首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In dense traffic areas, wireless local area networks (WLANs) suffer from interference problems due to the congestion of the open and unlicensed ISM band. To mitigate these problems, a terminal-embedded beamforming framework is proposed. This beamforming is capable of focusing the transmission and the reception in the direction of the relevant access point. At the same time, the framework is backward compatible with existing WLAN networks. The beam- forming enabled terminal benefits in terms of capacity, security, and energy efficiency without requiring any changes on the network side or requiring new investment on the part of network providers. The beamforming solution is seen as an attractive value-added feature, as well as a low-cost solution for the future WLAN terminal design. This opens the door for mobile device manufacturers to include the proposed solution in their product line. In this work, the backward- compatibility challenges are addressed, and possible solutions and limitations are discussed. A prototype design built on a laptop computer also is described. The experimental results show a significant capacity increase in both an interference-free scenario and an interference-limited scenario.  相似文献   

2.
Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how IDbased cryptography can be effectively applied to address various security problems in resourceconstrained wireless networks.  相似文献   

3.
Wireless sensor networks are an important research area that has attracted considerable attention. Most of this attention, however, has been concentrated on WSNs that collect scalar data such as temperature and vibration. Scalar data can be insufficient for many applications such as automated surveillance and traffic monitoring. In contrast, camera sensors collect visual data, which are rich in information and hence offer tremendous potential when used in WSNs. However, they raise new challenges such as the transmission of visual data with high computational and bandwidth requirements in mainly low-power visual sensor networks. In this article we highlight the challenges and opportunities of VSNs. We discuss major research issues of VSNs, specifically camera coverage optimization, network architecture, and low-power visual data processing and communication, and identify enabling approaches in this area.  相似文献   

4.
Discrete sequence modeling and prediction is an important goal and a challenge for pervasive computing. Mobile clients? data request forecasting and location tracking in wireless cellular networks are characteristic application areas of sequence prediction in pervasive computing. This article presents information-theoretic techniques for discrete sequence prediction. It surveys, classifies, and compares the state-of-the-art solutions, suggesting routes for further research by discussing the critical issues and challenges of prediction in wireless networks.  相似文献   

5.
With the advent of smaller devices having higher computational capacity and wireless communication capabilities, the world is becoming completely networked. Although, the mobile nature of these devices provides ubiquitous services, it also poses many challenges. In this article, we look in depth at the problem of addressing in wireless ad hoc networks and the currently available techniques and protocols for both IPv4 and IPv6. We present an exhaustive study of the literature and summarize the features of each technique. We believe that this analysis will be helpful for network and application designers, as well as for researchers.  相似文献   

6.
This article focuses on the problem of quality of service mapping between layers in a cascade. Protocol stacks in telecommunications networks are composed of functional layers. QoS provision depends on the performance achieved at each layer and is based on functions performed at layer interfaces. In practice, QoS derives from reliable physical and link layers that can offer specific transport services to upper network layers. The data flows (or bundles of flows) generated by the upper layers (e.g., the network layers) are forwarded down to a physical interface that transports the information along a channel that provides, if possible, the expected QoS to the upper layers. The action is called vertical QoS mapping and poses many challenges for a communication scientist, in particular if it is applied to wireless interfaces. This article states the definition of vertical QoS mapping, proposes a formal separation between technology-dependent and technology-independent layers, models each functional layer as a battery of buffers, generalizes the relation between layers through a chain of buffers in a cascade, formalizes the theoretical problems of vertical QoS mapping, and suggests possible solutions that use dynamic bandwidth allocation schemes.  相似文献   

7.
For successful data delivery, the destination nodes should be listening to the medium to receive data when the sender node starts data communication. To achieve this synchronization, there are different rendezvous schemes, among which the most energy-efficient is utilizing wakeup receivers. Current hardware technologies of wake-up receivers enable us to evaluate them as a promising solution for wireless sensor networks. In this article the benefits achieved with wake-up receivers are investigated along with the challenges observed. In addition, an overview of state-of-the-art hardware and networking protocol proposals is presented. As wake-up receivers offer new opportunities, new potential application areas are also presented and discussed.  相似文献   

