The medium access control (MAC) issue was discussed in mobile Ad Hoc networks (MANETs). Based on the IEEE 802.11 MAC protocol, this paper proposed two schemes, the forward-packet-first (FPF) scheme based on the adapti...The medium access control (MAC) issue was discussed in mobile Ad Hoc networks (MANETs). Based on the IEEE 802.11 MAC protocol, this paper proposed two schemes, the forward-packet-first (FPF) scheme based on the adaptive backoff contention window and multihop forward chain transmission by invitation (MFCTI) scheme. In the FPF scheme, the contention window was adjusted adaptively according to the traffic priority. Route information and the broadcast characteristic of radio were utilized in MFCTI scheme. The performance of these schemes was studied in multihop environments by simulations. The results showed that the proposed schemes could improve the network throughput, reduce the end-to-end average delay, and mitigate local congestion effectively. Another attractive feature was that the schemes could be implemented with minor modifications to the IEEE 802.11 MAC.展开更多
In order to simulate the real growing process, a new type of knowledge network growth mechanism based on local world connectivity is constructed. By the mean-field method, theoretical prediction of the degree distribu...In order to simulate the real growing process, a new type of knowledge network growth mechanism based on local world connectivity is constructed. By the mean-field method, theoretical prediction of the degree distribution of the knowledge network is given, which is verified by Matlab simulations. When the new added node's local world size is very small, the degree distribution of the knowledge network approximately has the property of scale-free. When the new added node's local world size is not very small, the degree distribution transforms from pure power-law to the power-law with an exponential tailing. And the scale-free index increases as the number of new added edges decreases and the tunable parameters increase. Finally, comparisons of some knowledge indices in knowledge networks generated by the local world mechanism and the global mechanism are given. In the long run, compared with the global mechanism, the local world mechanism leads the average knowledge levels to slower growth and brings homogenous phenomena.展开更多
The local-world (LW) evolving network model shows a transition for the degree distribution between the exponential and power-law distributions, depending on the LW size. Cascading failures under intentional attacks in...The local-world (LW) evolving network model shows a transition for the degree distribution between the exponential and power-law distributions, depending on the LW size. Cascading failures under intentional attacks in LW network models with different LW sizes were investigated using the cascading failures load model. We found that the LW size has a significant impact on the network's robustness against deliberate attacks. It is much easier to trigger cascading failures in LW evolving networks with a larger LW size. Therefore, to avoid cascading failures in real networks with local preferential attachment such as the Internet, the World Trade Web and the multi-agent system, the LW size should be as small as possible.展开更多
In order to meet the exponentially increasing demand on mobile data traffic, self-backhaul ultra-dense networks(UDNs) combined with millimeter wave(mm Wave) communications are expected to provide high spatial multiple...In order to meet the exponentially increasing demand on mobile data traffic, self-backhaul ultra-dense networks(UDNs) combined with millimeter wave(mm Wave) communications are expected to provide high spatial multiplexing gain and wide bandwidths for multi-gigabit peak data rates. In selfbackhaul UDNs, how to make the radio access rates of small cells match their backhaul rates by user association and how to dynamically allocate bandwidth for the access links and backhaul links to balance two-hop link resources are two key problems on improving the overall throughputs. Based on this, a joint scheme of user association and resource allocation is proposed in self-backhaul ultra-dense networks. Because of the combinatorial and nonconvex features of the original optimization problem, it has been divided into two subproblems. Firstly, to make the radio access rates of small base stations match their backhaul rates and maximize sum access rates per Hz of all small cells, a proportional constraint is introduced, and immune optimization algorithm(IOA) is adopted to optimize the association indicator variables and the boresight angles of between users and base stations. Then, the optimal backhaul and access bandwidths are calculated by differentiating the general expression of overall throughput. Simulation results indicatethat the proposed scheme increases the overall throughputs significantly compared to the traditional minimum-distance based association scheme.展开更多
This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is impl...This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is implemented and the number of the data channel is independent of the network topology. The priority for real-time traffic is assured by the proposed adaptive back off algorithm and different IFS. The protocol is evaluated by simulation and the results have shown that it can support multiple traffics and the performance is better than the performance that IEEE 802.11 standard provides.展开更多
To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IU...To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA.展开更多
The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to t...The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet.展开更多
