首页 > 最新文献

J. Networks最新文献

英文 中文
Methods for Improving the Rate of Secret Key Generation based on Wireless Channel Characteristics 基于无线信道特性提高密钥生成速率的方法
Pub Date : 2016-02-28 DOI: 10.4304/jnw.11.2.46-55
Qiuhua Wang, Xiaojun Wang, Q. Lv, J. Bao
Due to non-ideal conditions in the measurements of the wireless channel, high initial bit error rate (BER) in the preliminary key is resulted, which reduces the final secret key generation rate and even causes the secret key generation process fail. Aiming to resolve this problem, we first present and verify an optimal information reconciliation protocol; the validation experiment shows that not only the BER comes down more quickly, but also a higher information rate is achieved. Then, to address the problem of very high initial BER and further improve the efficiency of the secret key generation, we introduce the idea of pre-distillation into the secret key generation system, and present a pre-distillation method, which makes the initial BER comes down quickly, and ensures the subsequent information reconciliation be easily performed; hence the total key generation rate is improved. Experimental results demonstrate that the pre-distillation method has excellent ability of reducing the initial BER, especially in the case of very high initial BER. The combination of our proposed pre-distillation and our optimal information reconciliation is the most efficient one when the initial BER is larger than 0.15, and the information rate is improved by more than forty-nine times when the initial BER is 0.3
由于无线信道的测量条件不理想,导致初始密钥的初始误码率过高,从而降低了最终密钥的生成速率,甚至导致密钥生成过程失败。为了解决这一问题,我们首先提出并验证了一种最优信息协调协议;验证实验表明,该方法不仅降低了误码率,而且获得了较高的信息率。然后,为了解决初始误码率过高的问题,进一步提高密钥生成的效率,我们在密钥生成系统中引入了预蒸馏的思想,提出了一种预蒸馏的方法,使初始误码率迅速下降,并保证了后续信息协调的容易进行;因此,总密钥生成率得到了提高。实验结果表明,预精馏方法具有很好的降低初始误码率的能力,特别是在初始误码率很高的情况下。当初始BER大于0.15时,我们提出的预蒸馏与最优信息调和的组合是最有效的,当初始BER为0.3时,信息率提高了49倍以上
{"title":"Methods for Improving the Rate of Secret Key Generation based on Wireless Channel Characteristics","authors":"Qiuhua Wang, Xiaojun Wang, Q. Lv, J. Bao","doi":"10.4304/jnw.11.2.46-55","DOIUrl":"https://doi.org/10.4304/jnw.11.2.46-55","url":null,"abstract":"Due to non-ideal conditions in the measurements of the wireless channel, high initial bit error rate (BER) in the preliminary key is resulted, which reduces the final secret key generation rate and even causes the secret key generation process fail. Aiming to resolve this problem, we first present and verify an optimal information reconciliation protocol; the validation experiment shows that not only the BER comes down more quickly, but also a higher information rate is achieved. Then, to address the problem of very high initial BER and further improve the efficiency of the secret key generation, we introduce the idea of pre-distillation into the secret key generation system, and present a pre-distillation method, which makes the initial BER comes down quickly, and ensures the subsequent information reconciliation be easily performed; hence the total key generation rate is improved. Experimental results demonstrate that the pre-distillation method has excellent ability of reducing the initial BER, especially in the case of very high initial BER. The combination of our proposed pre-distillation and our optimal information reconciliation is the most efficient one when the initial BER is larger than 0.15, and the information rate is improved by more than forty-nine times when the initial BER is 0.3","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"1 1","pages":"46-55"},"PeriodicalIF":0.0,"publicationDate":"2016-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78440898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing Dynamic TXOP for QoS Support of Video Transmission in IEEE 802.11e WLANs 为IEEE 802.11e无线局域网视频传输提供动态TXOP支持
Pub Date : 2016-02-11 DOI: 10.4304/jnw.10.9.501-511
Mohammed A. Al-Maqri, M. Othman, B. Ali, Z. Hanapi
The IEEE 802.11e standard introduced by IEEE 802.11 Task Group E (TGe) enhances the Quality of Service (QoS) by means of HCF Controlled Channel Access (HCCA). The scheduler of HCCA allocates Transmission Opportunitys (TXOPs) to QoS-enabled Station (QSTA) based on their TS Specifications (TSPECs) negotiated at the traffic setup time so that it is only efficient for Constant Bit Rate (CBR) applications. However, Variable Bit Rate (VBR) traffics are not efficiently supported as they exhibit non-deterministic profile during the time. In this paper, we present a dynamic TXOP assignment Scheduling Algorithm for supporting the video traffics transmission over IEEE 802.11e wireless networks. This algorithm uses a piggybacked information about the size of the subsequent video frames of the uplink traffic to assist the Hybrid Coordinator accurately assign the TXOP according to the fast changes in the VBR profile. The proposed scheduling algorithm has been evaluated using simulation with different variability level video streams. The simulation results show that the proposed algorithm reduces the delay experienced by VBR traffic streams comparable to HCCA scheduler due to the accurate assignment of the TXOP which preserve the channel time for data transmission.
