首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Field measurements reveal that radio link asymmetry has a severe impact on reliable data delivery. We analyze the energy efficiencies of selected reliability schemes for asymmetric radio links using theoretical models. The analysis provides guidelines for retransmission control so as to balance between reliability and energy consumption. We also design two enhancements to the “implicit” ARQ scheme addressing the negative effects of asymmetric radio links. The energy efficiencies of these algorithms are explicitly derived using our theoretical model and validated by simulations and field trials. Based on the analysis of the two enhanced algorithms, we propose an improvement, referred to as Energy Efficient Reliable Data Collection (EERDC) that controls the retransmissions of the enhanced ARQ schemes. Simulations and field trials confirm our theoretical findings and demonstrate that our proposed EERDC algorithm alleviates the impact of link asymmetry and achieves energy savings.
Sanjay JhaEmail:

Ren P. Liu   joined CSIRO in 1995 after finishing his Ph.D. at the University of Newcastle, Australia. He has been heavily involved in a number of commercial projects delivering solutions to a variety of customers such as Optus, AARNet, Nortel, Queensland Health, CityRail, and Rio Tinto. He is currently a principal research scientist of networking technologies in CSIRO ICT Centre. His interests include internetworking design, wireless network modelling and performance evaluation. Zvi Rosberg   has joined CSIRO, ICT centre in 2007 as the science leader of networking research. Previously, he held positions in the Academia and in the industry where he has been engaged in basic research and development in communication networks, wireless resource allocation and various Internet technologies. While he was with the IBM Research Lab, he won three IBM outstanding technical achievement awards, one of which is for an IBM licensed networking product. While he was the chief scientist of Radware Ltd., he designed and led the development of a content delivery network. He is serving on the editorial board of the Wireless Networks (WINET) and the International Journal of Communication Systems (IJCS). His research interest include traffic engineering, wireless resource allocation, transmitter power control and planning of cellular networks, routing and scheduling, optical and ultra high speed networks, Internet congestion and flow control, applied probability and analysis of network systems. Iain B. Collings   received the B.E. degree in Electrical and Electronic Engineering from the University of Melbourne in 1992, and the Ph.D. degree in Systems Engineering from the Australian National University in 1995. Currently he is a CEO Science Leader at the Australian CSIRO, working in the Wireless Technologies Laboratory, ICT Centre. Prior to this he was an Associate Professor at the University of Sydney (1999–2005); a Lecturer at the University of Melbourne (1996–1999); and a Research Fellow in the Australian Cooperative Research Centre for Sensor Signal and Information Processing (1995). He has published over 160 research papers in the area of mobile digital communications. More specifically, channel estimation and adaptive multi-carrier modulation, for time-varying, multi-user, and MIMO channels. Dr. Collings currently serves as an Editor for the IEEE Transactions on Wireless Communications (since 2002), and for the Elsevier Physical Communication Journal PHYCOM (since 2007). He has served as the Vice Chair of the Technical Program Committee for IEEE Wireless Communications and Networking Conference (WCNC) 2010 and IEEE Vehicular Technology Conf. (VTC) Spring 2006, as well as serving on a number of other TPCs and organizing committees of IEEE conferences. He is a founding organizer of the Australian Communication Theory Workshops 2000–2009. He is also the Chair of the IEEE NSW Section Joint Communications & Signal Processing Chapter. Carol Wilson   received a BSEE in 1983 and MSEE in 1983 from Virginia Tech. She is a research consultant on propagation and spectrum management for CSIRO and is currently working on Radio Quiet Zone issues for next generation radioastronomy. She is Vice-Chairman of ITU-R Study Group 3 (Radiowave Propagation) and Chairman of ITU-R Working Party 3M (Point-to-point and Earth-space propagation). Alex Y. Dong   is a Ph.D. candidate in School of Computer Science and Engineering, University of New South Wales. His current research interest is context sensing in Participatory Wireless Sensor Networks (PWSN). Sanjay Jha   is a Professor and Head of the Network Group at the School of Computer Science and Engineering at the University of New South Wales. He holds a Ph.D. degree from the University of Technology, Sydney, Australia. His research activities cover a wide range of topics in networking including Wireless Sensor Networks, Adhoc/Community wireless networks, Resilience/Quality of Service (QoS) in IP Networks, and Active/Programmable network. Sanjay has published over 100 articles in high quality journals and conferences. He is the principal author of the book Engineering Internet QoS and a co-editor of the book Wireless Sensor Networks: A Systems Perspective. He is an associate editor of the IEEE Transactions on Mobile computing. He was a Member-at-Large, Technical Committee on Computer Communications (TCCC), IEEE Computer Society for a number of years. He has served on program committees of several conferences. He was the Technical Program Committee of IEEE Local Computer Networks-LCN2004 and ATNAC04 conferences, and co-chair and general chair of the Emnets-1 and Emnets-II workshop respectively. Sanjay was also the General Chair of ACM Sensys 2007 symposium.   相似文献   

