Cooperative transmission is an efficient technique to realize diversity gain in wireless fading channels via a distributed way. Cooperative automatic repeat request (ARQ) is known as a protocol which exploit spatial d...
详细信息
ISBN:
(纸本)9781424444885
Cooperative transmission is an efficient technique to realize diversity gain in wireless fading channels via a distributed way. Cooperative automatic repeat request (ARQ) is known as a protocol which exploit spatial diversity by allowing the relay node to retransmit the source data packet to the destination node, when the latter is unable to decode the source node data correctly. In this short paper we derive closed form expressions for the spectral efficiency for C-ARQ scheme and we will also present a rate adaptive C-ARQ protocol. We consider a scenario in which boththe source and relay nodes employ adaptive modulation. Our simulation results prove that the proposed scheme enhances the spectral efficiency noticeably when compared to other schemes(1).
this paper presents an implementation based study of multi-channel medium access control protocols in hardware constrained wireless sensor network(WSN) nodes with 802.15.4 radio. In the network architecture presented,...
详细信息
ISBN:
(纸本)9781424444885
this paper presents an implementation based study of multi-channel medium access control protocols in hardware constrained wireless sensor network(WSN) nodes with 802.15.4 radio. In the network architecture presented, each sensor node has a single radio transceiver that can be tuned to any of the available sixteen non-overlapping channels. the simplest way to select data channel is to use a common channel signaling between the nodes. We have conducted experiments to verify whether control channel congestion can occur in case of 802.15.4 radios using MicaZ and TelosB motes. the throughput results show the per-node throughput does not decline as significantly with increasing number of senders, withthe proposed multi-channel protocol.
Multi-sensor data fusion latency in Internet-based sensor applications is analyzed. the Probabilistic Estimation of Periodic Backlog (PEPB) technique presented takes into account the nature of sensor data generation a...
详细信息
ISBN:
(纸本)9781424444885
Multi-sensor data fusion latency in Internet-based sensor applications is analyzed. the Probabilistic Estimation of Periodic Backlog (PEPB) technique presented takes into account the nature of sensor data generation and the time-scale invariant burstiness (i.e., self-similarity) of network traffic. the fusion application considered requires synchronizing a set of correlated data before fusion processing can begin. PEPB is used first to model the single-hop delay. Analysis is then extended to a network with multi-hop communication and multiple sensor nodes. Comparison with simulation-based results demonstrates the accuracy of the model.
Jamming attacks are considered one of the most devastating attacks as they are difficult to prevent and sometimes hard to detect. In this paper we consider the impact of the placement and range of limited-range jammer...
ISBN:
(纸本)9781424444885
Jamming attacks are considered one of the most devastating attacks as they are difficult to prevent and sometimes hard to detect. In this paper we consider the impact of the placement and range of limited-range jammers on ad hoc networks. Limited range jammers are more difficult to detect as they use transmission powers similar to that of regular nodes (or perhaps even smaller transmit powers). the attacker can locate his jammer(s) randomly in the network. Alternatively, jammers can be placed at strategic locations. For instance, intuitively, this can be nodes withthe highest traffic inputs/outputs (discovered by sensing the traffic flow in the network). Using OPNET, we perform extensive simulations to show how significant such strategically placed attacks can be compared to random placement of limited-range jammers on both TCP and UDP traffic.
the point coordination function (PCF) of the ieee 802.11 WLAN facilitates deterministic frame transfer by a polling mechanism. this enables to support quality of service. Despite this benefit the PCF could be ineffici...
详细信息
ISBN:
(纸本)9781424444885
the point coordination function (PCF) of the ieee 802.11 WLAN facilitates deterministic frame transfer by a polling mechanism. this enables to support quality of service. Despite this benefit the PCF could be inefficient at low-to-medium traffic loads because it always polls all stations regardless of their actual demand. To overcome this drawback, we introduce a novel polling scheme where all stations simultaneously report their status by sending orthogonal signals, and a BS identifies and polls only those stations having data to send. the feasibility of orthogonal signalling is evaluated in a realistic channel model where multipath fading and additive white Gaussian noise are applied. Moreover, channel utilization of the proposed scheme is investigated analytically, and compared with other schemes through simulation. the evaluation results show that the proposed scheme considerably outperforms other schemes at low-to-medium traffic loads.
Mobility in a wireless heterogeneous scenario in which the mobile devices are able to connect to more than one access technology requires a new architectural development for the network connectivity management. the pr...