IEEE 802.11任务组E (TGe)引入的IEEE 802.11 E标准通过HCF控制通道接入(HCCA)来提高服务质量(QoS)。HCCA的调度程序根据在流量建立时协商的TS规范(tspec)将传输机会(TXOPs)分配给启用qos的站点(QSTA),因此它只对恒定比特率(CBR)应用有效。然而,由于可变比特率(VBR)流量在时间期间表现出不确定性,因此不能有效地支持它们。本文提出了一种支持IEEE 802.11e无线网络视频业务传输的动态TXOP分配调度算法。该算法通过承载上行流量后续视频帧的大小信息,帮助混合协调器根据VBR配置文件的快速变化准确分配TXOP。通过对不同可变性视频流的仿真,对所提出的调度算法进行了评价。仿真结果表明,该算法通过准确分配TXOP,保留了数据传输的信道时间,减少了VBR业务流的延迟,与HCCA调度方法相当。
{"title":"Providing Dynamic TXOP for QoS Support of Video Transmission in IEEE 802.11e WLANs","authors":"Mohammed A. Al-Maqri, M. Othman, B. Ali, Z. Hanapi","doi":"10.4304/jnw.10.9.501-511","DOIUrl":"https://doi.org/10.4304/jnw.10.9.501-511","url":null,"abstract":"The IEEE 802.11e standard introduced by IEEE 802.11 Task Group E (TGe) enhances the Quality of Service (QoS) by means of HCF Controlled Channel Access (HCCA). The scheduler of HCCA allocates Transmission Opportunitys (TXOPs) to QoS-enabled Station (QSTA) based on their TS Specifications (TSPECs) negotiated at the traffic setup time so that it is only efficient for Constant Bit Rate (CBR) applications. However, Variable Bit Rate (VBR) traffics are not efficiently supported as they exhibit non-deterministic profile during the time. In this paper, we present a dynamic TXOP assignment Scheduling Algorithm for supporting the video traffics transmission over IEEE 802.11e wireless networks. This algorithm uses a piggybacked information about the size of the subsequent video frames of the uplink traffic to assist the Hybrid Coordinator accurately assign the TXOP according to the fast changes in the VBR profile. The proposed scheduling algorithm has been evaluated using simulation with different variability level video streams. The simulation results show that the proposed algorithm reduces the delay experienced by VBR traffic streams comparable to HCCA scheduler due to the accurate assignment of the TXOP which preserve the channel time for data transmission.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"1 1","pages":"501-511"},"PeriodicalIF":0.0,"publicationDate":"2016-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89121562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Data Collection in Interference-Aware Wireless Sensor Networks 干扰感知无线传感器网络中的高效数据采集
Pub Date : 2016-01-28 DOI: 10.4304/jnw.10.12.658-667
Min Kyung An, Hyuk Cho
In this paper, we study the Minimum Latency Collection Scheduling (MLCS) problem in Wireless Sensor Networks (WSNs) adopting the two interference models: the graph model and the more realistic physical interference model known as Signal-to-Interference-Noise-Ratio (SINR). The main issue of the MLCS problem is to compute the minimum latency schedule, that is, to compute a schedule with the minimum number of timeslots, such that all data from all nodes can be collected to a sink node without any collision or interference. First, we describe an approximation algorithm with O(1)-approximation ratio that works in both the interference models by yielding a schedule whose latency is bounded by O(n), where n is the number of nodes in the network. Then, we validate the latency performance of the proposed algorithm with various simulated networks, demonstrate the robustness of the algorithms with different network parameters, and discuss the effect of the interference models’ parameter values on the latency
本文研究了无线传感器网络(WSNs)中的最小延迟采集调度(MLCS)问题,采用两种干扰模型:图模型和更现实的物理干扰模型,即信噪比(SINR)。MLCS问题的主要问题是计算最小延迟调度,即计算一个具有最小时隙数的调度,使所有节点的所有数据都能收集到一个汇聚节点,而不发生碰撞或干扰。首先,我们描述了一种具有O(1)-近似比的近似算法,该算法通过产生一个延迟以O(n)为界的调度来在两种干扰模型中工作,其中n是网络中的节点数。然后,我们用各种模拟网络验证了所提出算法的延迟性能,证明了算法在不同网络参数下的鲁棒性,并讨论了干扰模型参数值对延迟的影响
{"title":"Efficient Data Collection in Interference-Aware Wireless Sensor Networks","authors":"Min Kyung An, Hyuk Cho","doi":"10.4304/jnw.10.12.658-667","DOIUrl":"https://doi.org/10.4304/jnw.10.12.658-667","url":null,"abstract":"In this paper, we study the Minimum Latency Collection Scheduling (MLCS) problem in Wireless Sensor Networks (WSNs) adopting the two interference models: the graph model and the more realistic physical interference model known as Signal-to-Interference-Noise-Ratio (SINR). The main issue of the MLCS problem is to compute the minimum latency schedule, that is, to compute a schedule with the minimum number of timeslots, such that all data from all