2.
Sensor network generally detects target at a fixed frequency. Detection interval means time spacing between two adjacent detection attempts. While designing a sensor network for detection of target intrusion in a specific region, the interval should be carefully set with trade-off between power consumption and detection performance. This is because redundant power may be consumed if it is too short and the target may be missed if too long. In this paper, we study the determination of the maximum detection interval (MDI) with specified detection performance. Path exposure is adopted as a performance metric. For detection-oriented application, a novel method to evaluate the minimum path exposure (MPE) is developed. Then the MDI problem is formulated and its solution is presented. The factors influencing the MDI are extensively simulated.
Zhong LiuEmail:

KeBo Deng   received the B.S.E.E. degree from Nanjing University of Science and Technology, Nanjing, China, in 2003. Since 2003, he has been a Ph.D. candidate in the discipline of Communications and Information Systems at the Nanjing University of Science and Technology. His research interests mainly include sensor network and collaborative signal processing.
Zhong Liu   received the B.S.E.E. degree from Anhui University, Anhui, China, in 1983, the M.S.E.E and Ph.D. degrees from University of Electronic Science and Technology of China, Chengdu, in 1986 and 1988, respectively. Since 1989, he has been a member of the faculty of the Nanjing University of Science and Technology, Nanjing, China, where he is Professor of Electronic Engineering and Dean of School of Electronic and Optoelectronic Engineering. From 1991 to 1993, he was a Postdoctoral Research Fellow at the Kyoto University, Kyoto, Japan. From 1997 to 1998, he was a visiting scholar at the Chinese University of Hong Kong, Hong Kong, China. His research interests mainly include radar signal processing, collaborative signal processing and chaotic information dynamics.   相似文献   

3.
Although very developed in many sectors (databases, filesystems), access control schemes are still somewhat elusive when it comes to wireless sensor networks. However, it is clear that many WSN systems—such as healthcare and automotive ones—need a controlled access to data that sensor nodes produce, given its high sensitivity. Enforcing access control in wireless sensor networks is a particularly difficult task due to the limited computational capacity of wireless sensor nodes. In this paper we present a full-fledged access control scheme for wireless sensor data. We enforce access control through data encryption, thus embedding access control in sensor data units. We also propose a lightweight key generation mechanism, based on cryptographic hash functions, that allows for hierarchical key derivation. The suggested protocol only relies on simple operations, does not require interactions between nodes and data consumers and has minimal storage requirements.
Piervito ScagliosoEmail:

