP) problem. Then, two greedy algorithms, namely, greedy algorithm for LFA based on hybrid SDN (GALFAHSDN) and improved greedy algorithm for LFA based on hybrid SDN (IGALFAHSDN), are proposed to solve the proposed problem. Finally, both algorithms are tested in the simulation environment and the real platform. Experiment results show that GALFAHSDN and IGALFAHSDN can cope with all single network component failure scenarios when only a small number of nodes are upgraded to SDN nodes. The path stretch of the two algorithms is less than 1.36.  相似文献   

6.
Multi-constrained quality-of-service (QoS) routing is used to find routes in a network to satisfy multiple independent QoS constraints. This problem is considered to be NP-complete, and most existing QoS routing algorithms are based on maintaining a global network state at every node. A multi-constrained, flooding-limited, QoS routing method to deal with limited available resources and minimum computation in a dynamic environment is proposed. The solution is based on decomposition of a routing area and a restriction in the exchange of routing information. It reduces the size of the control messages, restricts the amount of routing information, minimises the overhead from the flooding of control traffic and decreases the complexity of path selection. It is also proved that the flooding-limited-path heuristic can achieve very high performance by maintaining entries in each node, which indicates that the performance of the limited-path heuristic is not sensitive to the number of constraints. Simulation results show that this protocol provides better performance than other protocols, especially with regards to end-to-end delay, throughput and packet loss.  相似文献   

7.
在分析了无线传感器网络中传统的LEACH和LEACH-C路由协议基础上,结合MTE路由协议思想,提出了一种新的改进型分簇分层路由协议(improved clustering hierarchical routing protocol,ICH).文中簇首节点可以采用多跳方式传输数据包,且在选择中继节点时考虑节点剩余能量,对进入下一轮的条件进行了限制.实验表明,改进后的ICH协议的节点存活率比LEACH-C好.  相似文献   

8.
We show how quantum key distribution on a multi-user, multi-path, network can be used to establish a key between any two end-users in an asynchronous fashion using the technique of bit-transport. By a suitable adaptation of our previous secret-sharing scheme we show that an attacker has to compromise all of the intermediate relays on the network in order to obtain the key. Thus, two end-users can establish a secret key provided they trust at least one of the network relays.  相似文献   

9.
Wu  Y. Yang  K. Shen  J. 《Communications, IET》2008,2(1):98-106
Integrated cellular networks (ICNs) are normally constructed by adding ad hoc overlay on cellular networks to solve the latter's flexibility and capacity expansion problems. In such networks, routing plays a critical role in finding a route to divert congested traffic from a congested cell to another less crowded cell. Much work has been conducted on routing protocols in ICNs, whereas no dedicated work has been found for an important aspect of routing, namely source selection. The process of a source selection can be an algorithm that is designed for selecting a proper pseudo- source to release its occupying channel to a blocked mobile user. Consequently, this pseudo-source diverts its ongoing call to another cell by using a free channel in a neighbour cell via a relaying route. Based on an introduction of a representative ICN infrastructure, three source selection algorithms are proposed. Both numerical analysis and evaluation results are presented, which show the efficiency of the algorithms and their different abilities in adapting to different network situations, such as traffic density and cell capacity.  相似文献   

10.
In recent years, with the rapid development of the Internet and wireless communication technology, wireless Ad hoc networks have received more attention. Due to the limited transmission range and energy of nodes in Ad hoc networks, it is important to establish a reliable and energy-balanced transmission path in Ad hoc networks. This paper proposes an energy-based dynamic routing protocol based on the existing AODV routing protocol, which has the following two aspects of improvement: (1) In the route discovery process, a node selects a suitable route from the minimum energy consumption route and the energy-balanced route designed in this paper according to a “Mark” bit that representing remaining energy of a node. (2) Based on (1), a route interruption update strategy was proposed to restart the route discovery process when node energy was used excessively. Simulation results demonstrate that compared with AODV and other existing routing protocols, proposed algorithm can reduce network energy consumption and balance node energy, thus extending the network lifetime.  相似文献   