nodes can be collected to a sink node without any collision or interference. First, we describe an approximation algorithm with O(1)-approximation ratio that works in both the interference models by yielding a schedule whose latency is bounded by O(n), where n is the number of nodes in the network. Then, we validate the latency performance of the proposed algorithm with various simulated networks, demonstrate the robustness of the algorithms with different network parameters, and discuss the effect of the interference models’ parameter values on the latency","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"38 5","pages":"658-667"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72600145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cognitive Network Factors as an Impact on Mobile Device Usability 认知网络因素对移动设备可用性的影响
Pub Date : 2016-01-28 DOI: 10.4304/jnw.10.11.579-586
C. Sonnenberg, J. Sonnenberg
Two seemingly unrelated trends are converging to redefine how mobile device networks are used, particularly in the emergency services and military fields where the need for instant response and anticipation of required data can affect the outcome of the participant’s survival. The first trend is the increasing ability of sophisticated mobile devices to adapt and alter their functionality in response to sensed external events, including the use of a specific device by a combatant or emergency services provider. The second trend is the continued expansion of radio capabilities as communications devices become physically smaller, yet continue to increase in computation and communications power.Yet these capabilities are constrained by the crowded spectrum environment and require more intelligent usage analysis than exists in current radio networks. In truth, both of these trends are the result of the underlying continued improvement of integrated circuits, conventionally known as Moore’s Law. However, this paper introduces how two technical disciplines (mobile device usability modeling and cognitive radio networking) can combine to provide an entirely new paradigm of mobile communications usage.
两种看似不相关的趋势正在融合在一起,重新定义移动设备网络的使用方式,特别是在紧急服务和军事领域,在这些领域,对即时反应和预期所需数据的需求可能影响参与者的生存结果。第一个趋势是,复杂的移动设备越来越有能力适应和改变其功能,以响应感知到的外部事件,包括战斗人员或紧急服务提供者使用特定设备。第二个趋势是无线电功能的持续扩展,因为通信设备在物理上变得更小,但计算和通信能力继续增加。然而,这些能力受到拥挤的频谱环境的限制,并且需要比当前无线网络更智能的使用分析。事实上,这两种趋势都是集成电路潜在的持续改进的结果,通常被称为摩尔定律。然而,本文介绍了两个技术学科(移动设备可用性建模和认知无线电网络)如何结合起来提供一个全新的移动通信使用范例。
{"title":"Cognitive Network Factors as an Impact on Mobile Device Usability","authors":"C. Sonnenberg, J. Sonnenberg","doi":"10.4304/jnw.10.11.579-586","DOIUrl":"https://doi.org/10.4304/jnw.10.11.579-586","url":null,"abstract":"Two seemingly unrelated trends are converging to redefine how mobile device networks are used, particularly in the emergency services and military fields where the need for instant response and anticipation of required data can affect the outcome of the participant’s survival. The first trend is the increasing ability of sophisticated mobile devices to adapt and alter their functionality in response to sensed external events, including the use of a specific device by a combatant or emergency services provider. The second trend is the continued expansion of radio capabilities as communications devices become physically smaller, yet continue to increase in computation and communications power.Yet these capabilities are constrained by the crowded spectrum environment and require more intelligent usage analysis than exists in current radio networks. In truth, both of these trends are the result of the underlying continued improvement of integrated circuits, conventionally known as Moore’s Law. However, this paper introduces how two technical disciplines (mobile device usability modeling and cognitive radio networking) can combine to provide an entirely new paradigm of mobile communications usage.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"27 1","pages":"579-586"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85081469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Selection in Heterogeneous Wireless System Environments 异构无线系统环境中的网络选择
Pub Date : 2016-01-28 DOI: 10.4304/jnw.10.12.633-641
A. Gharsallah, N. Omheni, F. Zarai, M. Obaidat, K. Hsiao
