2,310 research outputs found
Synthesis and reactions of 1-hydroxy-9,9a-dihydro-1H-imidazo[1,2-a]indol-2(3H)-ones
In Session: Next Generation Networks: NXG-05: Switching and Routing-I: article no. NXG05-6A hybrid electronic/optical packet switch consists of electronically buffered line-cards interconnected by an optical switch fabric. It provides a scalable switch architecture for next generation high-speed routers. Due to the non-negligible switch reconfiguration overhead, many packet scheduling algorithms are invented to ensure performance guaranteed switching (i.e. 100% throughput with bounded packet delay), at the cost of speedup. In particular, minimum delay performance can be achieved if an algorithm can always find a schedule of no more than N configurations for any input traffic matrix, where N is the switch size. Various minimum delay scheduling algorithms (MIN, α i-SCALE and QLEF) are proposed. Among them, QLEF requires the lowest speedup bound. In this paper, we show that the existing speedup bound for QLEF is not tight enough. A new bound which is 10% lower than the existing one is derived. © 2006 IEEE.published_or_final_versionProceedings of the Global Telecommunications Conference, 2006 (GLOBECOM 2006), San Francisco, CA, USA, 27 November - 1 December 200
J-CAR: An efficient channel assignment and routing protocol for multi-channel multi-interface mobile ad hoc networks
In Session: Wireless Ad Hoc and Sensor Networks towards Anytime Anywhere Internetworking: WSN-15: Resource Allocation: article no. WSN15-2We propose an efficient joint channel assignment and routing protocol (J-CAR) for multi-channel multi-interface mobile ad hoc networks (MANETs). Aiming at overcoming the limitations of the existing channel assignment and routing algorithms, J-CAR negotiates a channel at each active link during the route setup process. It has the following major features: a) a pre-determined common control channel is used by every node for routing and channel negotiation; b) control packets for data transmission (RTS, CTS & ACK) are carried by the associated data channels; c) the spare capacity on the control channel can be used for data transmission; d) an interface is free to change its working modes between send and receive; and e) an interface can tune to any data channels for data sending or receiving at the cost of switching overhead. With J-CAR, a more flexible assignment of interfaces, channels, and the working mode of each interface can be rendered. The performance gain brought by J-CAR is substantiated by extensive simulation results. © 2006 IEEE.published_or_final_versionProceedings of the Global Telecommunications Conference, 2006 (GLOBECOM 2006), San Francisco, CA, USA, 27 November - 1 December 200
Energy-Efficient Resource Allocation in Wireless Networks: An Overview of Game-Theoretic Approaches
An overview of game-theoretic approaches to energy-efficient resource
allocation in wireless networks is presented. Focusing on multiple-access
networks, it is demonstrated that game theory can be used as an effective tool
to study resource allocation in wireless networks with quality-of-service (QoS)
constraints. A family of non-cooperative (distributed) games is presented in
which each user seeks to choose a strategy that maximizes its own utility while
satisfying its QoS requirements. The utility function considered here measures
the number of reliable bits that are transmitted per joule of energy consumed
and, hence, is particulary suitable for energy-constrained networks. The
actions available to each user in trying to maximize its own utility are at
least the choice of the transmit power and, depending on the situation, the
user may also be able to choose its transmission rate, modulation, packet size,
multiuser receiver, multi-antenna processing algorithm, or carrier allocation
strategy. The best-response strategy and Nash equilibrium for each game is
presented. Using this game-theoretic framework, the effects of power control,
rate control, modulation, temporal and spatial signal processing, carrier
allocation strategy and delay QoS constraints on energy efficiency and network
capacity are quantified.Comment: To appear in the IEEE Signal Processing Magazine: Special Issue on
Resource-Constrained Signal Processing, Communications and Networking, May
200
Asymptotic Mutual Information Statistics of Separately-Correlated Rician Fading MIMO Channels
Precise characterization of the mutual information of MIMO systems is
required to assess the throughput of wireless communication channels in the
presence of Rician fading and spatial correlation. Here, we present an
asymptotic approach allowing to approximate the distribution of the mutual
information as a Gaussian distribution in order to provide both the average
achievable rate and the outage probability. More precisely, the mean and
variance of the mutual information of the separatelycorrelated Rician fading