11.
Louri A  Sung H 《Applied optics》1995,34(29):6714-6722
The interconnection network structure can be the deciding and limiting factor in the cost and the performance of parallel computers. One of the most popular point-to-point interconnection networks for parallel computers today is the hypercube. The regularity, logarithmic diameter, symmetry, high connectivity, fault tolerance, simple routing, and reconfigurability (easy embedding of other network topologies) of the hypercube make it a very attractive choice for parallel computers. Unfortunately the hypercube possesses a major drawback, which is the complexity of its node structure: the number of links per node increases as the network grows in size. As an alternative to the hypercube, the binary de Bruijn (BdB) network has recently received much attention. The BdB not only provides a logarithmic diameter, fault tolerance, and simple routing but also requires fewer links than the hypercube for the same network size. Additionally, a major advantage of the BdB network is a constant node degree: the number of edges per node is independent of the network size. This makes it very desirable for large-scale parallel systems. However, because of its asymmetrical nature and global connectivity, it poses a major challenge for VLSI technology. Optics, owing to its three-dimensional and globalconnectivity nature, seems to be very suitable for implementing BdB networks. We present an implementation methodology for optical BdB networks. The distinctive feature of the proposed implementation methodology is partitionability of the network into a few primitive operations that can be implemented efficiently. We further show feasibility of the presented design methodology by proposing an optical implementation of the BdB network.  相似文献   

12.
Development of energy-efficient data collection and routing schemes for Underwater Wireless Sensor Networks (UWSNs) is a challenging issue due to the peculiarities of the underlying physical layer technology. Since the recharging or replacement of sensor nodes is almost impossible after deployment, the critical issue of network lifetime maximization must be considered right from the beginning of designing the routing schemes. We propose a mobile sink (MS)-based data collection scheme that can extend network lifetime, taking into account power-constrained sensor nodes, partitioned networks with geographically distant data collection points and periodic monitoring applications with delay-tolerance. Lifetime extension is achieved by mitigating the ‘sink neighbourhood problem’ and by deferring the data transmissions until the MS is at the most favourable location for data transfer. Unlike the models available for terrestrial WSNs, we consider non-zero travel time of the MS between data collection points, thus making our model more realistic for UWSNs, both connected and partitioned. The performance of the proposed mobility-assisted data collection scheme is thoroughly investigated using both analytical and simulation models. The analytical results are compared to those of existing models to assess their effectiveness and to investigate the trade-offs. Results show that, with a network size of 60 nodes, the network lifetime achieved by the proposed model is 188% higher than that of static sink model and 91% higher than that of mobile sink model (MSM). The proposed maximum lifetime routing scheme is implemented in the network simulation platform OMNET++, for validating the analytical results as well as for evaluating other performance metrics that are not tractable via analytical methods. Both analytical and simulation results demonstrate the superiority of the proposed model in capturing realistic network conditions and providing useful performance indicators prior to network deployment.  相似文献   

13.
Small and medium enterprises (SMEs) have difficulties identifying appropriate technology opportunities under severe capability and resource constraints. To tackle this issue, we suggest a method for identifying technology opportunities that is customized to the existing technologies and technological capabilities of SMEs through two-stage patent analysis. An expert-based technological attribute–application table makes it possible to identify basic opportunities by multiple keyword matching. Also, non-traditional opportunities can be explored and identified by an iterative action–object analysis of patents. This two-stage patent analysis approach provides managers with a way of identifying specific technology opportunities in which their existing technologies can be utilized to the maximum extent, therefore helping them to develop technology strategies.  相似文献   

14.
In this article, we introduce a new bi-directional dual-relay selection strategy with its bit error rate (BER) performance analysis. During the first step of the proposed strategy, two relays out of a set of N relay-nodes are selected in a way to optimize the system performance in terms of BER, based on the suggested algorithm which checks if the selected relays using the max-min criterion are the best ones. In the second step, the chosen relay-nodes perform an orthogonal space-time coding scheme using the two-phase relaying protocol to establish a bi-directional communication between the communicating terminals, leading to a significant improvement in the achievable coding and diversity gain. To further improve the overall system performance, the selected relay-nodes apply also a digital network coding scheme. Furthermore, this paper discusses the analytical approximation of the BER performance of the proposed strategy, where we prove that the analytical results match almost perfectly the simulated ones. Finally, our simulation results show that the proposed strategy outperforms the current state-of-the-art ones.  相似文献   