The next generation wireless systems will consist of heterogeneous networks from cellular, WirelessLocal Area Networks (WLANs), Worldwide Interoperability for Microwave Access (WiMAX) to other emerging access technologies and have the capability to offer various services at any time as per user requirements, anywhere with seamless interoperability. The integration of heterogeneous wireless networks poses several challenges. One of the major challenges is vertical handoff. Handoff is the process of transferring an ongoing call or data session from one access point to another in a homogeneous or heterogeneous network. Vertical handoff occurs when a mobile terminal decides to switch between networks of diverse technologies. A key issue during vertical handoff is the selection of an optimal network that maximizes end users satisfaction. This article presents a novel approach for handover decision making in the context of heterogeneous wireless network. The aim of the proposed scheme is the selection of the most suitable radio access network for each application. The performance analysis shows that the proposed approach efficiently uses the network resources by switching between LTE and WLAN to offer best connectivity to the users.It is observed that resource utilization ratio increases to (99%) and the integration of LTE with WLAN using the proposed algorithm reduces the call dropping probability (less than 0.15 for Voice over IP service when switching to LTE network) and call blocking probability (less than 0.24)
下一代无线系统将由蜂窝、无线局域网(wlan)、微波接入全球互操作性(WiMAX)等异构网络和其他新兴接入技术组成,并具有随时随地根据用户需求提供各种服务的能力,具有无缝互操作性。异构无线网络的集成提出了几个挑战。其中一个主要的挑战是垂直交接。切换是将正在进行的呼叫或数据会话从同构或异构网络中的一个接入点转移到另一个接入点的过程。当移动终端决定在不同技术的网络之间切换时,就会发生垂直切换。垂直切换过程中的一个关键问题是选择一个最优的网络,使最终用户满意度最大化。本文提出了一种新的异构无线网络切换决策方法。所提方案的目的是为每种应用选择最合适的无线接入网。性能分析表明,该方法通过在LTE和WLAN之间的切换,有效地利用了网络资源,为用户提供了最佳的连通性。观察到,资源利用率提高到(99%),并且使用所提出的算法将LTE与WLAN集成降低了呼叫丢失概率(切换到LTE网络时,Voice over IP业务小于0.15)和呼叫阻塞概率(小于0.24)。
{"title":"Network Selection in Heterogeneous Wireless System Environments","authors":"A. Gharsallah, N. Omheni, F. Zarai, M. Obaidat, K. Hsiao","doi":"10.4304/jnw.10.12.633-641","DOIUrl":"https://doi.org/10.4304/jnw.10.12.633-641","url":null,"abstract":"The next generation wireless systems will consist of heterogeneous networks from cellular, WirelessLocal Area Networks (WLANs), Worldwide Interoperability for Microwave Access (WiMAX) to other emerging access technologies and have the capability to offer various services at any time as per user requirements, anywhere with seamless interoperability. The integration of heterogeneous wireless networks poses several challenges. One of the major challenges is vertical handoff. Handoff is the process of transferring an ongoing call or data session from one access point to another in a homogeneous or heterogeneous network. Vertical handoff occurs when a mobile terminal decides to switch between networks of diverse technologies. A key issue during vertical handoff is the selection of an optimal network that maximizes end users satisfaction. This article presents a novel approach for handover decision making in the context of heterogeneous wireless network. The aim of the proposed scheme is the selection of the most suitable radio access network for each application. The performance analysis shows that the proposed approach efficiently uses the network resources by switching between LTE and WLAN to offer best connectivity to the users.It is observed that resource utilization ratio increases to (99%) and the integration of LTE with WLAN using the proposed algorithm reduces the call dropping probability (less than 0.15 for Voice over IP service when switching to LTE network) and call blocking probability (less than 0.24)","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"51 1","pages":"633-641"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72806530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Functional Analysis of EAP-CRA EAP-CRA的功能分析
Pub Date : 2016-01-28 DOI: 10.4304/jnw.11.01.28-38
K. Ramezani, E. Sithirasenan, Kaile Su
