It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a signific...It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a significant issue for wireless communication networks with massive antennas and ultra-dense cell. This paper proposes a learning- based channel model, which can estimate, refine, and manage CSI for a synergetic transmission system. It decomposes the channel impulse response into multiple paths, and uses a learning-based algorithm to estimate paths' parameters without notable degradation caused by sparse pilots. Both indoor measurement and outdoor measurement are conducted to verify the feasibility of the proposed channel model preliminarily.展开更多
This paper presents an approximate expression to transmission capacity of ad hoc networks by using stochastic geometry. For there is no general close-form expression to the transmission capacity of ad hoc networks, by...This paper presents an approximate expression to transmission capacity of ad hoc networks by using stochastic geometry. For there is no general close-form expression to the transmission capacity of ad hoc networks, by using Taylor series, we obtain the exact series expression to transmission capacity first, then we take partial summation to yield an n-th order approximate expression. Further- more, compared with the exact expression under a special case, the accuracy of the n-th order ap- proximation has been studied. The numerical results show that the accuracy of the approximation is mainly determined by the order n, and a high accuracy can be obtained when the node density or the outage constraint is close to zero .展开更多
In this paper, we introduce a new combined priority and admission control mechanism applying in the VCN (Vehicular Communication Network) which is designed with an integration of the Vehicular Ad-hoc Networks (VAN...In this paper, we introduce a new combined priority and admission control mechanism applying in the VCN (Vehicular Communication Network) which is designed with an integration of the Vehicular Ad-hoc Networks (VANETs) based on standard IEEE 802.11 p and IEEE 802.11 s WMNs (Wireless Mesh Networks). Simulation experiments are intensively investigated to evaluate the novel combined priority and admission control mechanism to assure quality of the I2V (Infrastructure to Vehicle) emergency services occurred during the time video flows are being delivered between content servers and cars. The simulation results show effectiveness of proposed priority and admission control schemes in term of the minimized end-to-end delay as well as the increase of throughput and PDR (Packet Delivery Ratio) of the emergency data flow.展开更多
Network measurement is an important approach to understand network behaviors, which has been widely studied. Both Transfer Control Protocol (TCP) and Interact Control Messages Protocol (ICMP) are applied in networ...Network measurement is an important approach to understand network behaviors, which has been widely studied. Both Transfer Control Protocol (TCP) and Interact Control Messages Protocol (ICMP) are applied in network measurement, while investigating the differences between the measured results of these two protocols is an important topic that has been less investigated. In this paper, to compare the differences between TCP and ICMP when they are used in measuring host connectivity, RTT, and packet loss rate, two groups of comparison programs have been designed, and after careful evaluation of the program parameters, a lot of comparison experiments are executed on the Internet. The experimental results show that, there are significant differences between the host connectivity measured using TCP or ICMP; in general, the accuracy of connectivity measured using TCP is 20%- 30% higher than that measured using ICMP. The case of RTT and packet loss rate is complicated, which are related to path loads and destination host loads. While commonly, the RTF and packet loss rate" measured using TCP or ICMP are very close. According to the experimental results, some advices are also given on protocol selection for conducting accurate connectivity, RTF and packet loss rate measurements.展开更多
Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Shar...Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Sharing(CNVS) solution in Mobile Ad Hoc Networks(MANETs).By making use of crosslayer approaches to bridge the overlay and the MAC layer and with the help of dissemination assisted by one-hop neighbours,CNVS intelligently builds the resource-centric self-organization node cluster group.In order to meet the QoS requirement,by making use of video resources access cost model,each peer can disconnect a less efficient connection with the original supplier and choose a peer that provides a low access cost as the new supplier.Simulation results also show how CNVS achieves lower average end-to-end delay,less average number of hops for video data delivery,lower routing overhead and packet loss rate,and higher network throughput than another state-of-the-art solution.展开更多
The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference m...The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs.展开更多
WDM (wavelength division multiplexing) appears to be the solution of choice for providing a faster networking infrastructure that can meet the explosive growth of the Internet. It has the scalability problem with in...WDM (wavelength division multiplexing) appears to be the solution of choice for providing a faster networking infrastructure that can meet the explosive growth of the Internet. It has the scalability problem with increasing the access node numbers in WDM ring architecture, so we further propose the alternatives of hierarchical WDM ring architecture. Since the traditional IP provides the best effort service only, the issue of supporting IP packets with QoS (quality of Service) transfer has become a crucial issue for multimedia transmission. We do so by addressing the priority-aware QoS model. Finally present performance analysis multiple classes of hierarchical WDM ring networks.展开更多
