A routing problem in static wireless ad hoe networks is considered as it arises in a rapidly deployed, sensor based, monitoring system known as the wireless sensor network. Information obtained by the monitoring nodes...
详细信息
A routing problem in static wireless ad hoe networks is considered as it arises in a rapidly deployed, sensor based, monitoring system known as the wireless sensor network. Information obtained by the monitoring nodes needs to be routed to a set of designated gateway nodes. In these networks, every node is capable of sensing, data processing, and communication, And operates on its limited amount of battery energy consumed mostly in transmission and reception at its radio transceiver. If we assume that the transmitter power level can be adjusted to use the minimum energy required to reach the intended next hop receiver then the energy consumption rate per unit information transmission depends on the choice of the next hop node, i.e., the routing decision. We formulate the routing problem as a linear programming problem, where the objective is to maximize the network lifetime, which is equivalent to the time until the network partition due to battery outage. Two different models are considered for the information-generation processes. One assumes constant rates and the other assumes an arbitrary process. A shortest cost path routing algorithm is proposed which uses link costs that reflect both the communication energy consumption rates and the residual energy levels at the two end nodes. The algorithm is amenable to distributed implementation. Simulation results with both information-generation process models show that the proposed algorithm can achieve network lifetime that is very close to the optimal network lifetime obtained by solving the linear programming problem.
Identity management will become crucial to the success of nextgenerationnetworks (NGN). However, until now very little research has been done in this field. This paper presents the requirements for identity manageme...
详细信息
ISBN:
(纸本)8955191197
Identity management will become crucial to the success of nextgenerationnetworks (NGN). However, until now very little research has been done in this field. This paper presents the requirements for identity management in NGN which are currently being investigated by our research group. Our analysis is based on the characteristics and requirements of NGN architectures, services, network operators, end users, identity management requirements for web services, recent standardization efforts by various bodies, etc.
Ethernet passive optical networks (EPONs) have emerged as the best candidate for next-generation access networks. Propelled by rapid price declines in fiber optics and Ethernet components, these new EPON architectures...
详细信息
ISBN:
(纸本)0769521983
Ethernet passive optical networks (EPONs) have emerged as the best candidate for next-generation access networks. Propelled by rapid price declines in fiber optics and Ethernet components, these new EPON architectures combine the latest in optical and electronic advances, and are poised to become the dominant means of delivering bundled services over a single platform. This paper proposes a new EPON architecture capable of delivering bandwidth -intensive voice, data video services at distances beyond 25 km in the subscriber access network. Specifically, this paper proposes a two-stage EPON architecture that allows more end-users to share an OLT link, and enables longer access/reach. In addition, a new dynamic bandwidth allocation (DBA) algorithm is proposed to effectively and fairly allocate bandwidths between end users. This DBA algorithm can support differentiated services in a network with heterogeneous traffic. We conduct detailed simulation experiments to study the performance and validate the effectiveness of the proposed architecture and algorithms.
In this research, we study the self-maintenance scheduling problem in nextgeneration wireless networks, with the consideration of resource maintenance constraints and resource conflicting constraints. We propose a li...
详细信息
In this research, we study the self-maintenance scheduling problem in nextgeneration wireless networks, with the consideration of resource maintenance constraints and resource conflicting constraints. We propose a linear programming (ILP) model and two heuristic algorithms, and evaluate their effectiveness and time complexity via analysis and simulations. Our results show that all of the proposed approaches can effectively schedule the requests within a reasonable period of time, but with different suitable scenarios. The ILP approach is effective when the number of requests is large and yields close-to-optimal results; the RC-Cliques-RM algorithm is suitable at the presence of many constraints; while the RC-RM-Cliques algorithm can scale to large size networks at the expense of reduced accuracy. It is anticipated that the proposed scheduling algorithms will be generally applicable to various mobile wireless networks where self-maintenance is needed.
The following topics are dealt with: wireless ad hoc networks; wireless sensor network; multimedia entertainment; computer-aided modeling; communication link design; next-generation transport network control; GMPLS; h...
The following topics are dealt with: wireless ad hoc networks; wireless sensor network; multimedia entertainment; computer-aided modeling; communication link design; next-generation transport network control; GMPLS; high-performance global grid networks; and adaptive wireless network.
The following topics are dealt with: coding and modulation techniques; cooperative diversity and relay channels; source and source-channel coding; ultra-wideband radio; MIMO systems; sensornetworks; turbo codes; OFDM...
The following topics are dealt with: coding and modulation techniques; cooperative diversity and relay channels; source and source-channel coding; ultra-wideband radio; MIMO systems; sensornetworks; turbo codes; OFDM and frequency domain processing; spread spectrum and multiuser detection; communication system analysis; iterative techniques; information theory; LDPC codes; space-time coding; traffic modeling; DiffServ and AQM; wireless networks; TCP; optical networks and communications; MPLS and routing; switching; global Internet and nextgenerationnetworks; Internet overlay networks; mobile wireless networks; network architectures; Internet protocol wireless networks; scheduling and queue management; optical burst switching; optical packet switching; GMPLS and multilayer networks; CDMA in optical networking; wavelength assignment; traffic engineering; network protection and restoration; network security and network management; ubiquitous computing security; denial of service attack detection and response; key management and virus detection; equalization; channel estimation; signal processing for OFDM; communication signal processing; CDMA signal processing; multimedia networks and systems; quality of service; satellite communications; ad hoc networks; MAC protocol; interference cancellation; wireless LAN; ARQ; cellular radio networks; UWB communications; call admission control; resource allocation and management; multi-carrier systems; Bluetooth and indoor networks; 3G communications; handoff; multiple antenna systems.
