13 research outputs found
A MAC protocol for IP-based CDMA wireless networks.
Thesis (M.Sc.)-University of KwaZulu-Natal, Durban, 2005.The evolution of the intemet protocol (IP) to offer quality of service
(QoS) makes it a suitable core network protocol for next generation
networks (NGN). The QoS features incorporated to IP will enable future lP-based wireless networks to meet QoS requirements of various multimedia traffic. The Differentiated Service (Diffserv) Architecture is a promising QoS technology due to its scalability which arises from traffic flow aggregates. For this reason, in this dissertation a network infrastructure based on DiffServ is assumed. This architecture provides assured service (AS) and premium service (PrS) classes in addition to best-effort service (BE). The medium access control (MAC) protocol is one of the important design issues in wireless networks. In a wireless network carrying multimedia traffic, the MAC protocol is required to provide simultaneous support for a wide variety of traffic types, support traffic with delay and jitter bounds, and assign bandwidth in an efficient and fair manner among traffic classes. Several MAC protocols capable of supporting multimedia services have been proposed in the literature, the majority of which were designed for wireless A1M (Asynchronous Transfer Mode). The focus of this dissertation is on time division multiple access and code division multiple access (TDMAlCDMA)
based MAC protocols that support QoS in lP-based wireless networks. This dissertation begins by giving a survey of wireless MAC protocols. The survey considers MAC protocols for centralised wireless networks and classifies them according to their multiple access technology and as well as their method of resource sharing. A novel TDMAlCDMA based MAC protocol incorporating techniques from existing protocols is then proposed. To provide the above-mentioned services, the bandwidth is partitioned amongst AS and PrS classes. The BE class utilizes the remaining bandwidth from the two classes because it does not have QoS requirements. The protocol employs a demand assignment (DA) scheme to support traffic from PrS and AS classes. BE traffic is supported by a random reservation access scheme with dual multiple access interference (MAl) admission thresholds. The performance of the protocol, i.e. the AS or PrS call blocking probability, and BE throughput are evaluated
through Markov analytical models and Monte-Carlo simulations.
Furthermore, the protocol is modified and incorporated into IEEE 802.16 broadband wireless access (BWA) network
Recommended from our members
Knowledge search for new product development: a multi-agent based methodology
Manufacturers are the leaders in developing new products to drive productivity. Higher productivity means more products based on the same materials, energy, labour, and capitals. New product development plays a critical role in the success of manufacturing firms. Activities in the product development process are dependent on the knowledge of new product development team members. Increasingly, many enterprises consider effective knowledge search to be a source of competitive advantage.
This research presents an exploratory case study conducted at an aircraft manufacturer. This investigation uncovered six, empirically derived and theoretically informed, problems to enterprise knowledge search. They have been articulated as (i) the effectual web bandwidth limits search speed; (ii) less relevant search results based on word-frequency recognition models of search engine; (iii) un-useable techniques for enterprise search; (iv) rigour security, reliability, and company policy; (v) poor search performance about unstructured enterprise knowledge; (vi) the lack of tacit knowledge sharing. Existing search methodologies have focused on the internet search, rather than providing effective search for enterprise.
This research aim is developed to assist the manufacturing enterprise in meeting the industrial requirements in the following way: a methodology and system that can improve the information and knowledge search performance in new product development process. Based on the exploratory case findings, a knowledge search methodology and system has been developed. Agent technology is used to fulfil the requirements of enterprise search. Some initial tests were conducted to better understand implementation issues and future deployment of the methodology and system in practice
Security of Cyber-Physical Systems
Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems
Proceedings of the Conference on Production Systems and Logistics: CPSL 2022
[no abstract available
Succinct data structures for dynamics strings
A new simple algorithm for optimal embedding of complete binary trees into hypercubes as well as a node-by-node algorithm for embedding of nearly complete binary trees into hypercubes are presented