首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 281 毫秒
1.
We propose, end-to-end (EtE), a novel EtE localized routing protocol for wireless sensor networks that is energy-efficient and guarantees delivery. To forward a packet, a node s in graph G computes the cost of the energy weighted shortest path (SP) between s and each of its neighbors in the forward direction towards the destination which minimizes the ratio of the cost of the SP to the progress (reduction in distance towards the destination). It then sends the message to the first node on the SP from s to x: say node x′. Node x′ restarts the same greedy routing process until the destination is reached or an obstacle is encountered and the routing fails. To recover from the latter scenario, local minima trap, our algorithm invokes an energy-aware Face routing that guarantees delivery. Our work is the first to optimize energy consumption of Face routing. It works as follows. First, it builds a connected dominating set from graph G, second it computes its Gabriel graph to obtain the planar graph G′. Face routing is invoked and applied to G′ only to determine which edges to follow in the recovery process. On each edge, greedy routing is applied. This two-phase (greedy–Face) EtE routing process reiterates until the final destination is reached. Simulation results show that EtE outperforms several existing geographical routing on energy consumption metric and delivery rate. Moreover, we prove that the computed path length and the total energy of the path are constant factors of the optimal for dense networks.
Essia Hamouda (Corresponding author)Email:
Nathalie MittonEmail:
Bogdan PavkovicEmail:
David Simplot-RylEmail:

Essia Hamouda   received the BSc and the MS degree in Industrial and Systems Engineering from the Ohio State University and the University of Florida, respectively. She received a PhD in Computer Science from the University of California Riverside. Her research interests are in the areas of sensor and mobile ad hoc networks and performance evaluation of computer networks. Nathalie Mitton   is currently an INRIA full researcher. Her research interests are mainly focused on theoretical aspects of self-organization, self-stabilization, energy efficient routing and neighbour discovery algorithms for wireless sensor networks as well as RFID middlewares. She is involved in several program and organization committees such as ADHOC NOW 2009, SANET 2008 and 2007. Bogdan Pavkovic   received a MSc in Microprocessor and computer electronics from the Faculty of Technical Sciences in Novi Sad, University of Novi Sad in May of 2009. From May to December of 2009 he was an intern at INRIA, Lille—Nord Europe, France. His research interest include embedded systems and applied electronic, robotics and automated vehicles, sensor and mobile ad hoc networks and RFID technologies. David Simplot-Ryl   received the PhD degree in computer science in 1997 from the University of Lille, France. He is now a professor at the University of Lille 1 and head of the POPS research team at the INRIA research centre Lille—Nord Europe. His research interests are in the areas of sensor and mobile ad hoc networks, mobile and distributed computing, and RFID technologies. He is editor and guest editor of several journals, cochair of conferences and workshop. Since 2008, he is scientific deputy of the INRIA research centre Lille—Nord Europe.   相似文献   

2.
The state-of-the-art for optimal data-gathering in wireless sensor networks is to use additive increase algorithms to achieve fair rate allocation while implicity trying to maximize network utilization. For the quantification of the problem we present a receiver capacity model to capture the interference existing in a wireless network. We also provide empirical evidence to motivate the applicability of this model to a real CSMA based wireless network. Using this model, we explicitly formulate the problem of maximizing the network utilization subject to a max–min fair rate allocation constraint in the form of two coupled linear programs. We first show how the max–min rate can be computed efficiently for a given network. We then adopt a dual-based approach to maximize the network utilization. The analysis of the dual shows the sub-optimality of previously proposed additive increase algorithms with respect to bandwidth efficiency. Although in theory a dual-based sub-gradient search algorithm can take a long time to converge, we find empirically that setting all shadow prices to an equal and small constant value, results in near-optimal solutions within one iteration (within 2% of the optimum in 99.65% of the cases). This results in a fast heuristic distributed algorithm that has a nice intuitive explanation—rates are allocated sequentially after rank ordering flows based on the number of downstream receivers whose bandwidth they consume. We also investigate the near optimal performance of this heuristic by comparing the rank ordering of the source rates obtained from the heuristic to the solutions obtained by solving the linear program.
Bhaskar KrishnamachariEmail:

Avinash Sridharan   received a B.E. in Electronics and Telecommunications from the Army Institute of Technology, affiliated to the University of Pune, India in 2000. In 2004 he received his M.S. in Electrical Engineering from the Ming Hsieh Department of Electrical Engineering at the University of Southern California, Los Angeles. He is currently pursuing a Ph.D. in Electrical Engineering at the University of Southern California, Los Angeles. His primary area of research is in designing rate control algorithms for Wireless Sensor Networks. He is specifically interested in applying various analytical tools, such as convex and stochastic optimization techniques, in designing and implementing practically viable rate control algorithms. Bhaskar Krishnamachari   is Philip and Cayley Early Career Chair Assistant Professor in the Ming Hsieh Department of Electrical Engineering at the University of Southern California’s Viterbi School of Engineering. He received his B.E. from The Cooper Union for the Advancement of Science and Art in 1998, and his M.S. and Ph.D. from Cornell University in 1999 and 2002 respectively, all in Electrical Engineering. He received the U.S. National Science Foundation’s CAREER award in 2004, and USC Viterbi School of Engineering’s outstanding junior faculty research award in 2005. He has authored a book titled Networking Wireless Sensors, published by Cambridge University Press. His research is focused on modeling, design and analysis of wireless embedded networks.   相似文献   

3.
We present an analytical framework and statistical models to accurately characterize the lifetime of a wireless link and multi-hop paths in mobile ad hoc networks (MANET). We show that the lifetimes of links and paths can be computed through a two-state Markov model. We also show that the analytical solution follows closely the results obtained through discrete-event simulations for two mobility models, namely, random direction and random waypoint mobility models. We apply these models to study practical implications of link lifetime on routing protocols. First, we compute optimal packet lengths as a function of mobility, and show that significant throughput improvements can be attained by adapting packet lengths to the mobility of nodes in a MANET. Second, we show how the caching strategy of on-demand routing protocols can benefit from considering the link lifetimes in a MANET. Finally,we summarize all the analytical results into a comprehensive performance analysis on throughput, delay and storage.
J. J. Garcia-Luna-AcevesEmail:

Xianren Wu   received the B.S. degree in Communication Engineering from Nanjing University of Posts and Telecommunications, Nanjing, China, in 1998 and the M.S. degree in Information Engineering from Beijing University of Posts and Telecommunications, Beijing, China, in 2001. He is currently a Ph.D. candidate at University of California at Santa Cruz, with research topic on analytical modeling and performance analysis of mobile ad hoc networks. And he received best paper award in SPECTS 2007 conference. His general research interest spans over mobile ad hoc networks, wireless communications and coding theory. Hamid R. Sadjadpour   received his B.S. and M.S. degrees from Sharif University of Technology with high honor and Ph.D. degree from University of Southern California in 1986, 1988, and 1996 respectively. After graduation, he joined AT&T as a member of technical staff, later senior technical staff member, and finally Principal member of technical staff at AT&T Lab. in Florham Park, NJ until 2001. In fall 2001, he joined University of California, Santa Cruz (UCSC) where he is now an Associate professor. He has served as technical program committee member in numerous conferences and as chair of communication theory symposium at WirelessCom 2005, and chair of communication and information theory symposium at IWCMC 2006, 2007, and 2008 conferences. He has been also Guest editor of EURASIP on special issue on Multicarrier Communications and Signal Processing in 2003 and special issue on Mobile Ad Hoc Networks in 2006, and is currently Associate editor for Journal of Communications and Networks (JCN). He has published more than 90 publications. His research interests include space-time signal processing, scaling laws for wireless ad hoc networks, performance analysis of ad hoc and sensor networks, and MAC layer protocols for MANETs. He is the co-recipient of International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) 2007 best paper award. He holds more than 13 patents, one of them accepted in spectrum management of T1.E1.4 standard. J. J. Garcia-Luna-Aceves   holds the Jack Baskin Chair of Computer Engineering at the University of California, Santa Cruz (UCSC), and is a Principal Scientist at the Palo Alto Research Center (PARC). Prior to joining UCSC in 1993, he was a Center Director at SRI International (SRI) in Menlo Park, California. He has been a Visiting Professor at Sun Laboratories and a Principal of Protocol Design at Nokia. Dr. Garcia-Luna-Aceves has published a book, more than 330 papers, and 24 U.S. patents. He has directed 25 Ph.D. theses and 20 M.S. theses since he joined UCSC in 1993. He has been the General Chair of the IEEE SECON 2005 Conference; Program Co-Chair of ACM MobiHoc 2002 and ACM Mobicom 2000; Chair of the ACM SIG Multimedia; General Chair of ACM Multimedia ’93 and ACM SIGCOMM ’88; and Program Chair of IEEE MULTIMEDIA ’92, ACM SIGCOMM ’87, and ACM SIGCOMM ’86. He has served in the IEEE Internet Technology Award Committee, the IEEE Richard W. Hamming Medal Committee, and the National Research Council Panel on Digitization and Communications Science of the Army Research Laboratory Technical Assessment Board. He has been on the editorial boards of the IEEE/ACM Transactions on Networking, the Multimedia Systems Journal, and the Journal of High Speed Networks. He is a Fellow of the IEEE and is listed in Marquis Who’s Who in America and Who’s Who in The World. He is the co-recipient of Best Paper Awards at the SPECTS 2007, IFIP Networking 2007, and IEEE MASS 2005 conferences, and the Best Student Paper Award of the 1998 IEEE International Conference on Systems, Man, and Cybernetics. He received the SRI International Exceptional-Achievement Award in 1985 for his work on multimedia communication and in 1989 for his work on routing algorithms.   相似文献   