In the near future, vehicles are expected to become a part of the Internet, either as a terminal in a mobile network, as a network node, or as a moving sensor (providing environmental information, cars status, streami...
详细信息
In the near future, vehicles are expected to become a part of the Internet, either as a terminal in a mobile network, as a network node, or as a moving sensor (providing environmental information, cars status, streaming video, etc.) or a combination of the three. This is partly due to the steadily growing interest of vehicles' passengers in location-based information. Drivers and passengers that would want to receive information about traffic jams or accidents in their vicinity will likely be interested in accessing Internet services from within the vehicular network. Access can be gained by using roadside installed Internet gateways (IGs), which are able to communicate with the vehicles. However, several difficulties must be addressed in such a scenario. Examples are the communication efficiency, mobility support, the discovery of Internet gateways, and the handover of connections from one gateway to the next. We are focusing on the aspect of accessing the Internet from within the vehicle network using a service discovery protocol. We therefore developed a dynamic discovery service (DDS) protocol to discover Internet gateways which is suitable for the characteristics of future vehicular ad hoc networks. Besides the benefit of efficient service discovery, our protocol is able to choose the most suitable Internet gateway among others.
Distributed sensornetworks are a promising technology for surveillance and reconnaissance in many applications, such as nextgeneration C4ISR and the digital battlefield. The dearth of effective security mechanisms a...
详细信息
ISBN:
(纸本)0780381408
Distributed sensornetworks are a promising technology for surveillance and reconnaissance in many applications, such as nextgeneration C4ISR and the digital battlefield. The dearth of effective security mechanisms are a main obstacle to the acceptance of distributed sensornetworks. As research pushes sensor nodes to be smaller and ubiquitous, security issues become paramount. Security in sensornetworks needs to be considered during the early phases of development. This paper describes a decentralized solution to the problem of securely checking node membership in ad hoc sensornetworks. This method does not require each node to maintain a membership list, does not require communication between the base station and verifying node, and it efficiently handles dynamic membership events (node leaves and joins). It is based on the concept of quasi-commutative hash functions, also called one-way accumulators. The paper analyzes resource requirements and suggests new ways to optimize the use of one-way accumulators while maintaining security in sensor node applications.
Performance evaluation is used to gain an understanding of how to make the best use of scarce resources. Storage, memory, processing, and communications bandwidth are all relatively plentiful and inexpensive. What is ...
详细信息
ISBN:
(纸本)0819451274
Performance evaluation is used to gain an understanding of how to make the best use of scarce resources. Storage, memory, processing, and communications bandwidth are all relatively plentiful and inexpensive. What is the next frontier for communications networks and performance evaluation? I will argue that it is power management to achieve cost-effective operation. In the past few years, entirely new network protocols have been developed for battery-hungry sensornetworks. But, what about the existing Internet? Estimates place the Internet as consuming from 2% to 8% of the total electricity produced in the USA - much of this power consumption is unnecessary. Do our "always on" desktop computers really need to be fully powered-up all the time? What can be done to achieve power-savings in these computers? The goal is to eliminate unnecessary energy usage by desktop computers in the near future and by networked embedded systems in the longer term. Traffic characterization is the first step towards this goal. Traffic characterization at inter-flow, intra-flow, and protocol levels is being done to investigate power management. The resulting savings achievable from relatively simple power management schemes are measured in TWh per year - or roughly equivalent to the electricity generated by one nuclear power plant. This is cost-effectiveness on a large scale!
Recent advances in wireless communication and microelectronics have enabled the development of low-cost sensor devices leading to interest in large-scale sensornetworks for military applications. sensornetworks cons...
详细信息
ISBN:
(纸本)0819449504
Recent advances in wireless communication and microelectronics have enabled the development of low-cost sensor devices leading to interest in large-scale sensornetworks for military applications. sensornetworks consist of large numbers of networked sensors that can be dynamically deployed and used for tactical situational awareness. One critical challenge is how to dynamically integrate these sensornetworks with information fusion processes to support real-time sensing, exploitation and decision-making in a rich tactical environment. In this paper, we describe our work on an extensible prototype to address the challenge. The prototype and its constituent technologies provide a proof-of-concept that demonstrates several fundamental new approaches for implementing nextgeneration battlefield information systems. Many cutting-edge technologies are used to implement this system, including semantic web, web services, peer-to-peer network and content-based routing. This prototype system is able to dynamically integrate various distributed sensors and multi-level information fusion services into new applications and run them across a distributed network to support different mission goals. Agent technology plays a role in two fundamental ways: resources are described, located and tasked using semantic descriptions based on ontologies and semantic services;tracking, fusion and decision-making logic is implemented using agent objects and semantic descriptions as well.
暂无评论