Wireless communications have made today’s busy world even busier. The use of hand held devices such as iPads, tablets, notebooks etc. is increasing exponentially. The wireless nature of these devices makes them flexible and opportune. However, wireless devices encounter numerous security problems compared to their wired counterpart. The lack of physical connectivity (anchor-attachment) from the wireless device to the wired network makes the wireless devices more vulnerable and hard to protect against security threats. In this view we have proposed EAP-CRA protocol to counter the security threats during the security association between a wireless device and the wired network. Our protocol leverages the advantages of Public Key Infrastructure to provide a secure connectivity to the network in a multi agent environment. As with many security protocols, in the early stages, formal verification plays a vital role, particularly when the process of implementing the protocol is time consuming. We have used Symbolic Analysis Laboratory tools to formally verify the functionality of the EAP-CRA protocol. In this paper we present a number of Linear Temporal Logic formulas that we have established to prove the integrity of our proposal. By examining all possible execution traces of the proposed protocol we have proved that our protocol is complete and consistent.
无线通信使当今繁忙的世界更加繁忙。诸如ipad、平板电脑、笔记本等手持设备的使用呈指数增长。这些设备的无线特性使它们变得灵活和合适。然而,与有线设备相比,无线设备遇到了许多安全问题。无线设备与有线网络之间缺乏物理连接(锚接),使得无线设备更容易受到攻击,难以抵御安全威胁。在此基础上,我们提出了EAP-CRA协议,以应对无线设备与有线网络安全关联过程中的安全威胁。我们的协议利用了公钥基础设施的优势,在多代理环境中提供了与网络的安全连接。与许多安全协议一样,在早期阶段,正式验证起着至关重要的作用,特别是当实现协议的过程非常耗时时。我们使用符号分析实验室工具正式验证了EAP-CRA协议的功能。在本文中,我们提出了一些我们已经建立的线性时间逻辑公式来证明我们的建议的完整性。通过检查提议协议的所有可能的执行痕迹,我们证明了我们的协议是完整和一致的。
{"title":"Functional Analysis of EAP-CRA","authors":"K. Ramezani, E. Sithirasenan, Kaile Su","doi":"10.4304/jnw.11.01.28-38","DOIUrl":"https://doi.org/10.4304/jnw.11.01.28-38","url":null,"abstract":"Wireless communications have made today’s busy world even busier. The use of hand held devices such as iPads, tablets, notebooks etc. is increasing exponentially. The wireless nature of these devices makes them flexible and opportune. However, wireless devices encounter numerous security problems compared to their wired counterpart. The lack of physical connectivity (anchor-attachment) from the wireless device to the wired network makes the wireless devices more vulnerable and hard to protect against security threats. In this view we have proposed EAP-CRA protocol to counter the security threats during the security association between a wireless device and the wired network. Our protocol leverages the advantages of Public Key Infrastructure to provide a secure connectivity to the network in a multi agent environment. As with many security protocols, in the early stages, formal verification plays a vital role, particularly when the process of implementing the protocol is time consuming. We have used Symbolic Analysis Laboratory tools to formally verify the functionality of the EAP-CRA protocol. In this paper we present a number of Linear Temporal Logic formulas that we have established to prove the integrity of our proposal. By examining all possible execution traces of the proposed protocol we have proved that our protocol is complete and consistent.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"10 1","pages":"28-38"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82894865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Edge Capacity Routing in Complex Networks 复杂网络中的混合边缘容量路由
Pub Date : 2016-01-28 DOI: 10.4304/jnw.11.01.11-15
P. Ranjana, A. George
The main focus on the algorithmic theory is the network optimization. The goal of network optimization is to connect vertices of the network in an inexpensive manner. In this work we present an efficient algorithm to achieve the effective optimization for an undirected large scale graph. This work is a connectivity data structure that focuses on us to know the connectivity parameters of the existing networks and proposing algorithms to make is efficient to access the information on the network. The network is made efficient by considering the network as a graph with edge weight and edge capacity. The network thus formed makes use of the dynamic programming approach and then the routing optimization is achieved using the Hierarchical edge capacity routing algorithm (HECR). By using HECR algorithm, routing is achieved at two different levels of nodes. The proposed algorithm also addressed the load balancing in the network. It is fast for large number of nodes with 3% of less time and the route found converges to optimal
