共查询到20条相似文献,搜索用时 15 毫秒
1.
With the advent of multimedia over wireless local area networks, the IEEE 802.11e standard was proposed to incorporate Quality
of Service (QoS). It has been found that the throughput of Transmission Control Protocol (TCP) is less than that of User Datagram
Protocol (UDP) in the IEEE 802.11e. This is because the TCP acknowledgment packets are queued up at the access points. In
this paper, two types of TCP acknowledgment prioritizing schemes are proposed. The proposed schemes improve the overall throughput
of TCP while maintaining the QoS requirements. We also analyze the problem of starvation of lower priority traffic and its
effects on the performance of lower priority TCP traffic. The proposed dynamic scheme of TCP acknowledgment prioritization
aims at improving the throughput of the lower priority TCP traffic under heavy network load while maintaining the QoS requirements
of the higher priority traffic. The schemes have been verified through extensive simulation. 相似文献
2.
One of the major design issues in wireless ATM is the support of inter‐switch handoff. An inter‐switch handoff occurs when
a mobile terminal moves to a new base station connecting to a different switch. Recently, a two‐phase handoff protocol has
been proposed to support inter‐switch handoff in wireless ATM networks. With the aim of shortening handoff delay while using
the network resources efficiently, the two‐phase handoff protocol employs path extension for each inter‐switch handoff, followed
by path optimization if necessary. To implement the two‐phase handoff protocol efficiently, we need to determine when to trigger
path optimization. In this paper, we propose and analyze three path optimization schemes, namely: periodic, exponential, and
Bernoulli, for the two‐phase handoff protocol. The design objective is to determine the time to invoke path optimization such
that the average cost per connection is minimized. We develop a discrete time analytical model and a discrete‐event simulation
model for comparing the performance of the three path optimization schemes. Results indicate that the Bernoulli path optimization
scheme outperforms the other two schemes by providing a lower average cost per connection. The proposed models can also be
adapted to analyze other path optimization schemes in general.
This revised version was published online in July 2006 with corrections to the Cover Date. 相似文献
3.
Sivalingam Krishna M. Chen Jyh‐Cheng Agrawal Prathima Srivastava Mani B. 《Wireless Networks》2000,6(1):73-87
This paper describes the design and analysis of a low‐power medium access control (MAC) protocol for wireless/mobile ATM networks.
The protocol – denoted EC‐MAC (energy conserving medium access control) – is designed to support different traffic types with
quality‐of‐service (QoS) provisions. The network is based on the infrastructure model where a base station (BS) serves all
the mobiles currently in its cell. A reservation‐based approach is proposed, with appropriate scheduling of the requests from
the mobiles. This strategy is utilized to accomplish the dual goals of reduced energy consumption and quality of service provision
over wireless links. A priority round robin with dynamic reservation update and error compensation scheduling algorithm is
used to schedule the transmission requests of the mobiles. Discrete‐event simulation has been used to study the performance
of the protocol. A comparison of energy consumption of the EC‐MAC to a number of other protocols is provided. This comparison
indicates the EC‐MAC has, in general, better energy consumption characteristics. Performance analysis of the proposed protocol
with respect to different quality‐of‐service parameters using video, audio and data traffic models is provided.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
4.
Daneshrad Babak Cimini Leonard J. Carloni Manny Sollenberger Nelson 《Mobile Networks and Applications》1997,2(4):305-314
An elegant means by which highspeed burst wireless transmission can be accomplished with small amounts of overhead is through a novel technique referred to as clusteredOFDM (Cimini et al., 1996). By using OFDM modulation with a long symbol interval, clusteredOFDM overcomes the complex and costly equalization requirements associated with single carrier systems. Moreover, the need for highly linear power amplifiers typically required in OFDM systems is alleviated through the use of multiple transmit antennas combined with nonlinear coding. The clustering technique also leads to a natural implementation of transmit diversity. This paper reports on preliminary results on the performance of a clusteredOFDM system as well as the design and implementation of a clusteredOFDM transmitter. The prototype transmitter can deliver 7.5 Mbps, and it is expected that this data rate could be easily tripled with existing technology in a second generation system. The paper also describes the architectural tradeoffs made in order to reduce the hardware complexity of the boards as well as some experimental results showing the operation of the transmitter. 相似文献
5.
