Since there is no fixed infrastructure or centralized management in wireless sensor networks, a Connected Dominating Set(CDS) has been proposed to serve as a virtual backbone. the CDS of a graph representing a network...
详细信息
distributed Discrete Event systems (distributed DES) are increasing withthe development of networks. A major problem of these systems is the evaluation of their performance at the design stage. We are particularly in...
详细信息
ISBN:
(纸本)9781424436880
distributed Discrete Event systems (distributed DES) are increasing withthe development of networks. A major problem of these systems is the evaluation of their performance at the design stage. We are particularly interested in assessing the impact Of computer networking protocols on the control of manufacturing systems. In our design methodology, these systems are modeled using Petri nets. In this context, we propose an approach to modeling network protocols based on Oriented Object Petri Nets. Our ultimate objective is to assess by means of simulations the performances of such a system when one distributes their control models on an operational architecture. In this study, we are implementing a component based approach designed to encourage reuse when modeling new network protocols. To illustrate our approach and its reuse capabilities, we will implement it to model the link layer protocols of the norms ieee 802.11b and ieee 802.3.
this paper describes the design and implementation of a framework that integrates deployment, execution, and notification mechanisms for running surveillance monitoring applications on multi-purpose grids. the propose...
详细信息
According to WIA-PA specification, TDMA and FDMA mechanism are used to transmit data and multi-hop mesh topology is supported, but the scheduling issue is still open. In this paper, the two types of conflict in wirele...
详细信息
ISBN:
(纸本)9781424436927
According to WIA-PA specification, TDMA and FDMA mechanism are used to transmit data and multi-hop mesh topology is supported, but the scheduling issue is still open. In this paper, the two types of conflict in wireless mesh network are analyzed and a link scheduling solution is proposed. the algorithm exploits the route characteristics of data transmitting in wireless multi-hop mesh networks and uses vertex-coloring method but not edge-coloring to schedule the timelots of superframe. the channel that a link will use in transmitting is assigned according to its depth in route when it is colored. By scheduling the links using the presented algorithm, the nodes of the network can transmit data respectively without conflicting withthe others. Finally, the validity of algorithm is proved and the simulation result is provided.
Connecting wireless sensor networks (WSN) with TCP/IP is an important issue in many WSN applications. Recently, there are many solutions proposed to integrate WSN and TCP/IP network [1-5]. Running the TCP/IP protocol ...
详细信息
In wireless sensor networks, two types of emerging range-free and high-accuracy localization approaches including the approximate-point-in-triangulation test (APIT) and the sequence based localization (SBL) greatly de...
详细信息
ISBN:
(纸本)9781424436927
In wireless sensor networks, two types of emerging range-free and high-accuracy localization approaches including the approximate-point-in-triangulation test (APIT) and the sequence based localization (SBL) greatly depend on density of anchor nodes and connectivity of network. In this paper, we present a novel localization approach that combines APIT with SBL, called SB-APIT. First, we use APIT approaches to determine boundary. We then sequentially measure the received signal strength indicator (RSSI) value of target node within the range of one-hop neighbor nodes and rank the RSSI values to yield a location sequence. Furthermore, the coordinates of the area's geometric center is calculated as the target node's coordinates. Finally, the simulation results obtained with 200 nodes show that our new approach reduces the average localization error by about 5%. It considerably improves the accuracy of localization.
In the course of data transfer extremely vulnerable to be eavesdropped, defrauds, tampered or replayed (Relay) routing by information security. thus, the SLDMRP (Security Lightweight Distribution Multicast Routing Pro...