15.
对分布式哈希表(DHT)系统的安全脆弱性问题进行了研究,提出了多种安全性优化策略,并给出了一个原型系统。进行了真实网络实验,实验数据表明,现有DHT网络易受索引毒害和路由污染攻击,产生的错误查询结果甚至会引发更大规模的网络安全事件。通过改进一个个DHT系统的节点ID生成机制、路由表更新机制和搜索路径选择机制,从系统运行的各个阶段提升其安全场,抵御攻击者共谋。基于上述方法设计的原型系统在保证平均查询跳数增加不到1跳的情况下,在共谋攻击节点占比60%的网络中,将系统查询成功率保持在65%以上,其方法适用于各种分布式哈希表结构,具有重要的实际应用前景。  相似文献   

16.
Abstract

One of the key design issues for the next generation of IP routers is the IP lookup mechanism. IP lookup is an important action in a router, that is, to find the next hop for each incoming packet with a longest‐prefix‐match address in the routing table. In this paper, we propose an IP lookup mechanism with the number of memory accesses for an IP lookup being one in the best case and being four in the worst case. The forwarding table needed by our mechanism is small enough to fit in the SRAM. For example, a large routing table with 40000 routing entries can be compacted to a forwarding table of 260KBytes in our scheme.  相似文献   

17.
Abstract

Quantum cryptography has been shown to be an effective technology for the secure distribution of keys on point-to-point optical links. We show how the existing techniques can be extended to allow multi-user secure key distribution on optical networks. We demonstrate that using network configurations typical of those found in passive optical network architectures any of the current quantum key distribution protocols can be adapted to implement secure key distribution from any user to any other user. An important feature of these adapted protocols is that the broadcaster, or service provider on the network, does not have to be trusted by the two users who wish to establish a key.  相似文献   

18.
A mobile agent based on-demand quality of service (QoS) unicast routing scheme for supporting multimedia applications is proposed that considers bandwidth, delay and packet loss as QoS metrics for feasible path computation. A mobile agent is employed to find multiple QoS paths and select a best path among them to preserve resources so as to increase call success ratio and network bandwidth utilisation as well as adapt to network dynamics. The scheme is simulated in various network scenarios (sparse and dense networks) to verify performance and operation effectiveness, and compared with RSVP-based QoS routing by using an internet routing protocol. The results demonstrate significant improvements in call success ratio and network bandwidth utilisation compared with RSVP-based QoS routing, both in case of sparse and dense networks. Benefits of the agent-based scheme are adaptability, flexibility, and support for component-based software engineering features such as software reuse, customisation and maintainability  相似文献   

19.
孙树光 《中国测试技术》2005,31(3):21-22,39
介绍变配电所微机保护整组动作时间的测试,提出测试数据数学处理方法及在运行中的应用,解决小级差时保护整定时间的精确调整及故障分析问题。  相似文献   

20.
We present geographic multicast routing (GMR), a new multicast routing protocol for wireless sensor networks. It is a fully localized algorithm that efficiently delivers multicast data messages to multiple destinations. It does not require any type of flooding throughout the network. Each node propagating a multicast data message needs to select a subset of its neighbors as relay nodes towards destinations. GMR optimizes the cost over progress ratio where the cost is equal to the number of neighbors selected for relaying and the progress is the overall reduction of the remaining distances to destinations. Such neighbor selection achieves a good tradeoff between the bandwidth of the multicast tree and the effectiveness of the data distribution. Our cost-aware neighbor selection is based on a greedy set merging scheme achieving a O(Dnmin(D,n)3) computation time, where n is the number of neighbors of current node and D is the number of destinations. As in traditional geographic routing algorithms, delivery to all destinations is guaranteed by applying face routing when necessary. Our simulation results show that GMR outperforms position based multicast in terms of cost of the trees and computation time over a variety of networking scenarios  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号