Simulation and analysis of node throughput using smart antenna in wireless mesh networks 总被引:1,自引:0,他引:1
ZHANG Yong WEI Yi-fei SONG Jun-de School of Electronic Engineering Beijing University of Posts Telecommunications Beijing ChinaZHANG Li-kun The Translation Department of the Second Artillery Troops of PLA Beijing China 《中国邮电高校学报(英文版)》2007,14(2):28-32
Smart antenna technology is introduced to wireless mesh networks. Smart antennas based wider-range access medium access control (MAC) protocol (SWAMP) is used as MAC protocol for IEEE 802.11 mesh networks in this study. The calculation method of node throughput in chain and arbitrary topology is proposed under nodes fairness guarantee. Network scale and interference among nodes are key factors that influence node throughput. Node distribution pattern near the gateway also affects the node throughput. Experiment based on network simulator-2 (NS-2) simulation platform compares node throughput between smart antenna scenario and omni-antenna scenario. As smart antenna technology reduces the bottle collision domain, node throughput increases observably. 相似文献
6.
Eddie C. Shek Son K. Dao Yongguang Zhang Darrel J. Van Buer Giovanni Giuffrida 《Mobile Networks and Applications》2000,5(4):273-284
The need for rapid deployment and user mobility suggest the use of a hybrid satellitewireless network infrastructure for important situation awareness and emergency response applications. An Intelligent Information Dissemination Service (IIDS) has been developed to support the dissemination and maintenance of extended situation awareness throughout such a network information infrastructure in a seamless manner. One of the goals of IIDS is to transparently handle the mismatches in characteristics of satellite and terrestrial wireless networks, allow effective utilization of available bandwidth, and support timely delivery of highly relevant information. IIDS achieves the above by implementing user profile aggregation that incrementally aggregates users into communities sharing common interests to enable multicastbased information dissemination. Based on the user grouping, semantic profile matching customizes information streams based on matching user group interest profiles. By taking into account expected changes in user profiles, profileoriented data dissemination achieves predictive push and caching that anticipates future user needs and minimizes latency of data request by making data available before they are explicitly requested. Finally, bandwidthaware filtering adapts information streams to resource bandwidth availability to gracefully hide the bandwidth mismatch between the satellite and wireless links in the hybrid network infrastructure. The IIDS software has been deployed on the Digital Wireless Battlefield Network (DWBN) that integrates commercial offtheshelf satellite and wireless products into a heterogeneous satellite/wireless hybrid network for supporting wireless mobile multimedia services. 相似文献
7.
In this paper, we study time-parallel simulation of wireless networks based upon the concept of the perturbation induced by a networking event and present a layer-by-layer analysis of the impact of perturbations on the wireless network. This analysis allows us to propose several methods to improve the accuracy of time-parallel simulation. We describe an implementation based on the widely used ns-2 simulator and on the iterative extension of the warmup period. We introduce a method for initial state approximation which can improve the accuracy of the simulation for table-driven ad hoc routing protocols. A series of experiments show that on typical scenarios time-parallel simulation leads to a significant speedup while maintaining a high level of accuracy. 相似文献
8.
This paper provides an analytic method to determine how many paging channels can be simultaneously used with traffic channels
in the same CDMA forward link. So far, since one or two paging channels are enough to convey control messages from bases to
mobiles, little considerations have been given to the paging channel configuration. CDMA network operators, however, recently
plan to provide optional services which highly utilize the paging channel. Thus, more paging channels are required for the
latest situation. Since the total number of channels that can be used in the forward link is limited by the interfering cellular
environments, less traffic channels should be used if additional paging channels are required. It is the objective of this
paper to examine the capacity of forward link in terms of paging and traffic channels so as to determine the impact of introducing
value‐added services via paging channels. Different capacity regions are presented for various cellular environments.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
9.