算法理论的主要重点是网络优化。网络优化的目标是以一种廉价的方式连接网络的顶点。本文提出了一种有效的算法来实现无向大尺度图的有效优化。这项工作是一个连通性数据结构,重点是我们知道现有网络的连通性参数,并提出算法,使网络上的信息是有效的访问。将网络视为具有边权和边容量的图,从而提高了网络的效率。该网络采用动态规划方法,并采用分层边缘容量路由算法(HECR)实现路由优化。通过使用HECR算法,在两个不同层次的节点上实现路由。该算法还解决了网络中的负载均衡问题。该算法在节点数量大的情况下速度快,所需时间减少3%,并收敛到最优
{"title":"Hybrid Edge Capacity Routing in Complex Networks","authors":"P. Ranjana, A. George","doi":"10.4304/jnw.11.01.11-15","DOIUrl":"https://doi.org/10.4304/jnw.11.01.11-15","url":null,"abstract":"The main focus on the algorithmic theory is the network optimization. The goal of network optimization is to connect vertices of the network in an inexpensive manner. In this work we present an efficient algorithm to achieve the effective optimization for an undirected large scale graph. This work is a connectivity data structure that focuses on us to know the connectivity parameters of the existing networks and proposing algorithms to make is efficient to access the information on the network. The network is made efficient by considering the network as a graph with edge weight and edge capacity. The network thus formed makes use of the dynamic programming approach and then the routing optimization is achieved using the Hierarchical edge capacity routing algorithm (HECR). By using HECR algorithm, routing is achieved at two different levels of nodes. The proposed algorithm also addressed the load balancing in the network. It is fast for large number of nodes with 3% of less time and the route found converges to optimal","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"55 1","pages":"11-15"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88722829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach for Performance Analysis of Multi-Rate Relay Networks 一种多速率中继网络性能分析的新方法
Pub Date : 2016-01-28 DOI: 10.4304/jnw.10.12.627-632
B. Alkandari, K. Pahlavan
In a multi-rate data WLAN, the data rate is a function of the distance from the access point (AP). To extend the coverage of the AP to cover a target terminal outside the AP coverage area, relay nodes are deployed between the AP and the target terminal. Therefore, for a given relationship between the throughput and the distance, and a given distance between the access point and the target receiver, there is a minimum number of nodes that provides the maximum throughput to the target receiver. It is always desirable to optimize the deployment from various aspects. These aspects are application-dependent and they range from energy conservation in sensor networks to throughput and coverage maximization in data networks. This paper presents a novel approach to determine the optimal bounds for the Medium Access Control (MAC) throughput at the target receiver in a multi-hop multi-rate wireless data network. We use the principles of linear programming and a model for the physical layer (PHY) throughput-distance relationship to determine the optimal performance bounds for the MAC throughput of a target terminal as a function of distance from the AP and the number of hops. We determine the performance bounds for two scenarios. The first scenario assumes all network nodes are visible to each other. The second scenario assumes each node is only visible to it neighbors. Additionally, we determine the physical locations for the relays to reach the optimal MAC throughput for a target terminal located at a specific distance from the AP
在多速率数据WLAN中,数据速率是与接入点(AP)距离的函数。为了将AP的覆盖范围扩展到AP覆盖区域外的目标终端,需要在AP和目标终端之间部署中继节点。因此,对于吞吐量与距离之间的给定关系,以及接入点与目标接收器之间的给定距离,存在向目标接收器提供最大吞吐量的最小节点数。从各个方面对部署进行优化总是可取的。这些方面依赖于应用,它们的范围从传感器网络的节能到数据网络的吞吐量和覆盖最大化。提出了一种确定多跳多速率无线数据网络中目标接收端介质访问控制(MAC)吞吐量最优边界的新方法。我们使用线性规划原理和物理层(PHY)吞吐量-距离关系模型来确定目标终端的MAC吞吐量的最佳性能界限,作为与AP的距离和跳数的函数。我们确定了两种场景的性能界限。第一个场景假设所有网络节点彼此可见。第二个场景假设每个节点只对它的邻居可见。此外,我们确定了中继的物理位置,以达到距离AP特定距离的目标终端的最佳MAC吞吐量
