首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Admission control in IEEE 802.11e wireless LANs   总被引:2,自引:0,他引:2  
Although IEEE 802.11 based wireless local area networks have become more and more popular due to low cost and easy deployment, they can only provide best effort services and do not have quality of service supports for multimedia applications. Recently, a new standard, IEEE 802.11e, has been proposed, which introduces a so-called hybrid coordination function containing two medium access mechanisms: contention-based channel access and controlled channel access. In this article we first give a brief tutorial on the various MAC-layer QoS mechanisms provided by 802.11e. We show that the 802.11e standard provides a very powerful platform for QoS supports in WLANs. Then we provide an extensive survey of recent advances in admission control algorithms/protocols in IEEE 802.11e WLANs. Our survey covers the research work in admission control for both EDCA and HCCA. We show that the new MAC-layer QoS schemes and parameters provided in EDCA and HCCA can be well utilized to fulfill the requirements of admission control so that QoS for multimedia applications can be provided in WLANs. Last, we give a summary of the design of admission control in EDCA and HCCA, and point out the remaining challenges.  相似文献   

2.

Energy conservation in wireless sensor networks (WSNs) is a fundamental issue. For certain surveillance applications in WSN, coverage lifetime is an important issue and this is related to energy consumption significantly. In order to handle these two interlinked aspects in WSN, a new scheme named Weight based Coverage Enhancing Protocol (WCEP) has been introduced. The WCEP aims to obtain longer full coverage and better network life time. The WCEP is based on assigning different weight values to certain governing parameters which are residual energy, overlapping degree, node density and degree of sensor node. These governing parameters affect the energy and coverage aspects predominantly. Further, these four different parameters are prime elements in cluster formation process and node scheduling mechanisms. The weight values help in selection of an optimal group of Cluster Heads and Cluster Members, which result in enhancement of complete coverage lifetime. The simulation results indicate that WCEP performs better in terms of energy consumption also. The enhancement of value 24% in full coverage lifetime has been obtained as compared to established existing techniques.

  相似文献   

3.
Existing opportunistic network coding architectures (e.g., COPE) rely on pseudobroadcast to deliver a coded packet to multiple receivers in a single transmission. Only the primary receiver acknowledges the reception by MAC-layer acknowledgements (synchronous ACKs) and the other receivers receive the coded packet by overhearing and acknowledge the reception by asynchronous ACKs, which are usually piggybacked in outgoing data packets. In realistic wireless networks, this mechanism may cause unnecessary retransmissions if asynchronous ACKs are dropped due to packet losses or arrive late and thus compromise the throughput gain brought by network coding. In this paper, we propose a framework of joint rate control and code selection (ORC) to address this issue, aiming at improving the performance gain of opportunistic network coding in wireless networks. The framework of ORC consists of two mechanisms: (1) Rate control: the optimal transmission rate for coded packets is selected by formulating the rate control process as a Finite Horizon Markov Decision Process. (2) Code selection: based on the results of rate selection, the packet combination for forming the coded packet is determined. Numerical results show that ORC can substantially improve the performance gain of opportunistic network coding compared with COPE.  相似文献   

4.
The ever increasing presence of services over wireless networks utilizing large bandwidth necessitates the constant quest for developing efficient and dependable services, capable of providing support to a wide and variety of applications. Wireless mesh networks can provide such reliable and scalable solutions addressing the requirements of the services utilizing large bandwidth. The current focus is on the interesting and challenging issue of channel access for different services with assured bandwidth guarantees. The problem of bandwidth, constantly encountered by the wireless mesh networks, is studied in this paper with due thrust on the issues pertaining to congestion control mechanisms. A novel ant colony‐based approach called ant‐inspired level‐based congestion control (AILCC) is developed in order to effectively manage the issues of bandwidth. The versatility of the AILCC includes its capacity for service differentiation in addressing a range of requests, such as applications of real‐time and nonreal‐time. The primary focus of AILCC is on providing an efficient congestion control mechanism that can meet numerous bandwidth demands of various applications. The performance of AILCC in terms of the ratio of packet delivery and end‐to‐end delay is evaluated through relevant simulations. The results obtained demonstrate greater levels of performance of AILCC over the other methods in existence. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

