共查询到20条相似文献,搜索用时 0 毫秒
1.
Professor Michael B. Pursley Harlan B. Russell 《International Journal of Wireless Information Networks》1996,3(1):19-27
Reliable data distribution within multiple-hop spread-spectrum packet radio networks requires high performance from the network protocols. The high variability in quality among the links and the unique characteristics of frequency-hop spread-spectrum signaling impose special requirements for network protocols that are to be employed in frequency-hop packet radio networks. These features can be exploited in the forwarding protocols by allowing multiple packets to be included in each forwarding attempt. The use of multiple-packet transmissions exploits the capture property of frequency-hop signaling, and it reduces the overhead required for acknowledgments. A potential trade-off arises because the use of multiple-packet transmissions increases the throughput, but in some situations it can also increase the delay. Two new transmission protocols that employ multiple-packet transmissions are described, and their performance is evaluated. 相似文献
2.
Using directional antennas in wireless mobile ad hoc networks can greatly improve the transmission range as well as the spatial
reuse. However, it will also cause some problems such as deafness problem and hidden terminal problem, which greatly impair
the network performance. This paper first proposes a MAC protocol called Selectively Directional MAC (SDMAC) that can effectively
address these problems and significantly improve the network throughput. Then two improvements on SDMAC are proposed. The
first one is to improve the network throughput by scheduling the packets in the queue (a scheme called Q-SDMAC), thus the
head-of-line (HOL) blocking problem can be addressed. The second one is to relax the assumption that each node knows the relative
directions of its neighboring nodes and use caches to buffer those relative directions (a scheme named Q-SDMAC using cache).
Extensive simulations show that: (1) SDMAC can achieve much better performance than the existing MAC protocols using directional
antennas; (2) The network throughput can be significantly improved by scheduling the packets in the queue; (3) Using caches
can still achieve high network throughput when nodes are moving; and (4) Network throughput decreases when directional antennas
have side lobe gain.
相似文献
Yuguang Fang (Corresponding author)Email: |
3.
4.
移动通信网络应用范围的不断扩展和新型业务的涌现需要有更多的特殊安全协议来保障其安全性.Yi Mu和Vijay Varadharajan提出了两种分别应用于同一服务区和不同服务区的端端保密通信协议 .本文首先分析了其不足之处,然后设计了同时适用于同一归属局和不同归属局移动用户之间进行保密通信的安全协议(分别称为域内和域间保密通信协议),最后,分析了上述协议的各项性能.与原有协议相比,本文所提出的协议不仅在安全性和其他性能上有较大改进,而且更具普遍性和统一性. 相似文献
5.
6.
We design a transport protocol that uses artificial neural networks (ANNs) to adapt the audio transmission rate to changing conditions in a mobile ad hoc network. The response variables of throughput, end-to-end delay, and jitter are examined. For each, statistically significant factors and interactions are identified and used in the ANN design. The efficacy of different ANN topologies are evaluated for their predictive accuracy. The Audio Rate Cognition (ARC) protocol incorporates the ANN topology that appears to be the most effective into the end-points of a (multi-hop) flow, using it to adapt its transmission rate. Compared to competing protocols for media streaming, ARC achieves a significant reduction in packet loss and increased goodput while satisfying the requirements of end-to-end delay and jitter. While the average throughput of ARC is less than that of TFRC, its average goodput is much higher. As a result, ARC transmits higher quality audio, minimizing root mean square and Itakura–Saito spectral distances, as well as several parametric distance measures. In particular, ARC minimizes linear predictive coding cepstral (sic) distance, which closely correlates to subjective audio measures. 相似文献
7.
In wireless sensor network, a large number of sensor nodes are distributed to cover a certain area. Sensor node is little in size with restricted processing power, memory, and limited battery life. Because of restricted battery power, wireless sensor network needs to broaden the system lifetime by reducing the energy consumption. A clustering‐based protocols adapt the use of energy by giving a balance to all nodes to become a cluster head. In this paper, we concentrate on a recent hierarchical routing protocols, which are depending on LEACH protocol to enhance its performance and increase the lifetime of wireless sensor network. So our enhanced protocol called Node Ranked–LEACH is proposed. Our proposed protocol improves the total network lifetime based on node rank algorithm. Node rank algorithm depends on both path cost and number of links between nodes to select the cluster head of each cluster. This enhancement reflects the real weight of specific node to success and can be represented as a cluster head. The proposed algorithm overcomes the random process selection, which leads to unexpected fail for some cluster heads in other LEACH versions, and it gives a good performance in the network lifetime and energy consumption comparing with previous version of LEACH protocols. 相似文献
8.