详细信息
ISBN:
(纸本)9781424436927
In the course of data transfer extremely vulnerable to be eavesdropped, defrauds, tampered or replayed (Relay) routing by information security. thus, the SLDMRP (Security Lightweight Distribution Multicast Routing Protocol) based on security was put forward in this paper. this protocol is designed on the basis of the multicast routing LDMRP, while this protocol creating and maintaining multicast group, sending control message, carrying out security policy which underwrite and verify the data packets, in order to prevent the control message from eavesdropping and tampering. Finally, using NS2, to prove the effectiveness of signature and verify the simulation results: SLDMRP, which is using of SHA-1 and RSA encryption algorithm to verify the signature and security policy is effective.
distributed space-time coding (DSTC) cooperation for wireless relay network has been widely analyzed. In this paper, we first investigate an uplink DSTC cooperative system based on amplify-and-forward (AF) cooperation...
详细信息
ISBN:
(纸本)9781424436927
distributed space-time coding (DSTC) cooperation for wireless relay network has been widely analyzed. In this paper, we first investigate an uplink DSTC cooperative system based on amplify-and-forward (AF) cooperation protocol with multiple antennas deployed at the destination while source and relay nodes have only one antenna each. then, by, exploiting partial channel state information from the source to relay nodes, we propose a phase compensation algorithm which can achieve linear detection at the receiver. Furthermore, the complexity analysis is provided to compare with nolinear optimal ML detection. Finally, computer simulations are carried out to evaluate the validity of the proposed approach. the results show that the phase compensation algorithm can approximately achieve the same performance with nolinear NIL algorithm. On the other hand, it can significantly simply the heavy complexity of the optimal ML detection into simple linear detection with very low complexity. With near optimal performance and low complexity, the proposed algorithm is particularly, suitable for the practical scenarios.
Recent studies show that introducing DAS into the cellular system can reduce the inter-cell interference and achieves a non-trivial capacity increase over the conventional cellular system. On the other hand, base stat...
详细信息
ISBN:
(纸本)9781424436927
Recent studies show that introducing DAS into the cellular system can reduce the inter-cell interference and achieves a non-trivial capacity increase over the conventional cellular system. On the other hand, base station cooperative processing is explored to address the inter-cell interference mitigation problem in the cellular system. But most of the analytical work is based on the single-user scenario. this paper provides a generalized information theoretic analysis to illuminate the downlink performance limits of DAS in the multi-user cellular system with antenna module cooperative processing. A comparison of several transmit schemes is given: scheduling the best user, scheduling multiple users simultaneously and scheduling multiple best users. It is demonstrated that with simple linear processing at the transmitters scheduling multiple users simultaneously achieves a tremendous system capacity increase over scheduling the best user. this is because antenna module cooperative processing can mitigate the inter-user interference effectively and the spatial degrees of freedom are fully exploited. Furthermore, when the number of users is much larger than the number of remote antenna modules, scheduling multiple best users can attain the multi-user diversity gain which leads to an increase of the sum capacity. these analytical results are verified by Monte Carlo simulations.
A scheme is promoted which builds a water-saving irrigation system based on wireless sensor network and fuzzy control technology, we design a wireless sensor network, which consists of sensor node cluster, coordinator...
详细信息
ISBN:
(纸本)9781424436927
A scheme is promoted which builds a water-saving irrigation system based on wireless sensor network and fuzzy control technology, we design a wireless sensor network, which consists of sensor node cluster, coordinator node and irrigation controller nodes Here sensor node cluster is responsible for gathering information such as soil moisture and regularly send it to the coordinator node. Fuzzy controller embedded in the coordinator node takes soil moisture error and error change rate as its input and obtained water demand amount of crops under certain soil moisture through fuzzy inference and fuzzy judge and output it to irrigation controller node. Irrigation controller node controls the implementation of automatic watering. In this article, we describe the implementation scheme of sensor network node and fuzzy controller in detail and design communication protocol for sensor nodes. the experimental results show that the system can quickly and accurately calculate water demand amount of crops, which can provide a scientific basis for water-saving irrigation. In this way, we have made an exploratory study in applying wireless sensor networks and fuzzy control technology to fine agriculture project.
暂无评论