This paper presents an analytical saturation throughput model of IEEE 802.11 DCF (distributed coordination function) with basic access in ad hoc mode. The model takes into account freezing of the backoff timer when a ...This paper presents an analytical saturation throughput model of IEEE 802.11 DCF (distributed coordination function) with basic access in ad hoc mode. The model takes into account freezing of the backoff timer when a station senses busy channel. It is shown that taking into account this feature of DCF is important in modeling saturation throughput by yielding more accurate and realistic results than models known from literature. The proposed analytical model also takes into account the effect of transmission errors. All essential features of the proposed analytical approach are illustrated with numerical results. The presen-tation of the model is proceeded by an overview of approaches to IEEE 802.11 network performance evaluation presented in the literature.展开更多
IEEE 802.11 distributed coordination function (DCF) is a distributed medium access scheme based on carrier sense multiple access with collision avoidance (CSMA/CA) protocol. Many literatures have analyzed the perf...IEEE 802.11 distributed coordination function (DCF) is a distributed medium access scheme based on carrier sense multiple access with collision avoidance (CSMA/CA) protocol. Many literatures have analyzed the performance of IEEE802.11 DCF. However, such literatures either used simulation methods or built the analytical models under the assumption that the saturation condition was satisfied. To overcome such a problem, in this paper, a hi-dimensional Markovian model has been introduced to depict the DCF mechanism. The proposed model introduced an idle stage and a discrete time M/G/1 queue to deduce the channel throughput under finite load traffic. Simulation results proved the accuracy of the proposed model.展开更多
The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference m...The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs.展开更多
Single-camera mobile-vision coordinate measurement is one of the primary methods of 3D-coordinate vision measurement, and coded target plays an important role in this system. A multifunctional coded target and its rec...Single-camera mobile-vision coordinate measurement is one of the primary methods of 3D-coordinate vision measurement, and coded target plays an important role in this system. A multifunctional coded target and its recognition algorithm is developed, which can realize automatic match of feature points, calculation of camera initial exterior orientation and space scale factor constraint in measurement system. The uniqueness and scalability of coding are guaranteed by the rational arrangement of code bits. The recognition of coded targets is realized by cross-ratio invariance restriction, space coordinates transform of feature points based on spacial pose estimation algorithm, recognition of code bits and computation of coding values. The experiment results demonstrate the uniqueness of the coding form and the reliability of recognition.展开更多
文摘This paper presents an analytical saturation throughput model of IEEE 802.11 DCF (distributed coordination function) with basic access in ad hoc mode. The model takes into account freezing of the backoff timer when a station senses busy channel. It is shown that taking into account this feature of DCF is important in modeling saturation throughput by yielding more accurate and realistic results than models known from literature. The proposed analytical model also takes into account the effect of transmission errors. All essential features of the proposed analytical approach are illustrated with numerical results. The presen-tation of the model is proceeded by an overview of approaches to IEEE 802.11 network performance evaluation presented in the literature.
文摘IEEE 802.11 distributed coordination function (DCF) is a distributed medium access scheme based on carrier sense multiple access with collision avoidance (CSMA/CA) protocol. Many literatures have analyzed the performance of IEEE802.11 DCF. However, such literatures either used simulation methods or built the analytical models under the assumption that the saturation condition was satisfied. To overcome such a problem, in this paper, a hi-dimensional Markovian model has been introduced to depict the DCF mechanism. The proposed model introduced an idle stage and a discrete time M/G/1 queue to deduce the channel throughput under finite load traffic. Simulation results proved the accuracy of the proposed model.
基金This work is supported by the National Natural Science Foundation for Distinguished Young Scholar of China under Grant No. 61325006 and the National High-tech Research and Development Program of China under Grant No. 2014AA01A701.
文摘The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs.
文摘Single-camera mobile-vision coordinate measurement is one of the primary methods of 3D-coordinate vision measurement, and coded target plays an important role in this system. A multifunctional coded target and its recognition algorithm is developed, which can realize automatic match of feature points, calculation of camera initial exterior orientation and space scale factor constraint in measurement system. The uniqueness and scalability of coding are guaranteed by the rational arrangement of code bits. The recognition of coded targets is realized by cross-ratio invariance restriction, space coordinates transform of feature points based on spacial pose estimation algorithm, recognition of code bits and computation of coding values. The experiment results demonstrate the uniqueness of the coding form and the reliability of recognition.