This paper studies the relationship between mobility, navigation and localization in the context of wireless sensor networks with mobile beacons. It is observed that mobility can aid in network node localization and t...This paper studies the relationship between mobility, navigation and localization in the context of wireless sensor networks with mobile beacons. It is observed that mobility can aid in network node localization and that once localized, the network nodes can localize and track a mobile object and guide its navigation. A distributed kernel-based algorithm is proposed that enables the nodes to establish confident position estimates in the presence of ranging inaccuracies. The proposed approach features robustness with respect to range measurement inaccuracies, low complexity and distributed implementation, using only local information. Simulation validates our approach viable.展开更多
In this paper, authors describe the characters and the present situation of computer region network, Moreover, authors put forward the method to plan and de sign ration ally the computer regional network system depend...In this paper, authors describe the characters and the present situation of computer region network, Moreover, authors put forward the method to plan and de sign ration ally the computer regional network system depending on the actual situa tion, in order to share the resources of software and hardware resources of the net work in best way and get higher efficiency of information management.展开更多
With the digital information and application requirement on the Internet increasing fleetly nowadays,it is urgent to work out a network storage system with a large capacity,a high availability and scalability.To solve...With the digital information and application requirement on the Internet increasing fleetly nowadays,it is urgent to work out a network storage system with a large capacity,a high availability and scalability.To solve the above-mentioned issues,a NAS-based storage network(for short NASSN)has been designed.Firstly,the NASSN integrates multi-NAS,iNAS(an iSCSI-based NAS)and enterprise SAN with the help of storage virtualization,which can provide a greater capacity and better scalability.Secondly,the NASSN can provide high availability with the help of server and storage subsystem redundancy technologies.Thirdly,the NASSN simultaneously serves for both the file I/O and the block I/O with the help of an iSCSI module,which has the advantages of NAS and SAN.Finally,the NASSN can provide higher I/O speed by a high network-attached channel which implements the direct data transfer between the storage device and client.In the experiments,the NASSN has ultra-high-throughput for both of the file I/O requests and the block I/O requests.展开更多
By modifying the IEEE 802.11 wireless local area network(WLAN) medium access protocol(MAC),a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of fram...By modifying the IEEE 802.11 wireless local area network(WLAN) medium access protocol(MAC),a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of frame in real time applications.Both protocols can ensure the real time frame only need to wait a determinable bounded time.These two protocols are introduced briefly and a performance comparison between them is made.Simulation results show that each protocol has advantage over the others in certain network condition.展开更多
WLAN mdoor location method based on artificial neural network (ANN) is analyzed. A three layer feed-forward ANN model offers the benefits of reducing time cost of the layout of an indoor location system, saving stor...WLAN mdoor location method based on artificial neural network (ANN) is analyzed. A three layer feed-forward ANN model offers the benefits of reducing time cost of the layout of an indoor location system, saving storage cost of the radio map establishment and enhancing real-time capacity in the on-line phase. According to the analysis of SNR distributions of recorded beacon signal samples and discussion about the multi-mode phenomenon, the one map method is proposed for the purpose of simplifying ANN input values and increasing location performances. Based on the simulations and comparison analysis with other two typical indoor location methods, K-nearest neighbor (KNN) and probability, the feasibility and effectiveness of ANN-based indoor location method are verified with average location error of 2.37m and location accuracy of 78.6% in 3m.展开更多
The thesis describes an advanced digital solution to mining digital image monitor system, which makes up the shortage of the traditional mining analog image monitor. It illustrates the system components and how to cho...The thesis describes an advanced digital solution to mining digital image monitor system, which makes up the shortage of the traditional mining analog image monitor. It illustrates the system components and how to choose the encoder bandwidth of the system. The problem of image multicast and its solution in LAN are also discussed.展开更多
文摘The medium access control (MAC) issue was discussed in mobile Ad Hoc networks (MANETs). Based on the IEEE 802.11 MAC protocol, this paper proposed two schemes, the forward-packet-first (FPF) scheme based on the adaptive backoff contention window and multihop forward chain transmission by invitation (MFCTI) scheme. In the FPF scheme, the contention window was adjusted adaptively according to the traffic priority. Route information and the broadcast characteristic of radio were utilized in MFCTI scheme. The performance of these schemes was studied in multihop environments by simulations. The results showed that the proposed schemes could improve the network throughput, reduce the end-to-end average delay, and mitigate local congestion effectively. Another attractive feature was that the schemes could be implemented with minor modifications to the IEEE 802.11 MAC.