5.
In this paper, a simple and novel cross-layer adaptive modulation and coding (AMC) scheme, which increases the energy efficiency of the wireless communication system is proposed. Traditionally, AMC has been used to improve MAC-layer performance in terms of coded bit error rate, packet error rate, and throughput. The modulation and coding scheme is switched according to signal-to-noise ratio thresholds at the PHY layer. We extend the approach, proposing a framework for energy-efficient cross-layer AMC that captures the impact of both MAC layer and PHY layer parameters on the AMC switching criteria. Cross-layer designs are naturally suited to software defined radio applications. Not only are they readily implemented in software, but also they are integral to the radio components. They can optimize performance of the radio either for a given configuration or adaptively. Through examples of WLAN physical layer and Frequency Domain Equalized systems, we demonstrate our AMC scheme and verify its effectiveness by simulation.  相似文献   

6.
A deep understanding of the structural properties of wireless networks is critical for evaluating the performance of network protocols and improving their designs. Many protocols for wireless networks—routing, topology control, information storage/retrieval and numerous other applications—have been based on the idealized unit-disk graph (UDG) network model. The significant deviation of the UDG model from many real wireless networks is substantially limiting the applicability of such protocols. A more general network model, the quasi unit-disk graph (quasi-UDG) model, captures much better the characteristics of wireless networks. However, the understanding of the properties of general quasi-UDGs has been very limited, which is impeding the designs of key network protocols and algorithms. In this paper, we present results on two important properties of quasi-UDGs: separability and the existence of power efficient spanners. Network separability is a fundamental property leading to efficient network algorithms and fast parallel computation. We prove that every quasi-UDG has a corresponding grid graph with small balanced separators that captures its connectivity properties. We also study the problem of constructing an energy-efficient backbone for a quasi-UDG. We present a distributed local algorithm that, given a quasi-UDG, constructs a nearly planar backbone with a constant stretch factor and a bounded degree. We demonstrate the excellent performance of these auxiliary graphs through simulations and show their applications in efficient routing.  相似文献   

7.

The spectrum has always been an essential resource of information for wireless communications. With the continued growth of Internet of things (IoT) and 5G, there is a demand to understand how the spectrum is used. One of the challenges of deploying IoT applications is the crowded spectrum in the unlicensed industrial scientific medical bands leading to rising coexistence problems between different wireless protocols. To overcome this congestion, hardware tools supporting spectrum sensing can be used to manage the spectrum more efficiently. In this context, this work presents a prototype that measures a set wireless metrics on raw wireless signals acquired with software defined radio (SDR) technology. This prototype aims to provide mechanisms to sense and monitor spectrum usage that can mitigate one of the issues that IoT faces, the interference being produced by having different technologies using at the same frequency channels. The prototype features configurable radio frequency parameter and programmable periodical tasks execution. It displays wireless metrics such as signal to noise ratio, cumulative density function and power spectral density. This prototype uses web and SDR technologies, highlighting the idea and feasibility of combining these two technologies. In addition, it demonstrates the possibility to obtain wireless metrics with a low-cost hardware based on open source tools in a platform where interaction, debugging and maintaining becomes intuitive and easier. Results of measurements of LoRa protocol signals are presented to demonstrate the capabilities of the prototype.