详细信息
ISBN:
(纸本)9781424444885
Mobility in a wireless heterogeneous scenario in which the mobile devices are able to connect to more than one access technology requires a new architectural development for the network connectivity management. the present paper describes and evaluates a set of architectural options for integrating the novel network discovery and selection functionality in the 3GPP Evolved Packet Core which enables an operator to manage the connections of the mobile devices. As the design options here presented consider different levels of network control on the mobility at the cost of new interfaces and new procedures, an evaluation based on these two criteria is given.
the ieee 802.16 standard specifies a MeSH mode of operation which permits the setup of Wireless Mesh networks (WMN) with per-link QoS support. the standard specifies both distributed as well as centralized reservation...
详细信息
ISBN:
(纸本)9781424444885
the ieee 802.16 standard specifies a MeSH mode of operation which permits the setup of Wireless Mesh networks (WMN) with per-link QoS support. the standard specifies both distributed as well as centralized reservation schemes. Distributed scheduling is highly flexible, and enables operation of the WMN even in the absence of a central controlling instance or base station. A systematic study of strategies for distributed scheduling in the ieee 802.16 MeSH mode is, however, missing. In this paper we model the individual links in the 802.16 WMN and design and derive efficient strategies for distributed scheduling to reserve bandwidth required for transmission on the modelled link. Additionally, we evaluate our proposed reservation model using simulations, study the impact of key parameters and identify issues for further research in WiMAX based WMNs.
In this paper we propose a mesh based" on demand" multicast routing protocol for Ad-Hoc networks with QoS (quality of service) and reliable multicast support. the proposed scheme has five key features;(a) it...
详细信息
ISBN:
(纸本)9781424444885
In this paper we propose a mesh based" on demand" multicast routing protocol for Ad-Hoc networks with QoS (quality of service) and reliable multicast support. the proposed scheme has five key features;(a) it is based on the forwarding group concept (i.e., a subset of nodes is in charge of forwarding the multicast packets);(b) it dynamically refreshes the forwarding group members using a procedure similar to on demand routing;(c) it significantly reduces control overhead, and make the scalability of multicast routing protocol possible in mobile ad hoc networks by consolidation of control packets;(d) it supports QoS routing using good estimation of available and required bandwidth, and reserving required bandwidth on the end to end active routes in multicast mode;(e) it provides local recovery mechanism, which aims to reduce the control overhead and achieve fast recovery when route breakage happens.
A common radio technology used in wireless sensor networks is the ieee 802.15.4 standard. Wireless sensor networks have so far used custom, light-weight, and application specific network protocols on top of ieee 802.1...
详细信息
ISBN:
(纸本)9781424444885
A common radio technology used in wireless sensor networks is the ieee 802.15.4 standard. Wireless sensor networks have so far used custom, light-weight, and application specific network protocols on top of ieee 802.15.4, often optimized for resource constrained low power hardware. In order to achieve interoperability at the network layer, the Internet Engineering Task Force published a standard for the transmission of IPv6 packets over ieee 802.15.4 low-power wireless personal area networks, which provides an additional layer adapting the IPv6 network layer to the low power and resource constrained ieee 802.15.4 link layer. this paper provides an evaluation of several independent implementations of the IPv6 over ieee 802.15.4 standard. We describe the characteristics of the implementations and the protocol features supported. Our interoperability tests, carried out using two different hardware platforms, show that at least three implementations are to a large extend compatible with each other. At the end of the paper, we summarize recent work in the IETF to improve the IPv6 over ieee 802.15.4 technology.
Many sensor networks are deployed to detect and track intruders. If the existence and location of sensor nodes is disclosed to the opponent, the nodes can be easily disabled or compromised. Wireless transmissions in t...
详细信息
ISBN:
(纸本)9781424444885
Many sensor networks are deployed to detect and track intruders. If the existence and location of sensor nodes is disclosed to the opponent, the nodes can be easily disabled or compromised. Wireless transmissions in the presence of the opponent are an important source of disclosure. In this paper, we first describe a way to quantify the stealthiness of the sensor node, with a numerical stealthiness metric. then, we introduce a local model based dissemination protocol, Try and Bounce (TAB) which takes into account stealth considerations while reporting and forwarding observation reports. In an experimental study comparing TAB to the widely used directed diffusion dissemination protocol, we find that TAB achieves significantly higher stealth for equivalent tracking accuracy, or, alternatively, lower tracking error for equivalent stealth expenditure.
暂无评论