A traffic sensitive spectrum access scheme is proposed to satisfy the traffic load requirement of secondary users (SUs). In the proposed design, SU only accesses available channels which can meet the traffic demand....A traffic sensitive spectrum access scheme is proposed to satisfy the traffic load requirement of secondary users (SUs). In the proposed design, SU only accesses available channels which can meet the traffic demand. To achieve this, the expected transmission time (E3W) of the SU is calcu- lated first based on the delivery ratio. Then, the channel idle time is estimated based on the activity of primary users (PUs). Therefore, available channels with estimated idle time longer than ETr could be chosen. With high probability, the SU can finish transmission on these channels without disruption, thereby satisfying the traffic load demand of the SU. Finally, our method is extended to the multi-channel scenario where each SU can access multiple channels simultaneously. Performance analysis shows that our method satisfies the requirement of SUs while effectively improving the throughput.展开更多
In this paper we propose a scheme for transferring quantum states and preparing quantum networks. Compared with the previous schemes, this scheme is more efficient, since three or four-dimensional quantum states can b...In this paper we propose a scheme for transferring quantum states and preparing quantum networks. Compared with the previous schemes, this scheme is more efficient, since three or four-dimensional quantum states can be transferred with a single step and information interchange of three-dimensional quantum states can be realized, which is a significant improvement. It is based on the resonant interaction of a three-mode cavity field with an atom. As a consequence, the interaction time is shortened greatly. Furthermore, we give some discussions about the feasibility of the scheme.展开更多
In order to overcome the adverse effects of Doppler wavelength shift on data transmission in the optical satellite networks,a dynamic routing and wavelength assignment algorithm based on crosslayer design( CL-DRWA) is...In order to overcome the adverse effects of Doppler wavelength shift on data transmission in the optical satellite networks,a dynamic routing and wavelength assignment algorithm based on crosslayer design( CL-DRWA) is introduced which can improve robustness of the network. Above all,a cross-layer optimization model is designed,which considers transmission delay and wavelength-continuity constraint,as well as Doppler wavelength shift. Then CL-DRWA is applied to solve this model,resulting in finding an optimal light path satisfying the above constraints for every connection request. In CL-DRWA,Bellman-Ford method is used to find an optimal route and a distributed relative capacity loss method is implemented to get an optimal wavelength assignment result on the optimal route. Moreover,compared with the dynamic routing and wavelength assignment algorithm based on minimum delay strategy( MD-DRWA),CL-DRWA can make an improvement of 5. 3% on the communication success probability. Meanwhile,CL-DRWA can meet the requirement of transmission delay for real-time services.展开更多
To evaluate transmission rate of highly dynamic space networks,a new method for studying space network capacity is proposed in this paper. Using graph theory,network capacity is defined as the maximum amount of flows ...To evaluate transmission rate of highly dynamic space networks,a new method for studying space network capacity is proposed in this paper. Using graph theory,network capacity is defined as the maximum amount of flows ground stations can receive per unit time. Combined with a hybrid constellation model,network capacity is calculated and further analyzed for practical cases. Simulation results show that network capacity will increase to different extents as link capacity,minimum ground elevation constraint and satellite onboard processing capability change. Considering the efficiency and reliability of communication networks,how to scientifically design satellite networks is also discussed.展开更多
Although perfect quantum network coding has been proved to be achievable, it is stiU puzzling whether it is feasible whenever one or more of the channels are replaced by the hidden ones emerging from quantum entanglem...Although perfect quantum network coding has been proved to be achievable, it is stiU puzzling whether it is feasible whenever one or more of the channels are replaced by the hidden ones emerging from quantum entanglement. The question is answered in this paper. First, we propose a quantum network coding protocol over a butterfly network with two hidden channels. Second, we investigate a more generaJ situation, where d-level quantum letters are transmitted through the network containing arbitrarily distributed hidden channels, and prove that quantum network coding on such networks is still achievable.展开更多
基金supported by National Basic Research Program of China (NO 2012CB316002)China’s 863 Project (NO 2014AA01A703)+2 种基金National Major Projec (NO. 2014ZX03003002-002)Program for New Century Excellent Talents in University (NCET-13-0321)Tsinghua University Initiative Scientific Research Program (2011THZ02-2)
文摘It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a significant issue for wireless communication networks with massive antennas and ultra-dense cell. This paper proposes a learning- based channel model, which can estimate, refine, and manage CSI for a synergetic transmission system. It decomposes the channel impulse response into multiple paths, and uses a learning-based algorithm to estimate paths' parameters without notable degradation caused by sparse pilots. Both indoor measurement and outdoor measurement are conducted to verify the feasibility of the proposed channel model preliminarily.