  相似文献   

8.
The adoption of wireless communication technologies in industrial environments for supporting (soft) real-time applications heavily depends on the ability to grant bounded response times for messages, at least from a probabilistic point of view. This aspect is particularly important in factory automation systems, where response times are considered much more significant than other performance indices, such as throughput, that are usually considered in different application areas. The ever-increasing availability on the market of products and solutions based on the IEEE 802.11 standard and the introduction of the 802.11e amendment for enhancing the quality of service (QoS) and prioritizing traffic make this kind of communication technology interesting also for adoption in (loosely coupled) distributed control systems. This paper reports on some experimental measures and the related analysis that have been carried out on real 802.11g/e networks for better understanding the statistical distribution of response times and can be of help in characterizing these solutions when used to support noncritical real-time traffic.  相似文献   

9.
Video streaming over wireless links is a challenging issue due to the stringent Quality-of-Service (QoS) requirements of video traffic, the limited wireless channel bandwidth and the broadcast nature of wireless medium. As contention-based or reservation-based (i.e., contention-free) medium access control (MAC) protocols in existing wireless link-layer standards cannot efficiently support multimedia applications such as video streaming, a hybrid approach has been proposed, which uses both contention and reservation-based channel access mechanisms to transmit packets for each video source. Using this content-aware resource management approach, each video source reserves well below its peak data rate, and uses contention-based media access to transmit the remainder of the packets. In this paper, we first propose two conflict avoidance strategies and two buffering architectures for video streaming over ad hoc networks. Considering the interactions of reservation and contention, we develop the analytical model for the saturated traffic case and then extend it to derive tight performance bounds for the unsaturated case. Using the MAC protocols specified in the WiMedia ECMA-368 standard as an example, extensive simulations have been conducted to validate the analysis. Real video traces have been used to examine the video streaming performance. The analytical and simulation results demonstrate the effectiveness and efficiency of the hybrid resource management approach, and also reveal the impact of the conflict avoidance strategy and buffering design on the video performance.  相似文献   

10.
The localization of the sensor nodes is a fundamental problem in wireless sensor networks. There are a lot of different kinds of solutions in the literature. Some of them use external devices like GPS, while others use special hardware or implicit parameters in wireless communications.In applications like wildlife localization in a natural environment, where the power available and the weight are big restrictions, the use of hungry energy devices like GPS or hardware that add extra weight like mobile directional antenna is not a good solution.Due to these reasons it would be better to use the localization’s implicit characteristics in communications, such as connectivity, number of hops or RSSI. The measurement related to these parameters are currently integrated in most radio devices. These measurement techniques are based on the beacons’ transmissions between the devices.In the current study, a novel tracking distributed method, called LIS, for localization of the sensor nodes using moving devices in a network of static nodes, which have no additional hardware requirements is proposed.The position is obtained with the combination of two algorithms; one based on a local node using a fuzzy system to obtain a partial solution and the other based on a centralized method which merges all the partial solutions. The centralized algorithm is based on the calculation of the centroid of the partial solutions.Advantages of using fuzzy system versus the classical Centroid Localization (CL) algorithm without fuzzy preprocessing are compared with an ad hoc simulator made for testing localization algorithms.With this simulator, it is demonstrated that the proposed method obtains less localization errors and better accuracy than the centroid algorithm.  相似文献   

11.

Mobile handoff is a relatively significant charters-tic that involves the quality of connections (QoC) between the base stations (BS) and mobile hosts (MH). Maintaining the QoC in IEEE 802.11 networks is an important challenge in wireless mobile networks, and conjointly the necessity for the different real-life wireless mobile applications. To take care of the QoC, these wireless mobile applications is responsible for fast handoffs between BS. Most of the current research is based on a neighbor graph and maintaining the neighbor table by the connected access point and calculates the scan delay. This paper has proposed a novel neighboring approach for fast handoff where scan delay has been reduced to zero by exploiting the MH neighbor table. The result shows that the proposed approach is better than state-of-the-art approaches in terms of scan delay and re-association delay.