8.
The ITU-T definition of next generation networks includes the ability to make use of multiple broadband transport technologies and to support generalized mobility. Next generation networks must integrate several IP-based access technologies in a seamless way. In this article, we first describe the requirements of a mobility management scheme for multimedia real-time communication services; then, we report a survey of the mobility management schemes proposed in the recent literature to perform vertical handovers between heterogeneous networks. Based on this analysis, we propose an application-layer solution for mobility management that is based on the SIP protocol and satisfies the most important requirements for a proper implementation of vertical handovers. We also implemented our proposed solution, testing it in the field, and proving its overall feasibility and its interoperability with different terminals and SIP servers.  相似文献   

9.
To enhance the preparedness of federal and state agencies to effectively manage federal or state recovery efforts in response to a broad spectrum of emergencies, we propose a hybrid adaptive network that will adopt currently available off-the-shelf wireless network devices and integrate them quickly into a scalable, reliable, and secure network with a minimum of human intervention for configuration and management. This model will serve as the framework for various rescue missions for securing and distributing critical resources. We investigate different technologies and network strategies and integrate them into the proposed network model to provide seamless support to heterogeneous environments including wireline nodes, ad hoc and sensor network nodes, and network devices based on different standards. In this article we present the network architecture and identify the key technical aspects of its management, security, QoS, and implementation.  相似文献   

10.
The primary challenge in wireless sensor network deployment is the limited network lifetime due to finite-capacity batteries. Hence, the vast majority of research efforts thus far have focused on the development of energy-efficient communication and computing mechanisms for WSNs. In this article a fundamentally different approach and hence completely new WSN paradigm, the wireless passive sensor network, is introduced. The objective of the WPSN is to eliminate the limitation on system lifetime of the WSN. In a WPSN power is externally supplied to the sensor network node via an external RF source. Modulated backscattering is discussed as an alternative communication scheme for WPSNs. The feasibility is investigated along with the open research challenges for reliable communication and networking in WPSNs.  相似文献   

11.
3GPP Release 5 is the first step toward an all-IP cellular network. While Release 99 is still heavily based on a core network inherited from 2G networks, Release 5 introduces a new core network architecture based on IETF protocols. In particular, SIP is used for initiating, managing, and terminating media sessions. However, the use of SIP can result in a significant increase of the signaling and computational loads inside the core network, due to its larger message size and increased requirements on network nodes. This article compares the core network signaling loads of 3GPP Release 99 and Release 5, and elaborates on possible enhancements to improve the bandwidth efficiency of the signaling in Release 5.  相似文献   

12.
?Cognitive radio? has emerged as a new design paradigm for next-generation wireless networks that aims to increase utilization of the scarce radio spectrum (both licensed and unlicensed). Learning and adaptation are two significant features of a cognitive radio transceiver. Intelligent algorithms are used to learn the surrounding environment, and the knowledge thus obtained is utilized by the transceiver to choose the frequency band (i.e., channel) of transmission as well as transmission parameters to achieve the best performance. In this article we first provide an overview of the different components to achieve adaptability in a cognitive radio transceiver and discuss the related approaches. A survey of the cognitive radio techniques used in the different wireless systems is then presented. To this end, a dynamic opportunistic channel selection scheme based on the cognitive radio concept is presented for an IEEE 802.11-based wireless mesh network.  相似文献   

13.
Certificate validation is much more complex in mobile ad hoc networks than in conventional networks because online access to trusted authorities is not always guaranteed. For this reason, we require new solutions to overcome both the lack of infrastructure and the limited capabilities of several user devices. In this article we study the application of different mechanisms for certificate validation in MANETs and present a cooperative mechanism for certificate validation suitable for MANETs.  相似文献   

14.
Cognitive radio is a novel concept that enables wireless systems to sense the environment, adapt, and learn from previous experience to improve the quality of the communication. However, CR requires a flexible and adaptive physical layer in order to perform the required tasks efficiently. In this article, CR systems and their requirement of a physical layer are discussed, and the orthogonal frequency division multiplexing technique is investigated as a candidate transmission technology for CR. The challenges that arise from employing OFDM in CR systems are identified. The cognitive properties of some OFDM-based wireless standards also are discussed to indicate the trend toward a more cognitive radio.  相似文献   