4.
Sensor network generally detects target at a fixed frequency. Detection interval means time spacing between two adjacent detection attempts. While designing a sensor network for detection of target intrusion in a specific region, the interval should be carefully set with trade-off between power consumption and detection performance. This is because redundant power may be consumed if it is too short and the target may be missed if too long. In this paper, we study the determination of the maximum detection interval (MDI) with specified detection performance. Path exposure is adopted as a performance metric. For detection-oriented application, a novel method to evaluate the minimum path exposure (MPE) is developed. Then the MDI problem is formulated and its solution is presented. The factors influencing the MDI are extensively simulated.
Zhong LiuEmail:

KeBo Deng   received the B.S.E.E. degree from Nanjing University of Science and Technology, Nanjing, China, in 2003. Since 2003, he has been a Ph.D. candidate in the discipline of Communications and Information Systems at the Nanjing University of Science and Technology. His research interests mainly include sensor network and collaborative signal processing.
Zhong Liu   received the B.S.E.E. degree from Anhui University, Anhui, China, in 1983, the M.S.E.E and Ph.D. degrees from University of Electronic Science and Technology of China, Chengdu, in 1986 and 1988, respectively. Since 1989, he has been a member of the faculty of the Nanjing University of Science and Technology, Nanjing, China, where he is Professor of Electronic Engineering and Dean of School of Electronic and Optoelectronic Engineering. From 1991 to 1993, he was a Postdoctoral Research Fellow at the Kyoto University, Kyoto, Japan. From 1997 to 1998, he was a visiting scholar at the Chinese University of Hong Kong, Hong Kong, China. His research interests mainly include radar signal processing, collaborative signal processing and chaotic information dynamics.   相似文献   

5.
We investigate a unique wireless sensor network scheduling problem in which all nodes in a cluster send exactly one packet to a designated sink node in an effort to minimize transmission time. However, node transmissions must be sufficiently isolated either in time or in space to avoid collisions. The problem is formulated and solved via graph representation. We prove that an optimal transmission schedule can be obtained efficiently through a pipeline-like schedule when the underlying topology is either line or tree. The minimum time required for a line or tree topology with nodes is . We further prove that our scheduling problem is NP-hard for general graphs. We propose a heuristic algorithm for general graphs. Our heuristic tries to schedule as many independent segments as possible to increase the degree of parallel transmissions. This algorithm is compared to an RTS/CTS based distributed algorithm. Preliminary simulated results indicate that our heuristic algorithm outperforms the RTS/CTS based distributed algorithm (up to 30%) and exhibits stable behavior.
Esther A. HughesEmail:
  相似文献   