  相似文献   

12.
Along with the increasing demands for the applications running on the wireless sensor network (WSN), energy consumption and congestion become two main problems to be resolved urgently. However, in most scenes, these two problems aren’t considered simultaneously. To address this issue, in this paper a solution that sufficiently maintains energy efficiency and congestion control for energy-harvesting WSNs is presented. We first construct a queuing network model to detect the congestion degree of nodes. Then with the help of the principle of flow rate in hydraulics, an optimizing routing algorithm based on congestion control (CCOR) is proposed. The CCOR algorithm is designed by constructing two functions named link gradient and traffic radius based on node locations and service rate of packets. Finally, the route selection probabilities for each path are allocated according to the link flow rates. The simulation results show that the proposed solution significantly decreases the packet loss rate and maintains high energy efficiency under different traffic load.  相似文献   

13.
For IEEE 802.11-based wireless local area networks (WLANs), due to inherent random access mechanisms, it is very challenging to provision video services, which are subject to very stringent quality-of-service (QoS) constraints. Collision and fading are two main sources of packet loss in WLANs and as such, both are affected by the packetization at the medium access control (MAC) layer. While a larger packet is preferred to balance protocol header overhead, a shorter packet is less vulnerable to packet loss due to channel fading errors or staggered collisions in the presence of hidden terminals. In this paper, we exploit estimate of collision probabilities to adapt packetization for video frames. We first show analytically that the effective throughput is a unimodal function of packet size when considering both channel fading and staggered collisions. We then design an additive increase and multiplicative decrease (AIMD) packetization strategy which adjusts the MAC-layer packet size based on local estimate of staggered collision probability. It is demonstrated that the proposed approach can greatly improve the effective throughput of WLAN and reduce video frame transfer delay.  相似文献   

14.
The emerging applications for 3G and 4G wireless systems typically require highly heterogeneous and time-varying quality of service from the underlying protocol layers. The wireless links, however, provide only an unreliable communication channel that suffers from temporal outages. As a consequence, protocol mechanisms are needed that, based on the unreliable wireless links, provide the different service qualities required by the emerging applications. We identify the emerging IP-based applications for 3G and 4G wireless systems and categorize their QoS requirements. We discuss the wireless access mechanisms that show promise as the basis for supporting these applications. We then propose a set of protocol mechanisms that, based on the discussed wireless access mechanisms, provide the required QoS for the different application categories.  相似文献   

15.
Admission control algorithms have been widely researched for many years to guarantee the Quality of Service (QoS) for multimedia applications over the wired Internet. With the recent surge of wireless home networks, it is increasingly important to employ the admission control mechanisms in order to enhance the performance of the wireless multimedia applications. In this paper, we propose a framework for performing distributed admission control in a collaborative wireless environment. In particular, a wireless device will not inject a new flow into the wireless medium if it determines that by doing so, there is not enough resources to support all the existing flows. Our contributions are threefold. First, we propose a modification to 802.11x based network in order to increase the bandwidth efficiency. Specifically, doubling the contention window (CW) size after a collision is no longer necessary in the proposed wireless network. Second, we provide a performance analysis for the modified 802.11x based wireless networks with multiple flows having different throughput requirements. Third, using the theoretical analysis, we propose two distributed admission control algorithms based on the transmission opportunity (TXOP) and the CW. Simulation results confirm our theoretical predictions on the performance of the proposed admission control algorithms.
Linhai HeEmail:
  相似文献   

16.

With the expansion of smart device users, the security mechanism of these devices in terms of user authentication has been advanced a lot. These mechanisms consist of a pattern based authentication, biometric based authentication, etc. For security purpose whenever a user fails to authenticate themselves, these devices get locked. But as these devices consist of numerous applications (document creator, pdf viewer, e-banking, Social networking app, etc.), locking of the whole devices prevents the user from using any of the applications. Since the variety of applications provided by the devices have different security needs, we feel it is better to have application level security rather than device level. Here, in this paper, we have proposed a behavioral biometric based user authentication mechanism for application level security. First, we have performed a risk assessment of different applications. Then for complete protection, static multi-modal (keystroke and mouse dynamics) authentication at the start of an interactive session, and a continuous keystroke authentication during this session is performed. An analysis of the proposed authentication mechanism has been conducted on the basis of false acceptance rate (FAR), false rejection rate (FRR) and equal error rate (EER). The static multi-modal authentication achieved a FAR of 0.89%, FRR of 1.2% and EER of 1.04% using J48 classification algorithm. Whereas the continuous keystroke authentication has been analyzed by the time (no. of keystrokes pressed) taken to capture an intruder.

