A multi layer gridless area router is reported.Based on corner stitching,this router adopts tile expansion to explore path for each net.A heuristic method that penalizes nodes deviating from the destination is devise...A multi layer gridless area router is reported.Based on corner stitching,this router adopts tile expansion to explore path for each net.A heuristic method that penalizes nodes deviating from the destination is devised to accelerate the algorithm.Besides,an enhanced interval tree is used to manage the intermediate data structure.In order to improve the completion rate of routing,a new gridless rip up and rerouting algorithm is proposed.The experimental results indicate that the completion rate is improved after the rip up and reroute process and the speed of this algorithm is satisfactory.展开更多
A cross point assignment algorithm is proposed under consideration of very long nets (LCPA).It is to consider not only the cost of connection between cross points and pins and the exclusive cost among cross points on ...A cross point assignment algorithm is proposed under consideration of very long nets (LCPA).It is to consider not only the cost of connection between cross points and pins and the exclusive cost among cross points on the boundary of a global routing cell,but also the cost of displacement among cross points of the same net.The experiment results show that the quality and speed in the following detailed routing are improved obviously,especially for very long nets.展开更多
Wireless technology is applied increasingly in networked control systems. A new form of wireless network called wireless sensor network can bring control systems some advantages, such as flexibility and feasibility of...Wireless technology is applied increasingly in networked control systems. A new form of wireless network called wireless sensor network can bring control systems some advantages, such as flexibility and feasibility of network deployment at low costs, while it also raises some new challenges. First, the communication resources shared by all the control loops are limited. Second, the wireless and multi-hop character of sensor network makes the resources scheduling more difficult. Thus, how to effectively allocate the limited communication resources for those control loops is an important problem. In this paper, this problem is formulated as an optimal sampling frequency assignment problem, where the objective function is to maximize the utility of control systems, subject to channel capacity constraints. Then an iterative distributed algorithm based on local buffer information is proposed. Finally, the simulation results show that the proposed algorithm can effectively allocate the limited communication resource in a distributed way. It can achieve the optimal quality of the control system and adapt to the network load changes.展开更多
In this paper, we propose an analytical model for the performance evaluation of IEEE 802.1 le enhanced distributed channel access (EDCA). Different from most previous analytical studies based on the saturation assum...In this paper, we propose an analytical model for the performance evaluation of IEEE 802.1 le enhanced distributed channel access (EDCA). Different from most previous analytical studies based on the saturation assumption, we extend the analytical model to non-saturation conditions. An empty state is introduced into the Markov chain to represent the status of transmission queue being empty. This model can be used to calculate the traffic priority, throughput, and MAC layer delay with various configurations of contention parameters. A detailed simulation is provided to validate the proposed model. With the help of this model, the contention parameters can be configured appropriately to achieve specific quality-of-service (QoS) requirements.展开更多
The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference m...The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs.展开更多
In a cognitive radio network, the secondary users can use the spectrum holes when the primary users do not utilize the spectrum, but they must vacant the spectrum when the primary users need to transmit data on the sp...In a cognitive radio network, the secondary users can use the spectrum holes when the primary users do not utilize the spectrum, but they must vacant the spectrum when the primary users need to transmit data on the spectrum. In other words, the primary users have higher priority over the secondary users. In this paper, backlog and delay distribution bounds for both primary users and secondary users are obtained. The analysis is based on stochastic network calculus, for which, stochastic service curves are t-n-st derived for both primary users and secondary users, and the network calculus independent case analysis approach is used to find the distribution bounds. Numerical results and simulation results are also presented and discussed.展开更多
A new application of Sun ONE architecture — an online custom system for Knitted Sweaters is presented, which links sweater design, manufacturing and sales in different places to share information through the Internet...A new application of Sun ONE architecture — an online custom system for Knitted Sweaters is presented, which links sweater design, manufacturing and sales in different places to share information through the Internet.The framework and characteristics of J2EE and Sun ONE are analyzed. Having studied the requirements of the online custom system for knitted sweaters, the paper presents a detailed and original system design based on J2EE technology and Web Services. This paper also gives descriptions on how to assemble and deploy the whole system under the Sun ONE architecture.展开更多