6.
Host Identity Protocol (HIP) is designed to provide secure and continuous communication by separating the identifier and locator roles of the Internet Protocol (IP) address. HIP also has efficient solutions to support host mobility. In this paper, we propose a location management scheme based on Domain Name System (DNS) for HIP. In the proposed scheme, a new DNS HIP resource record is used to translate a domain name into a host identity tag and an IP address. We also develop an analytical model to study the performance of DNS as location manager in terms of success rate, which takes into account the velocity of mobile nodes, the radius of a subnet, the regional network size, the packet transmission delay between the mobile node and the rendezvous server, and the packet processing delay at the DNS and the rendezvous server. The performance results show that for a reasonable range, the DNS is a feasible solution for location management with high success rate for HIP.
Hongke ZhangEmail:
  相似文献   

7.
Performance evaluation of two bandwidth allocation strategies in wireless mobile integrated services networks is carried out. Performances of the proposed strategies are compared with those of the traditional guard channels and threshold strategies. In the study, a single wireless cell which is accessed by voice and non-voice traffic types producing, respectively narrowband and wideband calls is considered. In the proposed strategies a number of channels are reserved in a fixed or dynamic fashion for the use of originating wideband calls in addition to the guard channels allocated for the handoff calls. The results indicate that the two strategies have comparable advantages and by manipulating the number of reserved channels, desired performance levels can be achieved. The dynamic reservation based strategy makes the system fairer for the originating wideband calls while maintaining low handoff dropping probability and acceptable channel utilization levels. On the other hand, the fixed reservation strategy provides a lower handoff call dropping at comparable channel utilization levels. The tradeoff is between improving the handoff call dropping versus the originating wideband call blocking. Both strategies provide better performance for the originating wideband calls compared with that provided by the traditional guard channels strategy.
Dervis Z. DenizEmail:
  相似文献   

8.
In wireless access, transmitter nodes need to make individual decisions for distributed operation and do not necessarily cooperate with each other. We consider a single-receiver random access system of non-cooperative transmitters with the individual objectives of optimizing their throughput rewards, transmission energy costs and delay costs. The non-cooperative transmitter behavior may be purely selfish or may also reflect malicious objectives of generating interference to prevent the successful transmissions of the other nodes as a form of denial of service attack. Our goal is to evaluate the interactions between selfish and malicious nodes that have the dual objectives of optimizing their individual performance measures and blocking the packet transmissions of the other selfish nodes. We assume saturated packet queues of infinite buffer capacities and consider a general multi-packet reception channel that allows packet captures in the presence of simultaneous transmissions. In this context, we formulate a non-cooperative random access game of selecting the individual probabilities of transmitting packets to a common receiver. We derive the non-cooperative transmission strategies in Nash equilibrium. The analysis provides insights for the optimal strategies to block random access of selfish nodes as well as the optimal defense mechanisms against the possible denial of service attacks of malicious nodes in wireless networks. The results are also compared with the cooperative equilibrium strategies that optimize the total system utility (separately under random access and scheduled access). A pricing scheme is presented to improve the non-cooperative operation. For distributed implementation, we formulate a repeated game of the best-response strategy updates and introduce adaptive heuristics (based on the channel feedback only) provided that the system parameters are not explicitly known at the individual transmitters.
Anthony EphremidesEmail:

Yalin Evren Sagduyu   received his B.S. degree from Bogazici University, Turkey, in 2000 in Electrical and Electronics Engineering, and M.S. and Ph.D. degrees from the University of Maryland at College Park in 2002 and 2007, respectively, in Electrical and Computer Engineering. He has been a graduate research assistant with the Institute for Systems Research at the University of Maryland. He is currently a postdoctoral fellow in the Department of Electrical Engineering and Computer Science at Northwestern University. His research interests are in the areas of design and optimization of wireless ad hoc and sensor networks, game theory applications in communication systems, multi-user information theory and network coding. Anthony Ephremides   received his B.S. degree from the National Technical University of Athens (1967), and M.S. (1969) and Ph.D. (1971) degrees from Princeton University, all in Electrical Engineering. He has been at the University of Maryland since 1971, and currently holds a joint appointment as professor in the Electrical Engineering Department and the Institute of Systems Research (ISR). He is co-founder of the NASA Center for Commercial Development of Space on Hybrid and Satellite Communications Networks established in 1991 at Maryland as an offshoot of the ISR. He was a visiting professor in 1978 at the National Technical University of Athens, Greece, and in 1979 at the Electrical Engineering and Computer Science Department of the University of California at Berkeley and INRIA, France. During 1985–1986 he was on leave at Massachusetts Institute of Technology and the Swiss Federal Institute of Technology, Zurich. He has been President of the Information Theory Society of the IEEE (1987), and served on the Board of the IEEE (1989 and 1990). His interests are in the areas of communication theory, communication systems and networks, queuing systems, signal processing, and satellite communications.   相似文献   

9.
In this paper, joint downlink power control and handoff design is formulated as optimization problems that are amenable to dynamic programming (DP). Based on the DP solutions which are impractical, two new algorithms suitable for next generation wireless networks are proposed. The first one is an integrated hard handoff/power control scheme that endeavors a tradeoff between three performance criteria: transmitted power, number of handoffs, and call quality. The second is a soft handoff/power control algorithm that also takes into account the additional cost of utilizing soft handoff. The proposed algorithms present a paradigm shift in integrated handoff/power control by capturing the tradeoff between user satisfaction and network overhead, therefore enjoy the advantages of joint resource allocation, and provide significant improvement over existing methods. The achievable gains and the tradeoffs in both algorithms are verified through simulations.
Mehmet AkarEmail:
  相似文献   

10.
IP address autoconfiguration of mobile nodes is highly desirable in the practical usage of most mobile ad hoc networks (MANETs). This paper proposes cluster-based autoconfiguration, a novel approach for the efficient address autoconfiguration of MANETs. The cluster structure derived from clustering techniques is used to manage address assignment and conflict resolution. By introducing the concept of virtual address agents (AAs), the proposed approach can be applicable to many existing clustering protocols. Finally, analysis and simulation demonstrate that the proposed scheme outperforms the previous autoconfiguration approaches.
Longjiang LiEmail:
  相似文献   

11.
Alternative representations based on order statistics are derived for the probability of error for orthogonal, biorthogonal, and transorthogonal signaling. Short programs in are developed for the computation of these representations and to furnish evidence to show that their performance is superior to the traditional Monte Carlo approach.
Saralees NadarajahEmail:
  相似文献   

12.
Wireless ATM (W-ATM) microcellular networks encounter severe problems during handovers. Microcellular solutions in W-ATM networks increase the network traffic control as a result of frequent handover requests. This paper presents a two-layer microcellular ATM architecture which optimizes the handoff blocking probability performance of priority subscribers (PS) in a congested urban area. The lower layer of the proposed architecture is based on a microcellular ATM solution for normal subscribers (NS) while the higher layer is based on a high altitude stratospheric platform (HASP) overlay solution for absorbing the traffic load of the existed handoff calls of PS. Analysis is performed using Markov state diagrams, in order to optimize the performance of W-ATM networks.
S. LouvrosEmail:
  相似文献   

13.
Cognitive radios sense spectrum activity and apply spectrum policies in order to make decisions on when and in what bands they may communicate. These activities go beyond what is done when traditional radios communicate. This paper examines the denial of service vulnerabilities that are opened by these additional activities and explores potential protection remedies that can be applied. An analysis of how vulnerable are victim cognitive radios to potential denial of service attacks is presented along different axis, namely the network architecture employed, the spectrum access technique used and the spectrum awareness model. The goal is to assist cognitive radio designers to incorporate effective security measures now in the early stages of cognitive radio development.
Amita SethiEmail:

Timothy X Brown   received his B.S. in physics from Pennsylvania State University and his Ph.D. in electrical engineering from California Institute of Technology in 1990 when he joined the Jet Propulsion Lab. In 1992 he joined Bell Communications Research. Since 1995 he has had a joint appointment with the Department of Electrical and Computer Engineering and the Interdisciplinary Telecommunications Program at the University of Colorado, Boulder. He is currently an Associate Professor. His research interests include adaptive network control, wireless communications systems, and spectrum policy. He is a recipient of the NSF CAREER Award. In 2003 he was chosen the Global Wireless Education Consortium’s (GWEC) wireless educator of the year. Amita Sethi   received her B. Tech degree from Mysore University, India in 1999. From January 2000 to September 2005, she has worked in the telecommunications software industry with Aricent Technologies (formerly, Flextronics Software Systems). Since January 2006, she is a Masters student at the University of Colorado, Boulder and is a research assistant in Professor Timothy Brown’s wireless networking lab. Her research interests include security in cognitive radio networks and wireless ad-hoc networks.   相似文献   

14.
The network addresses of principals in a mobile ad hoc network (MANET) are conventionally assumed to be public information. This may cause devastating consequences for MANETs deployed in hostile environments. For example, attackers can easily locate a target principal based his known network address and then launch a pinpoint attack. This paper identifies address privacy as a new security requirement to prevent attackers from ascertaining network addresses of MANET principals. We further present Swarms, the first solution to satisfying this requirement. Swarms eliminates the conventionally explicit one-on-one mappings between MANET principals and network addresses and allows any two principals to communicate while blind to each other’s address. We quantitatively measure the address privacy offered by Swarms via an entropy-based information-theoretic metric.
Kui RenEmail:

Yanchao Zhang   received the BE degree in computer communications from the Nanjing University of Posts and Telecommunications, Nanjing, China, in July 1999, the ME degree in computer applications from the Beijing University of Posts and Telecommunications, Beijing, in April 2002, the PhD degree in electrical and computer engineering from the University of Florida, Gainesville, in August 2006. Since then, he has been an assistant professor in the Department of Electrical and Computer Engineering, New Jersey Institute of Technology. His research interests include network and distributed system security, wireless networking, and mobile computing. He is an Associate Editor of IEEE Transactions on Vehicular Technology and has served as a TPC member for many conferences, including INFOCOM, MOBIHOC, ICDCS, and IWQoS. He is a member of the IEEE and the ACM. Kui Ren   is an assistant professor in the Electrical and Computer Engineering Department at Illinois Institute of Technology. He obtained his PhD degree in Electrical and Computer Engineering from Worcester Polytechnic Institute in 2007. He received his B. Eng and M. Eng both from Zhejiang University in 1998 and 2001, respectively. In the past, he has worked as a research assistant at Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, at Institute for Infocomm Research, Singapore, and at Information and Communications University, South Korea. His research interests include network security & privacy and applied cryptography with current focus on security & privacy in cloud computing, lower-layer attack & defense mechanisms for wireless networks, and sensor network security. His research is sponsored by US National Science Foundation. He serves as TPC member for many conferences including INFOCOM, ICDCS, WiSec, AsiaCCS, MASS, IWQoS, Securecomm, etc. He is a member of IEEE and ACM.   相似文献   

15.
On the Performance of Broadband Mobile Internet Access System   总被引:1,自引:1,他引:0  
In this paper, we evaluate the performance of OFDMA/TDD-based broadband mobile internet access system with the features of adaptive modulation & coding (AMC) and hybrid ARQ. We present a framework of system-level simulation and furthermore, intend to derive the insightful results towards understanding the performance of broadband mobile internet access system. The average system throughput as well as delay performance is evaluated for the different channel characteristics and system parameters, which allows for predicting the system capacity in the varying cellular network environment.
Chung G. KangEmail:
  相似文献   