MIMO channel are derived when the number of transmit and receive antennas grows
asymptotically large and their ratio approaches a finite constant. The
derivation is based on the replica method, an asymptotic technique widely used
in theoretical physics and, more recently, in the performance analysis of
communication (CDMA and MIMO) systems. The replica method allows to analyze
very difficult system cases in a comparatively simple way though some authors
pointed out that its assumptions are not always rigorous. Being aware of this,
we underline the key assumptions made in this setting, quite similar to the
assumptions made in the technical literature using the replica method in their
asymptotic analyses. As far as concerns the convergence of the mutual
information to the Gaussian distribution, it is shown that it holds under some
mild technical conditions, which are tantamount to assuming that the spatial
correlation structure has no asymptotically dominant eigenmodes. The accuracy
of the asymptotic approach is assessed by providing a sizeable number of
numerical results. It is shown that the approximation is very accurate in a
wide variety of system settings even when the number of transmit and receive
antennas is as small as a few units.Comment: - submitted to the IEEE Transactions on Information Theory on Nov.
19, 2006 - revised and submitted to the IEEE Transactions on Information
Theory on Dec. 19, 200
Cooperative Multi-Cell Networks: Impact of Limited-Capacity Backhaul and Inter-Users Links
Cooperative technology is expected to have a great impact on the performance
of cellular or, more generally, infrastructure networks. Both multicell
processing (cooperation among base stations) and relaying (cooperation at the
user level) are currently being investigated. In this presentation, recent
results regarding the performance of multicell processing and user cooperation
under the assumption of limited-capacity interbase station and inter-user
links, respectively, are reviewed. The survey focuses on related results
derived for non-fading uplink and downlink channels of simple cellular system
models. The analytical treatment, facilitated by these simple setups, enhances
the insight into the limitations imposed by limited-capacity constraints on the
gains achievable by cooperative techniques
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
Class-Based Weighted Window for TCP Fairness in WLANs
The explosive growth of the Internet has extended to the wireless domain. The number of Internet users and mobile devices with wireless Internet access is continuously increasing. However, the network resource is essentially limited, and fair service is a key issue in bandwidth allocation. In this research, the focus is on the issue of fairness among wireless stations having different number and direction of flows for different required bandwidth to ensure that fair channel is fairly shared between wireless stations in the same class of bandwidth. It is shown that the current WLANs allocate bandwidth unfairly. It is also identified that the cause of this problem of unfairness is the TCP cumulative ACK mechanism combined with the packet dropping mechanism of AP queue and the irregular space for each wireless station in AP queue. The proposed method allocate converged bandwidth by introducing a Class-Based Weighted Window method which adjusts the TCP window size based on the current conditions of the network and according to the networkâs requirements. This method works in wireless stations without requiring any modification in MAC. It can guarantee fair service in terms of throughput among wireless users whether they require the same or different bandwidth.Wireless LAN, TCP, Fairness
Traffic agents for improving QoS in mixed infrastructure and ad hoc modes wireless LAN
As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET) are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS) requirements for mobile customers. Both infrastructure and ad hoc network structures are supported in wireless local area networks (WLAN), which can offer high data-rate wireless multimedia services to the mobile stations (MSs) in a limited geographical area. For those out-of-coverage MSs, how to effectively connect them to the access point (AP) and provide QoS support is a challenging issue. By mixing the infrastructure and the ad hoc modes in WLAN, we propose in this paper a new coverage improvement scheme that can identify suitable idle MSs in good service zones as traffic agents (TAs) to relay traffic from those out-of-coverage MSs to the AP. The service coverage area of WLAN is then expanded. The QoS requirements (e.g., bandwidth) of those MSs are considered in the selection process of corresponding TAs. Mathematical analysis, verified by computer simulations, shows that the proposed TA scheme can effectively reduce blocking probability when traffic load is light
- âŠ