The key technologies involved in the evolution of the Cloud-based Radio Access Network(C-RAN) are discussed in this paper. Taking the Frameless Network Architecture(FNA) as a starting point, a cell-lessbased network t...The key technologies involved in the evolution of the Cloud-based Radio Access Network(C-RAN) are discussed in this paper. Taking the Frameless Network Architecture(FNA) as a starting point, a cell-lessbased network topology for a multi-tier Heterogeneous Network(Het Net) and ultra-dense network is proposed. The FNA network topology modeling is researched with centralized processing and distributed antenna deployments. The Antenna Element(AE) is released as a new dimensional radio resource that is included in the centralized Radio Resource Management(RRM) processes. This contributes to the on-demand user-centric serving-set associations with cell-edge effect elimination. The Control Plane(CP) and User Plane(UP) separation and adaptation are introduced for energy efficiency improvements. The centralized RRM and different optimization goals are discussed for fully exploring the merits from the centralized computing of C-RAN. Considering the complexity, near-optimal approaches for specific users' Quality-of-Service(Qo S) requirements are addressed. Finally, based on the research highlighted above, the way forward of C-RAN evolution is discussed.展开更多
This paper proposes a modification to distributed coordination function (DCF) to improve the channel utilization in IEEE 802.11 wireless local area networks ( WLANs). In the modified DCF, when a station has conten...This paper proposes a modification to distributed coordination function (DCF) to improve the channel utilization in IEEE 802.11 wireless local area networks ( WLANs). In the modified DCF, when a station has contended for the channel, it may transmit multiple data frames continuously to the same destination, which is called transmission burst(TB). When the maximum number of data packets transmitted continuously in a TB is set to be 2, the performance is expected to be the best. The theoretical analysis and simulation results show that compared with the standard DCF, the modified DCF can increase the throughput and decrease the delay of the WLAN, and the modification does not introduce any additional control overhead.展开更多
We propose a distributed closedloop power control scheme for a cognitive radio network(CRN) based on our developed state space model of the CRN. The whole power control process is separated into outer control loop and...We propose a distributed closedloop power control scheme for a cognitive radio network(CRN) based on our developed state space model of the CRN. The whole power control process is separated into outer control loop and inner control loop in order to solve different problem. In outer loop, the interference temperature(IT) constraint is transformed to a performance index minimized by a state feedback controller to obtain an appropriate target signal to interference plus noise ratio(SINR) of secondary user(SU). For ideal channel model and random time-varying channel model, our designed controller is a linear quadratic regulator(LQR) and a linear quadratic Gaussian(LQG) regulator respectively. While in inner loop, SU controls its transmit power to make the instantaneous SINR track the corresponding target and ensure the IT constraint under the limited threshold. The closed-loop stability of the CRN is proved and the performance of proposed control scheme is presented by computer simulations, which shows that this scheme can effectively guarantee both the requirement of SINR and IT constraint for all SUs.展开更多
A novel distributed cognitive radio multichannel medium access protocol without common control channel was proposed.The protocol divided a transmission interval into two parts for exchanging control information and da...A novel distributed cognitive radio multichannel medium access protocol without common control channel was proposed.The protocol divided a transmission interval into two parts for exchanging control information and data,respectively.In addition to evaluating system saturation throughput of the proposed protocol,a three-dimensional multi channel Markov chain model to describe the sate of the cognitive users (CUs) in dynamic spectrum access was presented.The proposed analysis was applied to the packet transmission schemes employed by the basic,RTS/CTS access mechanism adopted in the normal IEEE 802.11.Analyzing the advantage of the two methods,a hybrid access mechanism was proposed to improve the system throughput.The simulation results show that the experiment results are close to the value computed by the model (less than 5%),and the proposed protocol significantly improves the performance of the system throughput by borrowing the licensed spectrum.By analyzing the dependence of throughput on system parameters,hybrid mechanism dynamically selecting access mechanism can maintain high throughput.展开更多
Opportunistic Routing (OR) involves multiple forwarding candidates to relay packets by taking advantage of the broadcast nature and multi-user diversity of a wireless medium. Compared with Traditional Routing (TR), OR...Opportunistic Routing (OR) involves multiple forwarding candidates to relay packets by taking advantage of the broadcast nature and multi-user diversity of a wireless medium. Compared with Traditional Routing (TR), OR is more suitable in the case of an unreliable wireless link and can evidently improve the end-to-end throughput of Wireless Mesh Networks (WMNs). In this paper, we focus on OR in Multi-Radio Multi-Channel WMNs (MRMC-WMNs). This problem has not been well examined and is considerably more challenging than the OR in single-radio wireless networks considered in the existing literature. First, we validate the advantage of OR in MRMC-WMNs. Second, we propose Low-complexity Channel Assignment for Opportunistic Routing (LcCAOR), which assigns channels to flows according to the interference state of every node. Third, we implement the LcCOAR in a fully distributed manner. The simulation result shows that compared with OR in Single-Radio Single-Channel WMNs (SRSC-WMNs), the proposed OR can significantly enhance the throughput to 87.11% and 100.3% in grid and tree WMNs, respectively.展开更多
文摘A multi layer gridless area router is reported.Based on corner stitching,this router adopts tile expansion to explore path for each net.A heuristic method that penalizes nodes deviating from the destination is devised to accelerate the algorithm.Besides,an enhanced interval tree is used to manage the intermediate data structure.In order to improve the completion rate of routing,a new gridless rip up and rerouting algorithm is proposed.The experimental results indicate that the completion rate is improved after the rip up and reroute process and the speed of this algorithm is satisfactory.