{"title":"A Novel Approach for Performance Analysis of Multi-Rate Relay Networks","authors":"B. Alkandari, K. Pahlavan","doi":"10.4304/jnw.10.12.627-632","DOIUrl":"https://doi.org/10.4304/jnw.10.12.627-632","url":null,"abstract":"In a multi-rate data WLAN, the data rate is a function of the distance from the access point (AP). To extend the coverage of the AP to cover a target terminal outside the AP coverage area, relay nodes are deployed between the AP and the target terminal. Therefore, for a given relationship between the throughput and the distance, and a given distance between the access point and the target receiver, there is a minimum number of nodes that provides the maximum throughput to the target receiver. It is always desirable to optimize the deployment from various aspects. These aspects are application-dependent and they range from energy conservation in sensor networks to throughput and coverage maximization in data networks. This paper presents a novel approach to determine the optimal bounds for the Medium Access Control (MAC) throughput at the target receiver in a multi-hop multi-rate wireless data network. We use the principles of linear programming and a model for the physical layer (PHY) throughput-distance relationship to determine the optimal performance bounds for the MAC throughput of a target terminal as a function of distance from the AP and the number of hops. We determine the performance bounds for two scenarios. The first scenario assumes all network nodes are visible to each other. The second scenario assumes each node is only visible to it neighbors. Additionally, we determine the physical locations for the relays to reach the optimal MAC throughput for a target terminal located at a specific distance from the AP","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"27 1","pages":"627-632"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86976158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks 机会网络中信息传递的固定和移动基础设施集成
Pub Date : 2016-01-28 DOI: 10.4304/jnw.10.12.642-657
S. K. Dhurandher, D. Sharma, Sahil Gupta, I. Woungang, M. Obaidat
In an Opportunistic networks (OppNets), an established end-to-end connected route between the source anddestination nodes may never exist, making the routing of messages achallenge. However, using some infrastructures, it is possible to create an OppNet architecture similar to that of a well-connected network. This paper focuses on combining the benefits of infostation and message ferry to design a novelrouting schemecalled Horizontal and Vertical ferry (HVF), which also includes an acknowledgment method for message delivery that has not been considered in any of the existing approaches that uses infostation or message ferry. Through simulations, the performance of the proposed HVF scheme is evaluated and compared against that ofthe Global Ferry scheme (GFS), chosen as benchmark,in terms of number of messages delivered, overhead ratio, average latency, and average buffer time, showing that HVFoutperforms the GFS in both the normaland ferry failure scenarios
在机会网络(OppNets)中,源节点和目的节点之间可能不存在已建立的端到端连接路由,这给消息的路由带来了挑战。然而,使用一些基础设施,可以创建类似于连接良好的网络的OppNet体系结构。本文着重结合信息站和消息轮转的优点,设计了一种新的路由方案,称为水平和垂直轮转(HVF),其中还包括一种消息传递的确认方法,这在任何使用信息站或消息轮转的现有方法中都没有考虑到。通过仿真,对所提出的HVF方案的性能进行了评估,并与以GFS为基准的Global Ferry scheme (GFS)进行了比较,在发送的消息数量、开销比、平均延迟和平均缓冲时间方面,表明HVF方案在正常和渡轮故障场景下都优于GFS方案
{"title":"Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks","authors":"S. K. Dhurandher, D. Sharma, Sahil Gupta, I. Woungang, M. Obaidat","doi":"10.4304/jnw.10.12.642-657","DOIUrl":"https://doi.org/10.4304/jnw.10.12.642-657","url":null,"abstract":"In an Opportunistic networks (OppNets), an established end-to-end connected route between the source anddestination nodes may never exist, making the routing of messages achallenge. However, using some infrastructures, it is possible to create an OppNet architecture similar to that of a well-connected network. This paper focuses on combining the benefits of infostation and message ferry to design a novelrouting schemecalled Horizontal and Vertical ferry (HVF), which also includes an acknowledgment method for message delivery that has not been considered in any of the existing approaches that uses infostation or message ferry. Through simulations, the performance of the proposed HVF scheme is evaluated and compared against that ofthe Global Ferry scheme (GFS), chosen as benchmark,in terms of number of messages delivered, overhead ratio, average latency, and average buffer time, showing that HVFoutperforms the GFS in both the normaland ferry failure scenarios","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"199 1","pages":"642-657"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82811785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Development of Hybrid Time Synchronization Scheme to Mitigate the Phase and Frequency error for Asynchronous Link in Heterogeneous Network 缓解异构网络中异步链路相位和频率误差的混合时间同步方案的设计与开发