16.
As the mobile networking technologies evolve, people are able to access the Internet through heterogeneous wireless access networks, such as WLAN, GPRS, 3G and Beyond 3G networks. For the coverage, bandwidth and cost of these heterogeneous mobile access networks are quite different, a mobile host may hand over among them, and this is called vertical handoffs. One of the most important issues for heterogeneous mobile networks is that vertical handoffs may degrade the quality of the time-sensitive streaming media services, even interrupt them. To overcome the problem, in the paper a multicast-based redundant streaming architecture is proposed. The proposed architecture is implemented in the all-IPv6 heterogeneous mobile networks. Five experiments are performed to evaluate the performance of the proposed architecture. The experimental results and the analysis show that the proposed architecture is capable of providing seamless streaming services even if the vertical handoffs or the traffic congestion occurs. Moreover, it is found that the traffic overhead is only 1.0368% per vertical handoff for each mobile access network, and thus the feasibility of the proposed architecture is demonstrated.
Jui-Ming ChenEmail:
  相似文献   

17.
In this paper, we study an algorithmic model for wireless ad hoc and sensor networks that aims to be sufficiently close to reality as to represent practical realworld networks while at the same time being concise enough to promote strong theoretical results. The quasi unit disk graph model contains all edges shorter than a parameter d between 0 and 1 and no edges longer than 1. We show that—in comparison to the cost known for unit disk graphs—the complexity results of geographic routing in this model contain the additional factor 1/d 2. We prove that in quasi unit disk graphs flooding is an asymptotically message-optimal routing technique, we provide a geographic routing algorithm being most efficient in dense networks, and we show that classic geographic routing is possible with the same asymptotic performance guarantees as for unit disk graphs if .
Aaron Zollinger (Corresponding author)Email:
  相似文献   

18.
Jitter buffer plays an important role in Voice over IP (VoIP) applications because it provides a key mechanism for achieving good speech quality to meet technical and commercial requirements. The main objective of this paper is to propose a new, simple-to-use jitter buffer algorithm as a front-end to conventional static or adaptive jitter buffer algorithms to provide improved performance, in terms of enhanced user-perceived speech quality and reduced end-to-end delay. Supported by signal processing features, the new algorithm, the so-called Play Late Algorithm, alters the playout delay inside a speech talkspurt without introducing unnecessary extra end-to-end delay. The results show that the new algorithm achieves the best performance under different network conditions when compared to conventional static and adaptive jitter buffer algorithms. The results reported here are based on live tests and emulated network conditions on real mobile phone prototypes. The mobile phone prototypes use AMR codec and support full IP/UDP/RTP stack with IPSec function in some of the tests. The method for perceived speech quality measurement is based on the ITU-T standard for speech quality evaluation (PESQ).
Zizhi QiaoEmail:
  相似文献   

19.
The paper addresses the need of controling the access of terminals with guaranteed ressources on the high dynamic systems offered by LEO satellite constellations. A call-access-control scheme that guarantees the reservation of permanent resources of satellite constellations in $O(\sqrt(n)\hbox{log}(n))The paper addresses the need of controling the access of terminals with guaranteed ressources on the high dynamic systems offered by LEO satellite constellations. A call-access-control scheme that guarantees the reservation of permanent resources of satellite constellations in time, where n is the number of user present in the system, is described. A tradeoff between computational time of call-access-control and optimization of the use of the spectrum is identified. Some experimental results are presented.
Jér?me GaltierEmail:
  相似文献   

20.
A multihop mobile wireless network can be a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. Mobile nodes communicate with each other using multihop wireless links. Each mobile node in the network also acts as a router, which forwards data packets to other nodes. A main challenge in the design of this mobile network is the development of dynamic routing protocols that can efficiently find routes between two communicating nodes that often change the network topology drastically and unpredictably. All communications between the nodes inside the mobile network and the global Internet must be maintained, although the mobile router (MR) connecting the other mobile network to the global Internet must change their address; and mobile nodes suffer from end-to-end delay and handoff delay. That is to say, hereafter the packets sailing for the mobile node would not be routed directly for the destination, but will always make a detour by way of HA to the target node. In this paper, we suggest Information-based Connection Algorithm that adds keyword management method in order to resolve such a problem, simulations are carried out with NS-2 for performance evaluation. The results of the simulations show an improvement on throughput and handoff delay, and consequently the QoS improvement.
Doo-Kwon Baik (Corresponding author)Email:
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号