期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
立即可解网络编码应用于无线网络重传中的时延分析
1
作者 王练 彭代渊 陈巧 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2018年第3期329-337,共9页
立即可解网络编码(instantly decodable network coding,IDNC)分为狭义立即可解网络编码(strict IDNC,SIDNC)和广义立即可解网络编码(generalized IDNC,G-IDNC)。分析了S-IDNC和G-IDNC的特点,并对这2种思想应用于重传的时延性能做了对... 立即可解网络编码(instantly decodable network coding,IDNC)分为狭义立即可解网络编码(strict IDNC,SIDNC)和广义立即可解网络编码(generalized IDNC,G-IDNC)。分析了S-IDNC和G-IDNC的特点,并对这2种思想应用于重传的时延性能做了对比分析。以最小化解码时延为目标提出基于S-IDNC和基于G-IDNC权重顶点搜索算法,实验对比分析了所提算法和已有典型算法性能,验证了所提算法的有效性,并归纳了S-IDNC和G-IDNC的时延特征差异。实验结果表明,基于S-IDNC的重传算法使得信宿节点的时延大小分布较为聚集,而基于G-IDNC的重传算法时延大小分布更为分散,G-IDNC时延均值优于S-IDNC,而S-IDNC系统完成时延优于G-IDNC。 展开更多
关键词 立即可解网络编码 无线网络重传 无线网络时延 无线单跳网络
下载PDF
Efficient network coding-based retransmission algorithm for reliable wireless multicast
2
作者 赵渊 WangXiaoxiang Wang Yulong Li Song 《High Technology Letters》 EI CAS 2012年第4期364-370,共7页
Recent research shows using network sion efficiency in wireless networks greatly et for retransmission over composite fading coding for reliable multicast can improve the retransmis- In this paper, we study how to co... Recent research shows using network sion efficiency in wireless networks greatly et for retransmission over composite fading coding for reliable multicast can improve the retransmis- In this paper, we study how to code the composite pack- channels efficiently. For the composite fading environ- ment with muhiple receivers, receivers experience different fading at any time. It' s very important to code the composite packet so that intended receivers are in good channel qualities, because in- tended receivers in deep fading have little opportunity to receive the composite packet correctly. Hence, we propose a novel composite packet coding principle of maximizing the total SNR of intend- ed receivers. Since the proposed principle is an NP-complete problem, an efficient heuristic algo- rithm with low complexity is given for finding a suboptimal solution. Simulation results show the heu- ristic based scheme achieves higher transmission efficiency than other network coding-based schemes due to the multi-user diversity gain. 展开更多
关键词 network coding reliable multicast multi-user diversity
下载PDF
A study on TCP performance of crowdsourced live streaming 被引量:1
3
作者 周建二 Wu Qinghua +2 位作者 Li Zhenyu Xu Chuan Xie Gaogang 《High Technology Letters》 EI CAS 2017年第1期109-116,共8页
The prevalence of smart phone and improvement of wireless net promote the usage of crowdsourced live streaming,where individual users act as live streaming sources to broadcast themselves online. Characterizing the pe... The prevalence of smart phone and improvement of wireless net promote the usage of crowdsourced live streaming,where individual users act as live streaming sources to broadcast themselves online. Characterizing the performance and identifying its bottleneck in such systems can shed light on the system design and performance optimization. TCP performance of a commercial crowdsourced live streaming system is examined by analyzing packet-level traces collected at streaming servers. TCP stalls that heavily hurt the Qo E of user have been identified. In particular,the TCP stalls account for as much as 31. 6% of the flow completion time for upload flows and result in abandonment of upload on the corresponding channels. Stalls caused by timeout retransmissions are further dissected and timeout retransmission characteristics are revealed to be dependent on the video encoding methods. These findings provide new insights in crowdsourced live streaming systems and can guide designers to improve the TCP efficiency. 展开更多
关键词 crowdsourced live streaming TCP performance system design and measurement
下载PDF
Optimizing Utility of Cognitive Radio Ad Hoc Networks under the Energy and Retransmission Constraint
4
作者 FENG Guangsheng ZHAO Qian +3 位作者 WANG Huiqiang LV Hongwu Lin JUNYU MA Chunguang 《China Communications》 SCIE CSCD 2014年第A01期148-155,共8页
In Cognitive radio ad hoc networks (CRAHNs), the secondary users (SUs) or cognitive radio nodes (CRs) are always equipped with limited energy and have a high error probability of data transmission. To address th... In Cognitive radio ad hoc networks (CRAHNs), the secondary users (SUs) or cognitive radio nodes (CRs) are always equipped with limited energy and have a high error probability of data transmission. To address this issue, we first describe the network utility under energy constraint as a max-min model, where the re-transmission strategy with network coding is employed. Additionally, the expression of retransmission probability is presented in terms of power and bit error rate (BER). Moreover, since the max-min model is non-convex in both objective and constraints, we use a normal- form game to find a near-optimal solution. The simulation results show that the proposed approach could achieve a higher network utility than the compared approaches. 展开更多
关键词 cognitive radio ad hoc networks retransmission probability
下载PDF
A FUNCTION NODE-BASED MULTIPLE PAIRWISE KEYS MANAGEMENT PROTOCOL FOR WIRELESS SENSOR NETWORKS AND ENERGY CONSUMPTION ANALYSIS
5
作者 Bi Jiana Wang Hui Sun Yandong Liu Yanzhao Ji Zhenzhou 《Journal of Electronics(China)》 2009年第5期692-698,共7页
In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data... In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data collection and transmission, and function nodes are responsible for key management. There are more than one function nodes in the cluster consulting the key generation and other security decision-making. The function nodes are the second-class security center because of the characteristics of the distributed WSNs. Secondly, It is also described that the formation of function nodes and cluster heads under the control of the former, and five kinds of keys, i.e., individual key, pairwise keys, cluster key, management key, and group key. Finally, performance analysis and experiments show that, the protocol is superior in communication and energy consumption. The delay of establishing the cluster key meets the requirements, and a multiple pairwise key which adopts the coordinated security authentication scheme is provided. 展开更多
关键词 Wireless Sensor Networks (WSNs) Function nodes Key management Energy consumption
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部