Pub Date : 2016-01-28 DOI: 10.4304/jnw.10.11.597-605
M. Hasan, A. F. Ismail, A. Hashim, S. Islam, W. Hashim
The arbitrary deployment of HeNodeBs high-lights the importance of interference minimization in order to capture the best. Timing as well as synchronization are equally essential for control of HeNodeBs in 4G LTE devices. So as to sustain HeNodeBs for management, IEEE1588 master slave strategies are being used in order to maintain HeNodeBs for the control purpose. Nonetheless, as a result of poor internet connectivity for a long period HeNodeBs undergoes synchronization problems that leads to clock offset problem. Asymmetric link delays, due to phase and frequency misalignment causes the effects on interference and system QoS. Moreover, to mitigate interference and for QoS synchronization is prerequisite for heterogeneous network. This paper inspects the pros and cons of the IEEE 1588 algorithm and IEEE Precision Timing Protocol (PTP). Therefore, this paper proposed a hybrid phase and frequency synchronization scheme. Comparing to IEEE1588 and PTP, hybrid scheme can improve the clock Phase (offset), and frequency error in two-tier Heterogeneous Network. The proposed scheme is evaluated by Monte Carlo system level simulation, and the results are benchmarked with the existing techniques. The simulation outcome ensures that the hybrid time synchronization strategy is much better in Heterogeneous network with regards to phase (offset) and frequency errors
henodeb的任意部署突出了为了获得最佳效果而最小化干扰的重要性。定时和同步对于控制4G LTE设备中的henodeb同样重要。为了维持henodeb进行管理,使用IEEE1588主从策略来维持henodeb进行控制。尽管如此,由于长时间的互联网连接不佳,HeNodeBs经历了同步问题,导致时钟偏移问题。由于相位和频率不对等导致的非对称链路延迟会对干扰和系统QoS造成影响。此外,消除干扰和实现QoS同步是异构网络的先决条件。本文比较了IEEE 1588算法和IEEE精确定时协议(PTP)的优缺点。为此,本文提出了一种相频混合同步方案。与IEEE1588和PTP相比,混合方案可以改善两层异构网络中的时钟相位(偏移)和频率误差。通过蒙特卡罗系统级仿真对该方案进行了评价,并与现有技术进行了对比。仿真结果表明,混合时间同步策略在异构网络中具有较好的相位(偏移)和频率误差
{"title":"Design and Development of Hybrid Time Synchronization Scheme to Mitigate the Phase and Frequency error for Asynchronous Link in Heterogeneous Network","authors":"M. Hasan, A. F. Ismail, A. Hashim, S. Islam, W. Hashim","doi":"10.4304/jnw.10.11.597-605","DOIUrl":"https://doi.org/10.4304/jnw.10.11.597-605","url":null,"abstract":"The arbitrary deployment of HeNodeBs high-lights the importance of interference minimization in order to capture the best. Timing as well as synchronization are equally essential for control of HeNodeBs in 4G LTE devices. So as to sustain HeNodeBs for management, IEEE1588 master slave strategies are being used in order to maintain HeNodeBs for the control purpose. Nonetheless, as a result of poor internet connectivity for a long period HeNodeBs undergoes synchronization problems that leads to clock offset problem. Asymmetric link delays, due to phase and frequency misalignment causes the effects on interference and system QoS. Moreover, to mitigate interference and for QoS synchronization is prerequisite for heterogeneous network. This paper inspects the pros and cons of the IEEE 1588 algorithm and IEEE Precision Timing Protocol (PTP). Therefore, this paper proposed a hybrid phase and frequency synchronization scheme. Comparing to IEEE1588 and PTP, hybrid scheme can improve the clock Phase (offset), and frequency error in two-tier Heterogeneous Network. The proposed scheme is evaluated by Monte Carlo system level simulation, and the results are benchmarked with the existing techniques. The simulation outcome ensures that the hybrid time synchronization strategy is much better in Heterogeneous network with regards to phase (offset) and frequency errors","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"8 1","pages":"597-605"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87877105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
J. Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1