This paper introduces a new model and methodological approach for dealing with the probabilistic nature of mobile networks based on the theory of random graphs. Probabilistic dependence between the random links prevents the direct application of the theory of random graphs to communication networks. The new model, termed Random Network Model, generalizes conventional random graph models to allow for the inclusion of link dependencies in a mobile network. The new Random Network Model is obtained through the superposition of Kolmogorov complexity and random graph theory, making in this way random graph theory applicable to mobile networks. To the best of the authors' knowledge, it is the first application of random graphs to the field of mobile networks and a first general modeling framework for dealing with adhoc network mobility. The application of this methodology makes it possible to derive results with proven properties. The theory is demonstrated by addressing the issue of the establishment of a connected virtual backbone among mobile clusterheads in a peertopeer mobile wireless network. Using the Random Network Model, we show that it is possible to construct a randomized distributed algorithm which provides connectivity with high probability, requiring exponentially fewer connections (peertopeer logical links) per clusterhead than the number of connections needed for an algorithm with a worst case deterministic guarantee. 相似文献
10.
Y. G. SRINIVASA 《International Journal of Electronics》2013,100(3):313-319
The all-pass networks are dealt with in the time-domain, and plots of the step response versus time arc drawn for first-, second-, third- and fourth-order systems. 相似文献
11.
The FAMANCS protocol is introduced for wireless LANs and adhoc networks that are based on a single channel and asynchronous transmissions (i.e., no time slotting). FAMANCS (for floor acquisition multiple access with nonpersistent carrier sensing) guarantees that a single sender is able to send data packets free of collisions to a given receiver at any given time. FAMANCS is based on a threeway handshake between sender and receiver in which the sender uses nonpersistent carrier sensing to transmit a requesttosend (RTS) and the receiver sends a cleartosend (CTS) that lasts much longer than the RTS to serve as a busy tone that forces all hidden nodes to back off long enough to allow a collisionfree data packet to arrive at the receiver. It is shown that carrier sensing is needed to support collisionfree transmissions in the presence of hidden terminals when nodes transmit RTSs asynchronously. The throughput of FAMANCS is analyzed for singlechannel networks with and without hidden terminals; the analysis shows that FAMANCS performs better than ALOHA, CSMA, and all prior proposals based on collision avoidance dialogues (e.g., MACA, MACAW, and IEEE 802.11 DFWMAC) in the presence of hidden terminals. Simulation experiments are used to confirm the analytical results. 相似文献
12.
JAN J. MULAWKA 《International Journal of Electronics》2013,100(5):359-373
The recent advances in implementation of analogue MOS switched-capacitor (SC) networks have established a need for new methods of analysis of these circuits. In this paper an analysis method of SC networks operating with an n-phase clock is presented. The method is based on a building block approach which facilitates the derivation of a z-domain equivalent circuit. The equivalent circuit is then analysed using the flow-graph technique. 相似文献
13.
In order to support diverse communication‐intensive real‐time and non‐real‐time data flows over a scarce, varying and shared
wireless channel with location‐dependent and bursty errors, we define a service model that has the following characteristics:
short‐term fairness among flows which perceive a clean channel, long‐term fairness for flows with bounded channel error, worst‐case
delay bounds for packets, short‐term throughput bounds for flows with clean channels and long‐term throughput bounds for all
flows with bounded channel error, expanded schedulable region, and support for both delay sensitive and error sensitive data
flows. We present the wireless fair service algorithm, and show through both analysis and simulation that it achieves the
requirements of the service model in typical wireless network environments. The key aspects of the algorithm are the following:
(a) an enhanced fair queueing based service scheme that supports decoupling of delay and bandwidth, (b) graceful service compensation
for lagging flows and graceful service degradation for leading flows, (c) support for real‐time delay sensitive flows as well
as non‐real‐time error sensitive flows, and (d) an implementation within the framework of the simple and robust CSMA/CA wireless
medium access protocol.
This revised version was published online in July 2006 with corrections to the Cover Date. 相似文献
14.
We propose a framework for quality‐of‐service (QoS) provisioning for multimedia services in next generation wireless access
networks. This framework aims at providing a differentiated treatment to multimedia traffic flows at the link layer, which
can be broadly classified as real‐time (or delay‐sensitive) and non‐real‐time (or delay‐tolerant). Various novel schemes are
proposed to support the differential treatment and guarantee QoS. These schemes include bandwidth compaction, channel reservation
and degradation, with the help of which a call admission and control algorithm is developed. The performance of the proposed
framework is captured through analytical modeling and simulation experiments. Analytically, the average carried traffic and
the worst case buffer requirements for real‐time and non‐real‐time calls are estimated. Simulation results show up to 21%
improvement in the admission probability of real‐time calls and up to 17% improvement in the admission probability of non‐real‐time
calls, when various call control techniques like bandwidth compaction are employed. Using our channel reservation technique,
we observe a 12% improvement in the call admission probability compared to another scheme proposed in the literature.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
15.