基金The National Natural Science Foundation of China(No70571013,70973017)Program for New Century Excellent Talentsin University (NoNCET-06-0471)Human Social Science Fund Project ofMinistry of Education (No09YJA630020)
文摘In order to simulate the real growing process, a new type of knowledge network growth mechanism based on local world connectivity is constructed. By the mean-field method, theoretical prediction of the degree distribution of the knowledge network is given, which is verified by Matlab simulations. When the new added node's local world size is very small, the degree distribution of the knowledge network approximately has the property of scale-free. When the new added node's local world size is not very small, the degree distribution transforms from pure power-law to the power-law with an exponential tailing. And the scale-free index increases as the number of new added edges decreases and the tunable parameters increase. Finally, comparisons of some knowledge indices in knowledge networks generated by the local world mechanism and the global mechanism are given. In the long run, compared with the global mechanism, the local world mechanism leads the average knowledge levels to slower growth and brings homogenous phenomena.
基金the National Basic Research Program (973) of China (No. 2004CB217902)the National Natural Science Foundation of China (Nos. 60421002 and 60804045)the Postdoctoral Science Foundation of China (No. 20070421163)
文摘The local-world (LW) evolving network model shows a transition for the degree distribution between the exponential and power-law distributions, depending on the LW size. Cascading failures under intentional attacks in LW network models with different LW sizes were investigated using the cascading failures load model. We found that the LW size has a significant impact on the network's robustness against deliberate attacks. It is much easier to trigger cascading failures in LW evolving networks with a larger LW size. Therefore, to avoid cascading failures in real networks with local preferential attachment such as the Internet, the World Trade Web and the multi-agent system, the LW size should be as small as possible.
基金supported by NSFC under Grant 61471303EU FP7 QUICK project under Grant PIRSES-GA-2013-612652
文摘In order to meet the exponentially increasing demand on mobile data traffic, self-backhaul ultra-dense networks(UDNs) combined with millimeter wave(mm Wave) communications are expected to provide high spatial multiplexing gain and wide bandwidths for multi-gigabit peak data rates. In selfbackhaul UDNs, how to make the radio access rates of small cells match their backhaul rates by user association and how to dynamically allocate bandwidth for the access links and backhaul links to balance two-hop link resources are two key problems on improving the overall throughputs. Based on this, a joint scheme of user association and resource allocation is proposed in self-backhaul ultra-dense networks. Because of the combinatorial and nonconvex features of the original optimization problem, it has been divided into two subproblems. Firstly, to make the radio access rates of small base stations match their backhaul rates and maximize sum access rates per Hz of all small cells, a proportional constraint is introduced, and immune optimization algorithm(IOA) is adopted to optimize the association indicator variables and the boresight angles of between users and base stations. Then, the optimal backhaul and access bandwidths are calculated by differentiating the general expression of overall throughput. Simulation results indicatethat the proposed scheme increases the overall throughputs significantly compared to the traditional minimum-distance based association scheme.