文摘A cross point assignment algorithm is proposed under consideration of very long nets (LCPA).It is to consider not only the cost of connection between cross points and pins and the exclusive cost among cross points on the boundary of a global routing cell,but also the cost of displacement among cross points of the same net.The experiment results show that the quality and speed in the following detailed routing are improved obviously,especially for very long nets.
基金Project (Nos. 60074011 and 60574049) supported by the National Natural Science Foundation of China
文摘Wireless technology is applied increasingly in networked control systems. A new form of wireless network called wireless sensor network can bring control systems some advantages, such as flexibility and feasibility of network deployment at low costs, while it also raises some new challenges. First, the communication resources shared by all the control loops are limited. Second, the wireless and multi-hop character of sensor network makes the resources scheduling more difficult. Thus, how to effectively allocate the limited communication resources for those control loops is an important problem. In this paper, this problem is formulated as an optimal sampling frequency assignment problem, where the objective function is to maximize the utility of control systems, subject to channel capacity constraints. Then an iterative distributed algorithm based on local buffer information is proposed. Finally, the simulation results show that the proposed algorithm can effectively allocate the limited communication resource in a distributed way. It can achieve the optimal quality of the control system and adapt to the network load changes.
基金Project (No. 60332030) supported by the National Natural ScienceFoundation of China
文摘In this paper, we propose an analytical model for the performance evaluation of IEEE 802.1 le enhanced distributed channel access (EDCA). Different from most previous analytical studies based on the saturation assumption, we extend the analytical model to non-saturation conditions. An empty state is introduced into the Markov chain to represent the status of transmission queue being empty. This model can be used to calculate the traffic priority, throughput, and MAC layer delay with various configurations of contention parameters. A detailed simulation is provided to validate the proposed model. With the help of this model, the contention parameters can be configured appropriately to achieve specific quality-of-service (QoS) requirements.
基金This work is supported by the National Natural Science Foundation for Distinguished Young Scholar of China under Grant No. 61325006 and the National High-tech Research and Development Program of China under Grant No. 2014AA01A701.
文摘The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs.
文摘In a cognitive radio network, the secondary users can use the spectrum holes when the primary users do not utilize the spectrum, but they must vacant the spectrum when the primary users need to transmit data on the spectrum. In other words, the primary users have higher priority over the secondary users. In this paper, backlog and delay distribution bounds for both primary users and secondary users are obtained. The analysis is based on stochastic network calculus, for which, stochastic service curves are t-n-st derived for both primary users and secondary users, and the network calculus independent case analysis approach is used to find the distribution bounds. Numerical results and simulation results are also presented and discussed.
基金the key Project of Ministry of Education of China(No01083)
文摘A new application of Sun ONE architecture — an online custom system for Knitted Sweaters is presented, which links sweater design, manufacturing and sales in different places to share information through the Internet.The framework and characteristics of J2EE and Sun ONE are analyzed. Having studied the requirements of the online custom system for knitted sweaters, the paper presents a detailed and original system design based on J2EE technology and Web Services. This paper also gives descriptions on how to assemble and deploy the whole system under the Sun ONE architecture.