文摘This paper presents an approximate expression to transmission capacity of ad hoc networks by using stochastic geometry. For there is no general close-form expression to the transmission capacity of ad hoc networks, by using Taylor series, we obtain the exact series expression to transmission capacity first, then we take partial summation to yield an n-th order approximate expression. Further- more, compared with the exact expression under a special case, the accuracy of the n-th order ap- proximation has been studied. The numerical results show that the accuracy of the approximation is mainly determined by the order n, and a high accuracy can be obtained when the node density or the outage constraint is close to zero .
文摘In this paper, we introduce a new combined priority and admission control mechanism applying in the VCN (Vehicular Communication Network) which is designed with an integration of the Vehicular Ad-hoc Networks (VANETs) based on standard IEEE 802.11 p and IEEE 802.11 s WMNs (Wireless Mesh Networks). Simulation experiments are intensively investigated to evaluate the novel combined priority and admission control mechanism to assure quality of the I2V (Infrastructure to Vehicle) emergency services occurred during the time video flows are being delivered between content servers and cars. The simulation results show effectiveness of proposed priority and admission control schemes in term of the minimized end-to-end delay as well as the increase of throughput and PDR (Packet Delivery Ratio) of the emergency data flow.
基金This work was financially supported by National Natural Science Foundation of China under grant60273070and60403031,and theNational high-Technology (863) Programunder grant2005AA121560
文摘Network measurement is an important approach to understand network behaviors, which has been widely studied. Both Transfer Control Protocol (TCP) and Interact Control Messages Protocol (ICMP) are applied in network measurement, while investigating the differences between the measured results of these two protocols is an important topic that has been less investigated. In this paper, to compare the differences between TCP and ICMP when they are used in measuring host connectivity, RTT, and packet loss rate, two groups of comparison programs have been designed, and after careful evaluation of the program parameters, a lot of comparison experiments are executed on the Internet. The experimental results show that, there are significant differences between the host connectivity measured using TCP or ICMP; in general, the accuracy of connectivity measured using TCP is 20%- 30% higher than that measured using ICMP. The case of RTT and packet loss rate is complicated, which are related to path loads and destination host loads. While commonly, the RTF and packet loss rate" measured using TCP or ICMP are very close. According to the experimental results, some advices are also given on protocol selection for conducting accurate connectivity, RTF and packet loss rate measurements.
基金supported in part by the National High Technical Research and Development Program of China (863 Program) under Grant No. 2011AA010701the National KeyBasic Research Program of China (973 Program)under Grant No. 2013CB329102+4 种基金the National Natural Science Foundation of China under Grants No. 61001122,No. 61003283,No. 61232017the Natural Science Foundation of Jiangsu Province under Grant No. BK2011171the Natural Science Foundation of Jiangxi,China under Grant No. 20122BAB201042the Fundamental Research Funds for the Central Universities under Grant No. 2012RC0603the Science Foundation Ireland under Grant No. 10/CE/I1855 to Lero-the Irish Software Engineering Research Centre
文摘Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Sharing(CNVS) solution in Mobile Ad Hoc Networks(MANETs).By making use of crosslayer approaches to bridge the overlay and the MAC layer and with the help of dissemination assisted by one-hop neighbours,CNVS intelligently builds the resource-centric self-organization node cluster group.In order to meet the QoS requirement,by making use of video resources access cost model,each peer can disconnect a less efficient connection with the original supplier and choose a peer that provides a low access cost as the new supplier.Simulation results also show how CNVS achieves lower average end-to-end delay,less average number of hops for video data delivery,lower routing overhead and packet loss rate,and higher network throughput than another state-of-the-art solution.
基金This work is supported by the National Natural Science Foundation for Distinguished Young Scholar of China under Grant No. 61325006 and the National High-tech Research and Development Program of China under Grant No. 2014AA01A701.
文摘The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs.