Alessandro Sorniotti   has a double MSc degree from Politecnico di Torino (Turin, Italy) in Computer Science and from EURECOM in Networking. He also obtained a Research Master diploma (DOA) in Networking and Distributed Systems from Université de Nice-Sophia Antipolis (UNSA, Nice, France). Alessandro has won a scholarship (bourse CIFRE) and he is a PhD candidate at ENST, working as a Research Associate at SAP Labs France. His current research topic is the study of protocols for Secret Exchange, Secret Matching and Secret Handshake. Refik Molva   is a full professor and the head of the Computer Communications Department at Institute Eurécom in Sophia Antipolis, France. His current research interests are the design and evaluation of protocols for security and privacy in self-organizing systems. He previously worked on several research projects on multicast and mobile network security, anonymity and intrusion detection. Beside security, he worked on distributed multimedia applications over high speed networks and on network interconnection. Prior to joining Eurécom, he worked in the Zurich Research Laboratory of IBM where he was one of the key designers of the KryptoKnight security system. He also worked as a consultant in security for the IBM Consulting Group. He has a PhD in Computer Science from the Paul Sabatier University in Toulouse (1986) and a BSc in Computer Science (1981) from Joseph Fourier University, Grenoble, France. Laurent Gomez   is a senior researcher at SAP Research France since 2001. He is currently involved in WASP and ATLAS projects. His research activities are focused on security and context-aware systems. Prior to joining SAP Research, Laurent Gomez worked as engineer at research projects for Ericsson. He has a strong background in security of mobile applications, with a focus on context-aware systems. Laurent holds a Engineer Degree in Computing Systems from ESSI (Ecole Superieure en Sciences Informatique), Nice France. Christophe Trefois   received his BSc degree in Communication Systems from the Ecole Polytechnique Fédérale de Lausanne (EPFL) in Switzerland in 2006. In 2008, he obtained his MSc degree in Communication Systems from EPFL. From March to August 2008, he worked as a Research Assistant at SAP Labs France in Sophia Antipolis. Christophe is currently working as an IT Consultant at Ernst & Young Luxembourg and is a member of the ISACA Lux Chapter. Annett Laube   joined SAP Research Security & Trust program in 2006. She is a senior researcher currently leading in the WASP project. Prior to joining SAP, she worked at IBM Scientific Center in Heidelberg in the areas of machine translation of natural languages and text mining. Later she worked as an IBM consultant for e-business and data warehouse. In parallel she wrote her PhD thesis about the translation of dependency structures in the transfer process from one natural language to another. She started to work for SAP in 2001 at SAP Labs Montreal/Quebec and worked as a software developer for Supply Chain Event Management. Piervito Scaglioso   received his MSc degree from Politecnico di Torino in 2006. He is currently enrolled as PhD student in the Department of Computer Science at the Politecnico di Torino. His research interests include: Policy-based system and their application to manage access control, access control for wireless sensor network and hierarchical key management scheme.   相似文献   

4.
Mobile IP is a network layer protocol for handling mobility of hosts in the Internet. However, mobile IP handoff causes degradation of TCP performance. Hence, there is a need for improving performance of TCP over mobile IP in wireless mobile networks. We propose an approach which handles losses due to both wireless link errors and host mobility. To handle losses due to host mobility, a method for seamless handoff is proposed. Empirical results show that the scheme provides substantial improvement of performance.
Sakib A. MondalEmail:

Sakib A. Mondal   is a Senior Researcher at General Motors Research. He has received his doctorate in Management Information Systems from Indian Institute of Management Calcutta, and has worked for almost twelve years in various areas of Information Technology. His research interests include mobile and distributed computing, performance engineering, optimization and heuristic search.   相似文献   

5.
Sensor networks are characterized by limited energy, processing power, and bandwidth capabilities. These limitations become particularly critical in the case of event-based sensor networks where multiple collocated nodes are likely to notify the sink about the same event, at almost the same time. The propagation of redundant highly correlated data is costly in terms of system performance, and results in energy depletion, network overloading, and congestion. Data aggregation is considered to be an effective technique to reduce energy consumption and prevent congestion in wireless sensor networks. In this paper, we derive a number of important insights concerning the data aggregation process, which have not been discussed in the literature so far. We first estimate the conditions under which aggregation is a costly process in comparison to a non aggregation approach, by considering a realistic scenario where the processing costs related to aggregation of data are not neglected. We also consider that aggregation should preserve the integrity of data, and therefore, the entropy of the correlated data sent by sources can be considered in order to both decrease the amount of redundant data forwarded to the sink and perform an overall lossless process. We also derive the cumulative and the probability distribution functions of the delay in an aggregator node queue, which can be used to relate the delay to the amount of aggregation being considered. The framework we present in this paper serves to investigate the tradeoff between the increase in data aggregation required to reduce energy consumption, and the need to maximize information integrity, while also understanding how aggregation impacts the network propagation delay of a data packet.
Andrew T. CampbellEmail:

Laura Galluccio   received her PhD in Electrical, Computer and Telecommunications Engineering in March 2005. From May to July 2005 she was a Visiting Scholar at the COMET Group, Columbia University, NY. Since 2002 she has been with the CNIT where she worked as a Research Fellow within the FIRB VICOM and NoE Satnex Projects. She is currently a Post-Doc Fellow at University of Catania. Her research interests include ad hoc and sensor networks, protocols and algorithms for wireless networks, and network performance analysis. She serves in the EB of Wireless Communications and Mobile Computing and is involved in the TPC of many top level international conferences. Sergio Palazzo   is a Professor of Telecommunications Networks at the University of Catania, Italy. He has been the General Chair of the ACM MobiHoc 2006 Conference and currently is a member of the MobiHoc Steering Committee. In the recent past, he also was the General Vice Chair of the ACM MobiCom 2001 Conference. He currently serves the Editorial Boards of the journals IEEE/ACM Transactions on Networking, and Ad Hoc Networks. In the recent past, he also was an Editor of IEEE Wireless Communications Magazine, IEEE Transactions on Mobile Computing, Computer Networks, and Wireless Communications and Mobile Computing. He was a Guest Editor of Special Issues in the IEEE Journal of Selected Areas in Communications, in the IEEE Personal Communications Magazine, in the Computer Networks journal, in the EURASIP Journal on Wireless Communications and Networking. He also was the recipient of the 2002 Best Editor Award for the Computer Networks journal. His current research interests include wireless and satellite IP networks, multimedia traffic modelling, and protocols for the next generation of the Internet. Andrew T. Campbell   is a Professor of Computer Science at Dartmouth College where he leads the Sensor Networks Group and is a member of the Institute for Security Technology Studies (ISTS). Prior to joining Dartmouth in 2005 Andrew was an Associate Professor of Electrical Engineering at Columbia University and a member of the COMET Group where he developed a number of mobile networking technologies. His current research focusses on people-centric sensing where he leads the MetroSense project. Andrew received his PhD in Computer Science (1996) from Lancaster University, England, and the NSF Career Award (1999) for his research in programmable wireless networking. Prior to joining academia he spent 10 years working in industry both in Europe and the USA in product research and development of computer networks and wireless packet networks. Andrew has been been a technical program chair for ACM MobiCom and ACM MobiHoc, the general chair for ACM SenSys 2006, and SenSys steering committee chair 2008–2009. He spent his sabbatical year (2003–2004) at the Computer Lab, Cambridge University, as an EPSRC Visiting Fellow.   相似文献   

6.
We propose a new coded cooperation scheme for wireless communications to obtain transmit diversity in the scenarios that agents such as mobile handsets, sensor network nodes and etc., due to size, power or other constraints, cannot utilize multiple antennas. New scheme supports more than two cooperative users with a relatively low cooperation level. We evaluate the performance of the proposed scheme in a frequency nonselective slow fading channel. For two cooperative users, we provide the exact analytical analysis. However, for more than two users, as the analytical analysis is very complicated, our performance evaluation is based on computer simulations. Our numerical results show that each of the N cooperative users obtains a full diversity order of N at moderate to high signal to noise ratio regimes. In addition, the results indicate that the new coded cooperation scheme can achieve a noticeable gain over the non-cooperative scheme. Further, the simulation results confirm the analytical derivations derived for two cooperative users.
Masoumeh Nasiri-KenariEmail:

Azizollah Jamshidi   (IEEE’s 2006) received the B.S. degree (with honors) in Electrical Engineering from Shiraz University, Shiraz, Iran, in 1997, and the M.S. degree in Electrical Engineering from Sharif University of Technology, Tehran, Iran in 1999. He is currently working toward the Ph.D. degree in Electrical Engineering in Sharif University of Technology, Tehran, Iran. Since February 2003, he has been a member of Wireless Research Laboratory of the Electrical Engineering Department in Sharif University. His research interests include multi-user detection in CDMA systems, cooperative diversity, cognitive radio, channel coding and information theory. Masoumeh Nasiri-Kenari   received the B.S and M.S. degrees in Electrical Engineering from Isfahan University of Technology, Isfahan, Iran, in 1986 and 1987, respectively, and the Ph.D. degree in Electrical Engineering from the University of Utah, Salt Lake City, in 1993. From 1987 to 1988, she was a Technical Instructor and Research Assistant at Isfahan University of Technology. Since 1994, she has been with the Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran, where she is now a Professor. Professor Nasiri-Kenari is also the Director of Wireless Research Laboratory of the Electrical Engineering Department. From 1999 to 2001, She was a Co-Director of the Advanced Communication Science Research Laboratory, Iran Telecommunication Research Center, Tehran, Iran. Her current research interests are in wireless communication systems, error correcting codes, and optical communication systems.  相似文献   

7.
In this paper, we study an algorithmic model for wireless ad hoc and sensor networks that aims to be sufficiently close to reality as to represent practical realworld networks while at the same time being concise enough to promote strong theoretical results. The quasi unit disk graph model contains all edges shorter than a parameter d between 0 and 1 and no edges longer than 1. We show that—in comparison to the cost known for unit disk graphs—the complexity results of geographic routing in this model contain the additional factor 1/d 2. We prove that in quasi unit disk graphs flooding is an asymptotically message-optimal routing technique, we provide a geographic routing algorithm being most efficient in dense networks, and we show that classic geographic routing is possible with the same asymptotic performance guarantees as for unit disk graphs if .
Aaron Zollinger (Corresponding author)Email:
  相似文献   

8.
This paper considers the problem of power management and throughput maximization for energy neutral operation when using an energy harvesting sensor (EHS) to send data over a wireless link. The EHS is assumed to be able to harvest energy at a constant rate, and use a fixed part of the energy harvested in a slot for measuring the channel state. The rest of the energy harvested is available for transmission, however, it can be stored in an inefficient battery if it is not fully utilized. The key constraint that the EHS needs to satisfy is energy neutrality, i.e., the expected energy drawn from the battery should equal the expected energy deposited into the battery. In this scenario, two popular models for data transmission are contrasted: the constant bit rate (CBR) model and the variable bit rate (VBR) model. In the CBR model, it is assumed that the EHS are designed to transmit data at a constant rate (using a fixed modulation and coding scheme) but are power-controlled. In the VBR model, the EHS selects both the transmit power and the data rate of transmission in each slot based on the channel instantiation. A framework under which the system designer can optimize several parameters of the EHS that determine the average data rate performance when the channel is Rayleigh fading is developed. Using this framework, the two transmission schemes are contrasted. It is shown that, with the right choice of parameter settings, the CBR scheme can perform nearly as well as the VBR scheme at significantly lower complextiy. The usefulness and validity of the framework developed is illustrated through simulations for specific examples.
Chandra R. MurthyEmail:

Chandra R. Murthy   received the B.Tech. degree in Electrical Engineering from the Indian Institute of Technology, Madras in 1998, the M.S. and Ph.D. degrees in Electrical and Computer Engineering from Purdue University and the University of California, San Diego, in 2000 and 2006, respectively. From 2000 to 2002, he worked as an engineer for Qualcomm Inc., where he worked on WCDMA baseband transceiver design and 802.11b baseband receivers. From August 2006 to 2007, he worked as a staff engineer at Beceem Communications Inc. on advanced receiver architectures for the 802.16e Mobile WiMAX standard. In September 2007, he joined as an assistant professor at the Department of Electrical Communication Engineering at the Indian Institute of Science, where he is currently working. His research interests are primarily in the areas of digital signal processing, information theory, estimation theory, and their applications in the optimization of MIMO, OFDM and CDMA wireless communication systems. Currently, he is working on Cognitive Radio, Energy Harvesting Wireless Sensors and MIMO systems with finite-rate channel-state feedback.   相似文献   