MA Shu-hui JI Hong YUE Guang-xin School of Telecommunication Engineering Beijing University of Posts Telecommunications Beijing China 《中国邮电高校学报(英文版)》2007,14(2):7-13
A novel topology scheme, cell with multiple mobile sinks method (CMMSM), is proposed in this article for the collection of information and for the environment monitoring in wireless sensor networks. The system consists of many static sensors, scattered in a large scale sensing field and multiple mobile sinks, cruising among the clusters. Conservation of energy and simplification of protocol are important design considerations in this scheme. The noninterference topology scheme largely simplifies the full-distributed communication protocol with the ability of collision avoidance and random routing. The total number of cluster heads in such a topology was analyzed, and then an approximate evaluation of the total energy consumption in one round was carried out. Simulation results show that CMMSM can save considerable energy and obtain higher throughput than low-energy adaptive clustering hierarchy (LEACH) and geographical adaptive fidelity (GAF). 相似文献
16.
In this paper, we consider a dual-hop wireless communication system with non-regenerative relay node and we study its performance over the α–μ fading channels. Specifically, we derive a closed-form expression for the moment generating function (MGF) of the harmonic mean of end-to-end signal-to-noise ratio (SNR) assuming the α–μ fading models. We also derive closed-form expressions for the end-to-end outage probability and average bit error rate of coherent modulation techniques. The obtained expressions can be reduced to study the performance of dual-hop communication systems over other fading channel models by using the proper values for the α and μ parameters. Numerical results are provided and conclusion remarks are drawn. 相似文献
17.
SUN Danning Moonsik Kang 《通信学报》2006,27(Z1):208-213
The Performance of a heterogeneous IP QoS provision service model was analyzed. This model utilized RSVP technique to set up dynamic resource reservation interface between the user and the network, meanwhile, DiffServ technique was utilized to transmit class-based packets in different per hop behaviors. Furthermore, accordingly queue management and packets scheduling mechanisms were presented for end-to-end QoS guarantees and appropriate cooperation of network elements. 相似文献
18.
The performance of a joint CDMA/PRMA protocol with heavy-tailed ON/OFF source has been studied. Compared with the random access scheme, the PRMA protocol improves the system performance (such as packet loss, throughput) whether the traffic is SRD or LRD. The less bursty traffic is, the greater the improvement. The buffer design should take into account knowledge about the network traffic such as the presence or absence of the Noah effect in a typical source, especially of on, the intensity of the Noah effect of ONperiod. The smaller on is, the smaller the buffering gain, and the more packets will be lost. LRD has impacts on the overall system performance. The Noah effect, especially off, the intensity of the Noah effect of OFFperiod, has significant impact on the overall system performance such as capacity, time delay, etc. As off gets closer to 1, the traffic becomes more bursty, the system capacity is decreased and time delay is increased. 相似文献
19.
20.
The desire to provide universal connectivity for mobile computers and communication devices is fueling a growing interest
in wireless packet networks. To satisfy the needs of wireless data networking, study group 802.11 was formed under IEEE project
802 to recommend an international standard for Wireless Local Area Networks (WLANs). A key part of the standard are the Medium
Access Control (MAC) protocols. Given the growing popularity of real‐time services and multimedia based applications it is
critical that the 802.11 MAC protocols be tailored to meet their requirements. The 802.11 MAC layer protocol provides asynchronous,
time‐bounded, and contention free access control on a variety of physical layers. In this paper we examine the ability of
the point coordination function to support time bounded services. We present our proposal to support real‐time services within
the framework of the point coordination function and discuss the specifics of the connection establishment procedure. We conduct
performance evaluation and present numerical results to help understand the issues involved.
This revised version was published online in July 2006 with corrections to the Cover Date. 相似文献