基金Supported by the"863"project under contract 2001 A A 123016
文摘This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is implemented and the number of the data channel is independent of the network topology. The priority for real-time traffic is assured by the proposed adaptive back off algorithm and different IFS. The protocol is evaluated by simulation and the results have shown that it can support multiple traffics and the performance is better than the performance that IEEE 802.11 standard provides.
基金Supported by the Ministry of Educationin China (No.104086)
文摘To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA.
基金The National Natural Science Foundation ofChina(No60703031)The Natural Science Foundation of Shaanxi Province ( No2007F50)
文摘The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet.
文摘This paper studies the relationship between mobility, navigation and localization in the context of wireless sensor networks with mobile beacons. It is observed that mobility can aid in network node localization and that once localized, the network nodes can localize and track a mobile object and guide its navigation. A distributed kernel-based algorithm is proposed that enables the nodes to establish confident position estimates in the presence of ranging inaccuracies. The proposed approach features robustness with respect to range measurement inaccuracies, low complexity and distributed implementation, using only local information. Simulation validates our approach viable.
文摘In this paper, authors describe the characters and the present situation of computer region network, Moreover, authors put forward the method to plan and de sign ration ally the computer regional network system depending on the actual situa tion, in order to share the resources of software and hardware resources of the net work in best way and get higher efficiency of information management.
基金Sponsored by the National Natural Science Foundation of China(Grant No.60673191and90304011)Science Innovation Term Foundation of Guang-dong University of Foreign Studies(Grant No.GW2006-AT-005)Science Innovation Term Foundation of School of Informatics Guangdong University of Foreign Studies.
文摘With the digital information and application requirement on the Internet increasing fleetly nowadays,it is urgent to work out a network storage system with a large capacity,a high availability and scalability.To solve the above-mentioned issues,a NAS-based storage network(for short NASSN)has been designed.Firstly,the NASSN integrates multi-NAS,iNAS(an iSCSI-based NAS)and enterprise SAN with the help of storage virtualization,which can provide a greater capacity and better scalability.Secondly,the NASSN can provide high availability with the help of server and storage subsystem redundancy technologies.Thirdly,the NASSN simultaneously serves for both the file I/O and the block I/O with the help of an iSCSI module,which has the advantages of NAS and SAN.Finally,the NASSN can provide higher I/O speed by a high network-attached channel which implements the direct data transfer between the storage device and client.In the experiments,the NASSN has ultra-high-throughput for both of the file I/O requests and the block I/O requests.
基金National Science Foundation of China (No60474031)NCET(No04-0383)
文摘By modifying the IEEE 802.11 wireless local area network(WLAN) medium access protocol(MAC),a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of frame in real time applications.Both protocols can ensure the real time frame only need to wait a determinable bounded time.These two protocols are introduced briefly and a performance comparison between them is made.Simulation results show that each protocol has advantage over the others in certain network condition.
文摘WLAN mdoor location method based on artificial neural network (ANN) is analyzed. A three layer feed-forward ANN model offers the benefits of reducing time cost of the layout of an indoor location system, saving storage cost of the radio map establishment and enhancing real-time capacity in the on-line phase. According to the analysis of SNR distributions of recorded beacon signal samples and discussion about the multi-mode phenomenon, the one map method is proposed for the purpose of simplifying ANN input values and increasing location performances. Based on the simulations and comparison analysis with other two typical indoor location methods, K-nearest neighbor (KNN) and probability, the feasibility and effectiveness of ANN-based indoor location method are verified with average location error of 2.37m and location accuracy of 78.6% in 3m.
文摘The thesis describes an advanced digital solution to mining digital image monitor system, which makes up the shortage of the traditional mining analog image monitor. It illustrates the system components and how to choose the encoder bandwidth of the system. The problem of image multicast and its solution in LAN are also discussed.