9.
In this paper, the cross-layer design routing in cognitive radio(CR) networks is studied. We propose a colored multigraph based model for the temporarily available spectrum bands, called spectrum holes in this paper. Based on this colored multigraph model, a polynomial time algorithm with complexity O(n 2) is also proposed to develop a routing and interface assignment, where n is the number of nodes in a CR network. Our algorithm optimizes the hop number of routing, meanwhile, the adjacent hop interference (AHI) is also optimized locally.
Lin Lin (Corresponding author)Email:
  相似文献   

10.
11.
Besides energy constraint, wireless sensor networks should also be able to provide bounded communication delay when they are used to support real-time applications. In this paper, a new routing metric is proposed. It takes into account both energy and delay constraints. It can be used in AODV. By mathematical analysis and simulations, we have shown the efficiency of this new routing metric.
YeQiong SongEmail:
  相似文献   

12.
This paper studies routing scalability in multi-domain DWDM networks. Although inter-domain provisioning has been well studied for packet/cell-switching networks, the wavelength dimension (along with wavelength conversion) poses many challenges in multi-domain DWDM settings. To address these concerns a detailed GMPLS-based hierarchical routing framework is proposed for multi-domain DWDM networks with wavelength conversion. This solution uses mesh topology abstraction schemes to hide domain-internal state. However related inter-domain routing loads can be significant here, growing by the square of the number of border nodes. To address these scalability limitations, improved inter-domain routing update strategies are also proposed and the associated performance of inter-domain lightpath RWA and signaling schemes studied.
Nasir GhaniEmail:
  相似文献   

13.
Alternative representations based on order statistics are derived for the probability of error for orthogonal, biorthogonal, and transorthogonal signaling. Short programs in are developed for the computation of these representations and to furnish evidence to show that their performance is superior to the traditional Monte Carlo approach.
Saralees NadarajahEmail:
  相似文献   

14.
Multimedia transport has stringent bandwidth, delay, and loss requirements. It is a great challenge to support such applications in reconfigurable wireless networks (RWNs). Using multiple paths in parallel for multimedia transport provides a new degree of freedom in designing robust multimedia transport systems. In this paper, we provide a multi-path extension to zone routing protocol (ZRP) to support video transmission over RWNs. We compare ZRP and our multi-path routing scheme by using NS-2 simulator. The experiments show that our method is effective in improving the robustness of video transport over RWNs.
Shiwei YeEmail:
  相似文献   

15.
In this article, we find that the limiting hop count in a lightpath impacts on the performance of optical networks. Based on this observation, we propose a dynamic hop count shifting (DYHOS) algorithm that limits the hop count of lightpaths dynamically, depending on the traffic load. The proposed algorithm searches an available route, while minimizing the waste of network resources and limiting excessive traffic on the network. Hence, the proposed algorithm increases the network throughput and reduces the blocking probability. Comparing with shortest path routing and adaptive path routing algorithms, we show the performance of the proposed algorithm has the lowest blocking probability influenced by the hop count of lightpaths for a given routing algorithm.
Jeonghoon MoEmail:
  相似文献   

16.
We present an approximate analytical method for the evaluation of packet loss probability in synchronous optical packet-switched networks which operate under limited deflection routing with the contention resolution method based on priorities. Packets are lost because they are removed by nodes. They are removed because they experience too many deflections and stay prohibitively long in the network. Such packets have to be removed because they will be ignored by the transmission protocols (like TCP) and because the quality of their optical signal is unacceptable. Presented are results for the network in the topology of the torus of the two-dimensional grid, which operates at a steady state with the uniform load u, . The strength of our analysis is its novel mathematical approach, which is capable of providing very low packet loss probabilities. For the network composed of 100 nodes, we predict the packet loss probability as low as 10−9 or lower, while simulation provided results only at the order of 10−6. For a given permissible packet loss probability, our analysis provides the maximal network load and the number of allowed deflections. We verify the analysis with simulation in the cases for which simulation gave results.
Jean-Michel FourneauEmail:
  相似文献   