15.
Readiness in deployment and flexibility in radio resource configuration are the main features of future wireless communication systems. A cooperative wireless communication system (CWCS) is proposed to follow the same principle, aiming at improving the overall performance of a wireless system with the support of advanced beam-hopping techniques. In this article, we propose a multiloop radio resource management mechanism for the CWCS based on the organized beam-hopping (OBH) technique. The proposed RRM mechanism enhances the robustness of the CWCS, based on the OBH technique working with fast temporal-spatial variant traffic. The results show that the system performance can be further improved by hybrid transmission and event- driven access management techniques.  相似文献   

16.
Peer-to-peer communications is a major trend in wireless Internet. In a P2P system, the calling peer must identify the network address of the called peer before establishing a P2P connection. This article proposes iP2P, a hybrid P2P system for mobile devices. iP2P utilizes the short message service as the control protocol to identify the address of the called peer. Our approach provides an efficient identification mechanism without the requirement for the maintenance of a centralized registrar server in a hybrid P2P system. We also show how iP2P can integrate effectively with the existing Network Address Translation traversal mechanisms to solve the private IP address issue.  相似文献   

17.
This article introduces an open wireless architecture (OWA) mobile terminal design, focusing on the open baseband processing platform, to support different existing and future wireless communication standards through multi-dimensional open baseband processing modules with open interface parameters and baseband management systems. The article describes a multilayer, open architecture platform to maximize system flexibility and minimize terminal power consumption, so as to provide an integrated and converged next-generation wireless and mobile communication terminal system. The OWA platform is fully compatible with the computer architecture, with interface-based rather than transmission-specific system architecture, for complete openness and simplicity.  相似文献   

18.
The emerging IEEE 802.22-based wireless regional area network technology will use the same radio spectrum currently allocated for TV service. This standard will use the concept of cognitive radio based on dynamic spectrum access to provide wireless access services in a large coverage area. A brief overview of the current state of the IEEE 802.22 standard is provided with a particular emphasis on the spectrum management (i.e., spectrum sensing and dynamic spectrum access) in this standard. Key research issues related to spectrum trading among TV broadcasters, WRAN service providers, and IEEE 802.22-based cognitive radio users are identified. To this end, a hierarchical spectrum trading model is presented to analyze the interaction among WRAN service providers, TV broadcasters, and WRAN users. In this model a double auction is established among multiple TV broadcasters and WRAN service providers who sell and buy the radio spectrum (i.e., TV bands), respectively. Again, multiple WRAN service providers compete with each other by adjusting the service price charged to WRAN users. We propose a joint spectrum bidding and service pricing model for WRAN service providers to maximize their profits. A non-cooperative game is formulated to obtain the solution in terms of the number of TV bands and the service price of a service provider. Numerical results are presented on the performance of this joint spectrum bidding and pricing model.  相似文献   

19.
In the military and emergency preparedness class of applications, wireless sensor networks have a number of desirable characteristics, such as being autonomous systems that can be deployed in a remote - possibly hostile - environment and can perform tasks like battlefield surveillance or enemy tracking, as well as monitor the security of military facilities. One of the main challenges in this kind of application is security. Due to their key role in WSNs and also their fragility, localization systems can be the target of an attack that could compromise the entire functioning of a WSN and lead to incorrect military plans and decision making, among other problems. In this article we show how current localization systems are vulnerable to these security attacks, and how existing techniques can be used to prevent or impede these attacks in WSNs.  相似文献   

20.
The presence of ubiquitous connectivity provided by wireless communications and mobile computing has changed the way humans interact with information. At the same time, it has made communication security and privacy a hot-button issue. In this article we address the security and privacy concerns in wireless access networks. We first discuss the general cryptographic means to design privacy-preserving security protocols, where the dilemma of attaining both security and privacy goals, especially user accountability vs. user privacy, is highlighted. We then present a novel authentication framework that integrates a new key management scheme based on the principle of separation of powers and an adapted construction of Boneh and Shacham's group signature scheme, as an enhanced resort to simultaneously achieve security, privacy, and accountability in wireless access networks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号