Abidalrahman Moh’d Nauman Aslam William Phillips William Robertson 《Ad hoc Networks》2013,11(8):2588-2604
This paper presents a novel link-layer encryption protocol for wireless sensor networks. The protocol design aims to reduce energy consumption by reducing security related communication overhead. This is done by merging security related data of consecutive packets. The merging (or combining packets) based on simple mathematical operations helps to reduce energy consumption by eliminating the requirement to send security related fields in headers and trailers. We name our protocol as the Compact Security Protocol referred to as C-Sec. In addition to energy savings, the C-Sec protocol also includes a unique security feature of hiding the packet header information. This feature makes it more difficult to trace the flow of wireless communication, and helps to minimize the cost of defending against replay attacks. We performed rigorous testing of the C-Sec protocol and compared it with well-known protocols including TinySec, MiniSec, SNEP and Zigbee. Our performance evaluation demonstrates that the C-Sec protocol outperforms other protocols in terms of energy savings. We also evaluated our protocol with respect to other performance metrics including queuing delay and error probability. 相似文献
9.
Due to having a large bandwidth to support Gbps-level data rate, terahertz communication attracts more and more attention in recent years. However, there are few medium access control (MAC) protocols for terahertz ultra-high data-rate wireless networks, which affects the research and application of terahertz communications. To address this problem and to achieve ultra-high data-rate wireless access with terahertz communication, a novel MAC protocol, called medium access control for terahertz communication (MAC-TC), is proposed. Through designing a new channel access scheme, a new superframe structure, and related key parameters, MAC-TC can support a maximum data rate up to 10 Gbit/s even higher. Theoretical analysis and simulation results show that our proposed MAC protocol realizes the function of medium access control and attains a maximum data rate of 18.3 Gbit/s, which is 2 times higher than 5.78 Gbit/s, the theoretical maximum data rate of IEEE 802.15.3c standard. 相似文献
10.
We investigate broadcasting and energy preservation in ad hoc networks. One of the best known algorithm, the Broadcast Incremental Power (BIP) protocol, constructs an efficient spanning tree rooted at a given node. It offers very good results in terms of energy savings, but its computation is centralized and it is a real problem in ad hoc networks. Distributed versions have been proposed, but they require a huge transmission overhead for information exchange. Other localized protocols have been proposed, but none of them has ever reached the performances of BIP. In this paper, we propose and analyze an incremental localized version of this protocol. In our method, the packet is sent from node to node based on local BIP trees computed by each node in the broadcasting chain. Local trees are constructed within the k-hop neighborhood of nodes, based on information provided by previous nodes, so that a global broadcasting structure is incrementally built as the message is being propagated through the network. Only the source node computes an initially empty tree to initiate the process. Discussion and results are provided where we argue that k = 2 is the best compromise for efficiency. We also discuss potential conflicts that can arise from the incremental process. We finally provide experimental results showing that this new protocol obtains very good results for low densities, and is almost as efficient as BIP for higher densities. 相似文献
11.
V. P. Demesticha E. C. Tzifa P. P. Demestichas M. E. Theologou 《International Journal of Communication Systems》1998,11(2):79-91
Future mobile communcation systems will have to provide sophisticated services at quality levels comparable with those provided by fixed systems. An additional requirement is that these systems should be deployed by minimally impacting the existing infrastructures. In this respect an important component of future mobile communication systems is their intelligent network segment, which contains the logic of the services provided and the relevant data required for providing these services. In the context of this paper we study the problem of designing this segment. Our reference system is UMTS, but the practices presented herein may be applied to other systems as well. We identify two major problems, the first at the Mobility and Services Control Point (MSCP) level and the second at the Mobility and Services Data Point (MSDP) level. Our aim in this paper is the following. First, the overall design process is decomposed into a sequence of well-defined problems. Second, the problems are formally stated and theoretically formulated. Third, owing to the computational complexity associated with the theoretical formulations, we take the first steps towards the design of approximate (heuristic) algorithms. Finally we provide results and draw subsequent conclusions. © 1998 John Wiley & Sons, Ltd. 相似文献
12.
Enrico Del Re Romano Fantacci Giovanni Giambene 《International Journal of Satellite Communications and Networking》1994,12(1):25-32
This paper deals with an efficient dynamic channel allocation (DCA) technique suitable for applications in mobile satellite cellular networks. A cost function is defined to allow an optimum selection of channels to be allocated on demand. A mobility model suitable for low earth orbit (LEO) satellite systems is presented. The performance of the novel DCA technique in terms of call blocking probability has been derived by simulations. The obtained results are compared with those achieved by a fixed channel allocation (FCA) technique to show a better behaviour. 相似文献
13.
Brahmjit Singh 《Wireless Personal Communications》2007,43(3):879-887
In future generation mobile cellular systems, position location of mobile terminal is expected to be available. In this paper,
we propose an initiation algorithm for intersystem handover based on the combination of position location of mobile terminal
and the absolute signal strength thresholds. Global System for Mobile communication (GSM) and Universal Mobile Telecommunication
Systems (UMTS) networks are considered for interworking. The proposed algorithm reduces the handover rate by around 50% and
thus improves the network resource efficiency as compared to that based on signal strength thresholds only. 相似文献
14.