基金supported by the National High Technology Research and Development Program of China No.2014AA01A701Nature and Science Foundation of China under Grants No.61471068,61421061+2 种基金Beijing Nova Programme No.Z131101000413030International Collaboration Project No.2015DFT10160National Major Project No.2016ZX03001009-003
文摘The key technologies involved in the evolution of the Cloud-based Radio Access Network(C-RAN) are discussed in this paper. Taking the Frameless Network Architecture(FNA) as a starting point, a cell-lessbased network topology for a multi-tier Heterogeneous Network(Het Net) and ultra-dense network is proposed. The FNA network topology modeling is researched with centralized processing and distributed antenna deployments. The Antenna Element(AE) is released as a new dimensional radio resource that is included in the centralized Radio Resource Management(RRM) processes. This contributes to the on-demand user-centric serving-set associations with cell-edge effect elimination. The Control Plane(CP) and User Plane(UP) separation and adaptation are introduced for energy efficiency improvements. The centralized RRM and different optimization goals are discussed for fully exploring the merits from the centralized computing of C-RAN. Considering the complexity, near-optimal approaches for specific users' Quality-of-Service(Qo S) requirements are addressed. Finally, based on the research highlighted above, the way forward of C-RAN evolution is discussed.
基金Supported by National Natural Science Foundation of China (No. 60472078 and No. 90604013).
文摘This paper proposes a modification to distributed coordination function (DCF) to improve the channel utilization in IEEE 802.11 wireless local area networks ( WLANs). In the modified DCF, when a station has contended for the channel, it may transmit multiple data frames continuously to the same destination, which is called transmission burst(TB). When the maximum number of data packets transmitted continuously in a TB is set to be 2, the performance is expected to be the best. The theoretical analysis and simulation results show that compared with the standard DCF, the modified DCF can increase the throughput and decrease the delay of the WLAN, and the modification does not introduce any additional control overhead.
基金supported by the National Natural Science Foundation of China (Grant No. 61571209)
文摘We propose a distributed closedloop power control scheme for a cognitive radio network(CRN) based on our developed state space model of the CRN. The whole power control process is separated into outer control loop and inner control loop in order to solve different problem. In outer loop, the interference temperature(IT) constraint is transformed to a performance index minimized by a state feedback controller to obtain an appropriate target signal to interference plus noise ratio(SINR) of secondary user(SU). For ideal channel model and random time-varying channel model, our designed controller is a linear quadratic regulator(LQR) and a linear quadratic Gaussian(LQG) regulator respectively. While in inner loop, SU controls its transmit power to make the instantaneous SINR track the corresponding target and ensure the IT constraint under the limited threshold. The closed-loop stability of the CRN is proved and the performance of proposed control scheme is presented by computer simulations, which shows that this scheme can effectively guarantee both the requirement of SINR and IT constraint for all SUs.
基金Project(61071104) supported by the National Natural Science Foundation of China
文摘A novel distributed cognitive radio multichannel medium access protocol without common control channel was proposed.The protocol divided a transmission interval into two parts for exchanging control information and data,respectively.In addition to evaluating system saturation throughput of the proposed protocol,a three-dimensional multi channel Markov chain model to describe the sate of the cognitive users (CUs) in dynamic spectrum access was presented.The proposed analysis was applied to the packet transmission schemes employed by the basic,RTS/CTS access mechanism adopted in the normal IEEE 802.11.Analyzing the advantage of the two methods,a hybrid access mechanism was proposed to improve the system throughput.The simulation results show that the experiment results are close to the value computed by the model (less than 5%),and the proposed protocol significantly improves the performance of the system throughput by borrowing the licensed spectrum.By analyzing the dependence of throughput on system parameters,hybrid mechanism dynamically selecting access mechanism can maintain high throughput.
基金supported by the National Basic Research Program of China (973) under Grant No.2012CB315801 the National Natural Science Foundation of China under Grants No.61003305,No.61173167,No.61173168,No.61070194 the Information Security Industrialization Fund from the National Development&Reform Commission of China (NDRC) under Grant No.NDRC[2009]1886
文摘Opportunistic Routing (OR) involves multiple forwarding candidates to relay packets by taking advantage of the broadcast nature and multi-user diversity of a wireless medium. Compared with Traditional Routing (TR), OR is more suitable in the case of an unreliable wireless link and can evidently improve the end-to-end throughput of Wireless Mesh Networks (WMNs). In this paper, we focus on OR in Multi-Radio Multi-Channel WMNs (MRMC-WMNs). This problem has not been well examined and is considerably more challenging than the OR in single-radio wireless networks considered in the existing literature. First, we validate the advantage of OR in MRMC-WMNs. Second, we propose Low-complexity Channel Assignment for Opportunistic Routing (LcCAOR), which assigns channels to flows according to the interference state of every node. Third, we implement the LcCOAR in a fully distributed manner. The simulation result shows that compared with OR in Single-Radio Single-Channel WMNs (SRSC-WMNs), the proposed OR can significantly enhance the throughput to 87.11% and 100.3% in grid and tree WMNs, respectively.