The medium access control (MAC) issue was discussed in mobile Ad Hoc networks (MANETs). Based on the IEEE 802.11 MAC protocol, this paper proposed two schemes, the forward-packet-first (FPF) scheme based on the adapti...The medium access control (MAC) issue was discussed in mobile Ad Hoc networks (MANETs). Based on the IEEE 802.11 MAC protocol, this paper proposed two schemes, the forward-packet-first (FPF) scheme based on the adaptive backoff contention window and multihop forward chain transmission by invitation (MFCTI) scheme. In the FPF scheme, the contention window was adjusted adaptively according to the traffic priority. Route information and the broadcast characteristic of radio were utilized in MFCTI scheme. The performance of these schemes was studied in multihop environments by simulations. The results showed that the proposed schemes could improve the network throughput, reduce the end-to-end average delay, and mitigate local congestion effectively. Another attractive feature was that the schemes could be implemented with minor modifications to the IEEE 802.11 MAC.展开更多
This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is impl...This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is implemented and the number of the data channel is independent of the network topology. The priority for real-time traffic is assured by the proposed adaptive back off algorithm and different IFS. The protocol is evaluated by simulation and the results have shown that it can support multiple traffics and the performance is better than the performance that IEEE 802.11 standard provides.展开更多
The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to t...The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet.展开更多
This paper studies the relationship between mobility, navigation and localization in the context of wireless sensor networks with mobile beacons. It is observed that mobility can aid in network node localization and t...This paper studies the relationship between mobility, navigation and localization in the context of wireless sensor networks with mobile beacons. It is observed that mobility can aid in network node localization and that once localized, the network nodes can localize and track a mobile object and guide its navigation. A distributed kernel-based algorithm is proposed that enables the nodes to establish confident position estimates in the presence of ranging inaccuracies. The proposed approach features robustness with respect to range measurement inaccuracies, low complexity and distributed implementation, using only local information. Simulation validates our approach viable.展开更多
By modifying the IEEE 802.11 wireless local area network(WLAN) medium access protocol(MAC),a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of fram...By modifying the IEEE 802.11 wireless local area network(WLAN) medium access protocol(MAC),a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of frame in real time applications.Both protocols can ensure the real time frame only need to wait a determinable bounded time.These two protocols are introduced briefly and a performance comparison between them is made.Simulation results show that each protocol has advantage over the others in certain network condition.展开更多
WLAN mdoor location method based on artificial neural network (ANN) is analyzed. A three layer feed-forward ANN model offers the benefits of reducing time cost of the layout of an indoor location system, saving stor...WLAN mdoor location method based on artificial neural network (ANN) is analyzed. A three layer feed-forward ANN model offers the benefits of reducing time cost of the layout of an indoor location system, saving storage cost of the radio map establishment and enhancing real-time capacity in the on-line phase. According to the analysis of SNR distributions of recorded beacon signal samples and discussion about the multi-mode phenomenon, the one map method is proposed for the purpose of simplifying ANN input values and increasing location performances. Based on the simulations and comparison analysis with other two typical indoor location methods, K-nearest neighbor (KNN) and probability, the feasibility and effectiveness of ANN-based indoor location method are verified with average location error of 2.37m and location accuracy of 78.6% in 3m.展开更多
文摘The medium access control (MAC) issue was discussed in mobile Ad Hoc networks (MANETs). Based on the IEEE 802.11 MAC protocol, this paper proposed two schemes, the forward-packet-first (FPF) scheme based on the adaptive backoff contention window and multihop forward chain transmission by invitation (MFCTI) scheme. In the FPF scheme, the contention window was adjusted adaptively according to the traffic priority. Route information and the broadcast characteristic of radio were utilized in MFCTI scheme. The performance of these schemes was studied in multihop environments by simulations. The results showed that the proposed schemes could improve the network throughput, reduce the end-to-end average delay, and mitigate local congestion effectively. Another attractive feature was that the schemes could be implemented with minor modifications to the IEEE 802.11 MAC.
基金Supported by the"863"project under contract 2001 A A 123016
文摘This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is implemented and the number of the data channel is independent of the network topology. The priority for real-time traffic is assured by the proposed adaptive back off algorithm and different IFS. The protocol is evaluated by simulation and the results have shown that it can support multiple traffics and the performance is better than the performance that IEEE 802.11 standard provides.
基金The National Natural Science Foundation ofChina(No60703031)The Natural Science Foundation of Shaanxi Province ( No2007F50)
文摘The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet.
文摘This paper studies the relationship between mobility, navigation and localization in the context of wireless sensor networks with mobile beacons. It is observed that mobility can aid in network node localization and that once localized, the network nodes can localize and track a mobile object and guide its navigation. A distributed kernel-based algorithm is proposed that enables the nodes to establish confident position estimates in the presence of ranging inaccuracies. The proposed approach features robustness with respect to range measurement inaccuracies, low complexity and distributed implementation, using only local information. Simulation validates our approach viable.
基金National Science Foundation of China (No60474031)NCET(No04-0383)
文摘By modifying the IEEE 802.11 wireless local area network(WLAN) medium access protocol(MAC),a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of frame in real time applications.Both protocols can ensure the real time frame only need to wait a determinable bounded time.These two protocols are introduced briefly and a performance comparison between them is made.Simulation results show that each protocol has advantage over the others in certain network condition.
文摘WLAN mdoor location method based on artificial neural network (ANN) is analyzed. A three layer feed-forward ANN model offers the benefits of reducing time cost of the layout of an indoor location system, saving storage cost of the radio map establishment and enhancing real-time capacity in the on-line phase. According to the analysis of SNR distributions of recorded beacon signal samples and discussion about the multi-mode phenomenon, the one map method is proposed for the purpose of simplifying ANN input values and increasing location performances. Based on the simulations and comparison analysis with other two typical indoor location methods, K-nearest neighbor (KNN) and probability, the feasibility and effectiveness of ANN-based indoor location method are verified with average location error of 2.37m and location accuracy of 78.6% in 3m.