Multiprotocol Label Switching (MPLS) has gained momentum in recent years as an effective tool to provide Quality of Service
(QoS) in a variety of networks. This has in turn created active interest in the area of recovery in MPLS based networks. A
number of recovery schemes for MPLS domains have been proposed in recent years. However, the current schemes lack support
for recovery in dynamic network topologies. In this paper, a new flexible signaling protocol for LSP rerouting in dynamic
network environments is introduced. The signaling protocol recovers from node and link failures reactively, taking a local
approach to LSP reestablishment. The performance of the signaling protocol is evaluated through simulations. Results indicate
that the protocol can effectively and efficiently handle rerouting in dynamic networks with a low protocol signaling overhead
as compared to contemporary MPLS rerouting protocols. This would enable the MPLS based IP-QoS support mechanisms to extend
to dynamic network topologies.
A preliminary version of this work was presented at the 2004 IEEE International Conference on Communications, Paris.
Ramprasad Nagarajan has received his B.E. degree in Electronics and Telecommunications from Pune University, India in 1999. He received his M.S.
degree in Electrical and Computer Engineering from the Ohio State University, Columbus, OH in 2004. Currently, he is a Wireless
Network Engineer in Nortel Networks, specializing in the area of network architecture and design of wireless packet core networks.
Ramprasad’s current research interests include the study of wireless network evolution trends, next generation wireless networks,
network capacity planning, performance analysis, and optimization. He is a member of the IEEE.
Eylem Ekici has received his B.S. and M.S. degrees in Computer Engineering from Bogazici University, Istanbul, Turkey, in 1997 and 1998,
respectively. He received his Ph.D. degree in Electrical and Computer Engineering from Georgia Institute of Technology, Atlanta,
GA, in 2002. Currently, he is an assistant professor in the Department of Electrical and Computer Engineering of the Ohio
State University, Columbus, OH. Dr. Ekici’s current research interests include wireless sensor networks, vehicular communication
systems, next generation wireless systems, and space-based networks, with a focus on routing and medium access control protocols,
resource management, and analysis of network architectures and protocols. He also conducts research on interfacing of dissimilar
networks. 相似文献
15.
G. Anastasi D. Grillo L. Lenzini E. Mingozzi 《International Journal of Wireless Information Networks》1996,3(4):243-252
The traffic performance of third-generation mobile systems is greatly influenced by the multiple access protocols used in the radio access subsystem. The paper introduces an access protocol, SIR (Service Integration Radio Access), which has the potential for accommodating the requirements of speech and bursty data traffic in an efficient way. SIR is evolved from a protocol (PRMA ++) studied in the framework of a TDMA-based version of the European Universal Mobile Telecommunication System (UMTS) and uses dedicated mechanisms for data bandwidth request collection and servicing. 相似文献
16.
本文首先介绍了无线宽带网络的技术背景和空中接口,然后讨论了无线宽带通信的核心技术-无线ATM的基本原理,如网体系结构、信元格式、协议栈,以及关键技术等,最后给出了现有的无线宽带网络的实验系统和它的标准化进程。 相似文献
17.
18.
19.
We discuss the design and implementation of network and transport layer protocols for mobile networking. The network architecture used is unique in that it separates the mobile network(s) from fixed networks and provides connectivity between the two via special gateways. These gateways split all transport connections and provide QoS guarantees to mobile users for all their open connections. We provide summaries of our protocols and discuss possible improvements. 相似文献
20.
In mobile ad hoc networks, node mobility causes frequent link failures, thus invalidating the routes containing those links. Once a link is detected broken, an alternate route has to be discovered, incurring extra route discovery overhead and packet latency. The traffic is also interrupted at the transport layer, and proper traffic recovery schemes have to be applied. To reduce the frequency of costly route re-discovery procedures and to maintain continuous traffic flow for reliable transport layer protocols, we suggest discovering long lifetime routes (LLR). In this paper, we first propose g-LLR, a global LLR discovery algorithm, that discovers LLRs of different route lengths for any given pair of nodes. We then propose a distributed LLR discovery scheme (d-LLR) that discovers two of the most desirable LLRs through one best-effort route discovery procedure. Simulations show that the lifetimes of the routes discovered by d-LLR are very close to those discovered by g-LLR. Simulations also show that the performance of different transport layer protocols is greatly improved by using LLRs. More importantly, traffic can remain continuous using the provided LLRs. D-LLR can be implemented as an extension to existing ad hoc routing protocols, and it improves the performance of transport layer protocols without modifications on them. 相似文献