  相似文献   

17.

With the rapid growth of the internet of things (IoT), an impressive number of IoT’s application based on wireless sensor networks (WSNs) has been deployed in various domain. Due to its wide ranged applications, WSNs that have the capability to monitor a given sensing field, became the most used platform of IoT. Therefore, coverage becomes one of the most important challenge of WSNs. The search for better positions to assign to the sensors in order to control each point of an area of interest and the collection of data from sensors are major concerns in WSNs. This work addresses these problems by providing a hybrid approach that ensures sensors deployment on a grid for targets coverage while taking into account connectivity. The proposed sequential hybrid approach is based on three algorithms. The first places the sensors so as to all targets are covered. The second removes redundancies from the placement algorithm to reduce the number of sensors deployed. The third one, based on the genetic algorithm, aims to generate a connected graph which provide a minimal path that links deployed sensors and sink. Simulations and a comparative study were carried out to prove the relevance of the proposed method.

  相似文献   

18.
Lin  Jian  Weitnauer  Mary Ann 《Wireless Networks》2019,25(6):3047-3062

Communication in Terahertz (THz) band is envisioned as a promising technology to meet the ever-growing data rate demand, and to enable new applications in both nano-scale and macro-scale wireless paradigms. In this study, we propose the first system-level design that is suitable for THz communication in macro-scale range with 100+ Gbps data rate. The design is based on the proposed terahertz pulse-level beam-switching with energy control (TRPLE), and motivated by the rise in Graphene-based electronics, which include not only compact generator and detector for pulse communication, but also the capability of beam scanning aided with nano-antenna-arrays. The very high path loss seen in THz wireless channel requires the use of narrow beam to reach longer transmission ranges. On the other hand, impulse radio that emits femtosecond-long pulses allows the beam direction to steer at pulse-level, rather than at packet-level. For TRPLE, we mathematically analyze the data rate for an arbitrary wireless link under the THz channel characteristics and the energy modulation scheme. Then, a novel optimization model is formulated to solve the parameters of the inter-pulse separation and the inter-symbol separation, in order to maximize the data rate while meeting the interference requirement. With the optimization, the data rate of 167 Gbps is shown achievable for most users in 20-m range. A MAC protocol framework is then presented to harness the benefits of the pulse separation optimization.

  相似文献   

19.
The WiMAX standard specifies a metropolitan area broadband wireless access air interface. In order to support QoS for multimedia applications, various bandwidth request and scheduling mechanisms are suggested in WiMAX, in which a subscriber station can send request messages to a base station, and the base station can grant or reject the request according to the available radio resources. This article first compares two fundamental bandwidth request mechanisms specified in the standard, random access vs. polling under the point-to-multipoint mode, a mandatory transmission mode. Our results demonstrate that random access outperforms polling when the request rate is low. However, its performance degrades significantly when the channel is congested. Adaptive switching between random access and polling according to load can improve system performance. We also investigate the impact of channel noise on the random access request mechanism  相似文献   

20.
Access control is one of the fundamental security mechanisms of IT systems. Most existing access control schemes rely on a centralized party to manage and enforce access control policies. As blockchain technologies, especially permissioned networks, find more applicability beyond cryptocurrencies in enterprise solutions, it is expected that the security requirements will increase. Therefore, it is necessary to develop an access control system that works in a decentralized environment without compromising the unique features of a blockchain. A straightforward method to support access control is to deploy a firewall in front of the enterprise blockchain application. However, this approach does not take advantage of the desirable features of blockchain. In order to address these concerns, we propose a novel blockchain‐based access control scheme, which keeps the decentralization feature for access control–related operations. The newly proposed system also provides the capability to protect user's privacy by leveraging ring signature. We implement a prototype of the scheme using Hyperledger Fabric and assess its performance to show that it is practical for real‐world applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号