文摘WDM (wavelength division multiplexing) appears to be the solution of choice for providing a faster networking infrastructure that can meet the explosive growth of the Internet. It has the scalability problem with increasing the access node numbers in WDM ring architecture, so we further propose the alternatives of hierarchical WDM ring architecture. Since the traditional IP provides the best effort service only, the issue of supporting IP packets with QoS (quality of Service) transfer has become a crucial issue for multimedia transmission. We do so by addressing the priority-aware QoS model. Finally present performance analysis multiple classes of hierarchical WDM ring networks.
基金Supported by the National High Technology Research and Development Programme of China(No.2011AA010503)the National Natural Science Foundation of China(No.60903192)
文摘A traffic sensitive spectrum access scheme is proposed to satisfy the traffic load requirement of secondary users (SUs). In the proposed design, SU only accesses available channels which can meet the traffic demand. To achieve this, the expected transmission time (E3W) of the SU is calcu- lated first based on the delivery ratio. Then, the channel idle time is estimated based on the activity of primary users (PUs). Therefore, available channels with estimated idle time longer than ETr could be chosen. With high probability, the SU can finish transmission on these channels without disruption, thereby satisfying the traffic load demand of the SU. Finally, our method is extended to the multi-channel scenario where each SU can access multiple channels simultaneously. Performance analysis shows that our method satisfies the requirement of SUs while effectively improving the throughput.
基金Supported by the National Natural Science Foundation of China under Grant No.10974028Fujian Provincial Natural Science Foundation of China under Grant No.2009J06002
文摘In this paper we propose a scheme for transferring quantum states and preparing quantum networks. Compared with the previous schemes, this scheme is more efficient, since three or four-dimensional quantum states can be transferred with a single step and information interchange of three-dimensional quantum states can be realized, which is a significant improvement. It is based on the resonant interaction of a three-mode cavity field with an atom. As a consequence, the interaction time is shortened greatly. Furthermore, we give some discussions about the feasibility of the scheme.
基金Supported by the National Natural Science Foundation of China(No.61675033,61575026,61675232,61571440)the National High Technology Research and Development Program of China(No.2015AA015504)
文摘In order to overcome the adverse effects of Doppler wavelength shift on data transmission in the optical satellite networks,a dynamic routing and wavelength assignment algorithm based on crosslayer design( CL-DRWA) is introduced which can improve robustness of the network. Above all,a cross-layer optimization model is designed,which considers transmission delay and wavelength-continuity constraint,as well as Doppler wavelength shift. Then CL-DRWA is applied to solve this model,resulting in finding an optimal light path satisfying the above constraints for every connection request. In CL-DRWA,Bellman-Ford method is used to find an optimal route and a distributed relative capacity loss method is implemented to get an optimal wavelength assignment result on the optimal route. Moreover,compared with the dynamic routing and wavelength assignment algorithm based on minimum delay strategy( MD-DRWA),CL-DRWA can make an improvement of 5. 3% on the communication success probability. Meanwhile,CL-DRWA can meet the requirement of transmission delay for real-time services.
基金Sponsored by the National Natural Science Foundation of China(Grant No.6137110061001093+6 种基金61401118)the Natural Science Foundation of Shandong Province(Grant No.ZR2014FP016)the Natural Scientific Research Innovation Foundation in Harbin Institute of Technology(Grant No.HIT.NSRIF.2011114HIT.NSRIF.2013136HIT.NSRIF.2016100)the Scientific Research Foundation of Harbin Institute of Technology at Weihai(Grant No.HIT(WH)201409HIT(WH)201410)
文摘To evaluate transmission rate of highly dynamic space networks,a new method for studying space network capacity is proposed in this paper. Using graph theory,network capacity is defined as the maximum amount of flows ground stations can receive per unit time. Combined with a hybrid constellation model,network capacity is calculated and further analyzed for practical cases. Simulation results show that network capacity will increase to different extents as link capacity,minimum ground elevation constraint and satellite onboard processing capability change. Considering the efficiency and reliability of communication networks,how to scientifically design satellite networks is also discussed.
基金Supported by the National Natural Science Foundation of China under Grant No.61300203
文摘Although perfect quantum network coding has been proved to be achievable, it is stiU puzzling whether it is feasible whenever one or more of the channels are replaced by the hidden ones emerging from quantum entanglement. The question is answered in this paper. First, we propose a quantum network coding protocol over a butterfly network with two hidden channels. Second, we investigate a more generaJ situation, where d-level quantum letters are transmitted through the network containing arbitrarily distributed hidden channels, and prove that quantum network coding on such networks is still achievable.