17.
All-Optical Label Swapping (AOLS) nodes are believed to be part of the future networks. The original node designs, however, are very hard scalable. This article presents three alternatives that swap labels analogous to the original design. Two of the proposed new switches use the same all-optical technology to parallelly compare labels but, they divide fibres in data wavelengths that only transport payloads and label wavelengths that only transport labels. The third design sequentially compares the incoming label with addresses in the node available in order to make the routing decision. All three architectures are compared in terms of hardware necessary to perform routing.
Piet DemeesterEmail:
  相似文献   

18.
Distributed lightpath provisioning in wavelength-division multiplexing (WDM) networks has gained wide research interests. In this article, we study the performance of distributed lightpath provisioning in WDM networks with dynamic routing and wavelength assignment (RWA). Specifically, we consider the case where routing of each lightpath is calculated based on globally flooded link-state information, and wavelength assignment is decided through local information exchanges. Simulation results show that such schemes steadily outperform those schemes with only global flooding or only local information exchanges. More significantly, the impacts of various factors on the proposed scheme, including RWA algorithm, network topology, number of wavelengths per fiber, global flooding interval, and traffic load, have been evaluated. Such evaluations help to achieve some insights useful for the future developments of efficient lightpath provisioning schemes.
Gaoxi XiaoEmail:
  相似文献   

19.
We propose a model that considers several physical impairments in all-optical networks based on optical signal-to-noise degradation. Our model considers the gain saturation effect and amplified spontaneous emission depletion in optical amplifiers, coherent crosstalk in optical switches, and four-wave mixing in transmission fibers. We apply our model to investigate the impact of different physical impairments on the performance of all-optical networks. The simulation results show the impact of each impairment on network performance in terms of blocking probability as a function of device parameters. We also apply the model as a metric for impairment-constraint routing in all-optical networks. We show that our proposed routing and wavelength assignment algorithm outperforms two common approaches.
Joaquim F. Martins-Filho (Corresponding author)Email:
  相似文献   

20.
Cognitive radios sense spectrum activity and apply spectrum policies in order to make decisions on when and in what bands they may communicate. These activities go beyond what is done when traditional radios communicate. This paper examines the denial of service vulnerabilities that are opened by these additional activities and explores potential protection remedies that can be applied. An analysis of how vulnerable are victim cognitive radios to potential denial of service attacks is presented along different axis, namely the network architecture employed, the spectrum access technique used and the spectrum awareness model. The goal is to assist cognitive radio designers to incorporate effective security measures now in the early stages of cognitive radio development.
Amita SethiEmail:

Timothy X Brown   received his B.S. in physics from Pennsylvania State University and his Ph.D. in electrical engineering from California Institute of Technology in 1990 when he joined the Jet Propulsion Lab. In 1992 he joined Bell Communications Research. Since 1995 he has had a joint appointment with the Department of Electrical and Computer Engineering and the Interdisciplinary Telecommunications Program at the University of Colorado, Boulder. He is currently an Associate Professor. His research interests include adaptive network control, wireless communications systems, and spectrum policy. He is a recipient of the NSF CAREER Award. In 2003 he was chosen the Global Wireless Education Consortium’s (GWEC) wireless educator of the year. Amita Sethi   received her B. Tech degree from Mysore University, India in 1999. From January 2000 to September 2005, she has worked in the telecommunications software industry with Aricent Technologies (formerly, Flextronics Software Systems). Since January 2006, she is a Masters student at the University of Colorado, Boulder and is a research assistant in Professor Timothy Brown’s wireless networking lab. Her research interests include security in cognitive radio networks and wireless ad-hoc networks.   相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号