首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到10条相似文献,搜索用时 0 毫秒
1.
The distribution of clock signals throughout the nodes of a network is essential for several applications in control and communication with the phase-locked loop (PLL) being the component for electronic synchronization process. In systems with master–slave (MS) strategies, the PLLs are the slave nodes responsible for providing reliable clocks in all nodes of the network. As PLLs have nonlinear phase detection, double-frequency terms appear and filtering becomes necessary. Imperfections in filtering process cause oscillations around the synchronous state worsening the performance of the clock distribution process. The behavior of one-way master–slave (OWMS) clock distribution networks is studied and performances of first- and second-order filter processes are compared, concerning lock-in ranges and responses to perturbations of the synchronous state.  相似文献   

2.
针对复杂设备中PLL工作稳定性监测问题,建立了一种基于时钟抖动跟踪技术的PLL监测模型.采用迟延系统保证输入时钟与PLL时钟同相,消除了输入时钟抖动对PLL抖动判断的影响,利用先验知识序列消除了判断序列中确定分量,确保模型判断序列中只有PLL输出时钟抖动引起的噪声分量,利用计数器对噪声分量进行采集周期内统计,可以判定P...  相似文献   

3.
This work presents a distributed time‐slot assignment algorithm which adopts TDMA as Medium Access Control, specially suited to support applications with strict delay, jitter, and throughput requirements characterized by convergecast traffic pattern in sensor networks. (e.g. wireless video surveillance sensor networks). The proposed algorithm has three characteristics: (1) every node is guaranteed a path to the base station for its data delivery. In the path, sufficient resource is reserved and weighted fairness can be achieved. (2) It uses cascading time‐slot assignment and jitter minimization algorithm in each node to minimize jitter and end‐to‐end delay. (3) Nodes are only active during their scheduled slots and sleep otherwise. This offers energy saving by reducing idle listening and avoiding overhearing. The performance of the proposed algorithm is evaluated over simulations and analyzed theoretically in comparison with existing slot assignment algorithm. The results show that our algorithm provides lower end‐to‐end delay, jitter, and higher throughput. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

4.
Effective solid‐state interfacial contact of both the cathode and lithium metal anode with the solid electrolyte (SE) are required to improve the performance of solid‐state lithium metal batteries (SSBs). Electro–chemo–mechanical coupling (ECMC) strongly affects the interfacial stability of SSBs. On one hand, mechanical stress strongly influences interfacial contact and causes side reactions. On the other hand, electrochemical reactions such as lithium deposition cause mechanical deformation and stress at electrode/SE interfaces. To solve the degradation/failure problems of interfaces and provide guidelines to construct high‐performance SSBs, the ECMC at electrode/SE interfaces should be comprehensively investigated. In this review, the problems associated with ECMC at electrode/SE interfaces are summarized. The interfacial degradation/failure mechanisms, including the contact and electrochemical stability of interfaces, are introduced. Mechanical factors affecting interfacial contact and lithium deposition are highlighted. Experimental observation and computational analysis methods for electrode/SE interfaces are then summarized. Strategies to construct stable electrode/SE interfaces, such as assembling stress and wetting layers to improve interfacial contact, 3D SE structure, and plating stress relief to suppress lithium dendrite formation, are reviewed. The remaining challenges to better understanding ECMC and related solutions to aid SSB development are discussed.  相似文献   

5.
Alaa  Marwan  William E. 《Ad hoc Networks》2003,1(4):435-453
In this paper, we propose a distributed CDMA-based medium access protocol for mobile ad hoc networks (MANETs). Our approach accounts for multiple access interference (MAI) at the protocol level, thereby addressing the notorious near–far problem that undermines the throughput performance in MANETs. Collision avoidance information is inserted in the clear-to-send (CTS) packets and broadcasted over an out-of-band control channel. This information is used to dynamically bound the transmission power of possible interfering nodes in the vicinity of a receiver. Data packets are transmitted at a power level such that interference-limited simultaneous transmissions can take place in the vicinity of a receiving terminal without disturbing its reception. Simulation results indicate that the proposed protocol achieves a significant increase in network throughput relative to the 802.11 approach, at no additional cost in energy consumption. Finally, we show that variable processing gain may be used to increase the capacity of the proposed protocol.  相似文献   

6.
The introduction of new high bandwidth services such as video-on-demand by cable operators will put a strain on existing resources. It is important for cable operators to know how many resources to commit to the network to satisfy customer demands. In this paper, we develop models of voice and video traffic to determine the effect of demand growth on hybrid fiber–coax networks. We obtain a set of guidelines that network operators can use to build out their networks in response to increased demand. We begin with one type of traffic and generalize to an arbitrary number of high-bandwidth constant bit rate (CBR) like services to obtain service blocking probabilities. We consider the effect of supporting variable bit rate (VBR) packet-switched traffic in addition to CBR services. These computations help us to determine how cable networks would function under various conditions (i.e., low, medium, and heavy loads). We also consider how the growth rate of the popularity of such services would change over time, and how this impacts network planning. Our findings will help cable operators estimate how much bandwidth they need to provision for a given traffic growth model and connection blocking requirement.  相似文献   

7.
Outage performance is analyzed for opportunistic decode‐and‐forward cooperative networks employing orthogonal space–time block codes. The closed‐form expressions of diversity order and the end‐to‐end outage probability at high signal‐to‐noise ratio regime are derived for arbitrary relay number (K) and antenna configuration (N antennas at the source and each relay, ND antennas at the destination) under independent but not necessarily identical Rayleigh fading channels. The analysis is carried out in terms of the availability of the direct link between the source and the destination. It is demonstrated that the diversity order is min{N, ND} ⋅ KN if the direct link is blocked, and if the direct link is available, the diversity order becomes min{N, ND} ⋅ KN + NND. Simulation and numerical results verify the analysis well. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

8.
A traffic matrix can exhibit the volume of network traffic from origin nodes to destination nodes. It is a critical input parameter to network management and traffic engineering, and thus it is necessary to obtain accurate traffic matrix estimates. Network tomography method is widely used to reconstruct end‐to‐end network traffic from link loads and routing matrix in a large‐scale Internet protocol backbone networks. However, it is a significant challenge because solving network tomography model is an ill‐posed and under‐constrained inverse problem. Compressive sensing reconstruction algorithms have been well known as efficient and precise approaches to deal with the under‐constrained inference problem. Hence, in this paper, we propose a compressive sensing‐based network traffic reconstruction algorithm. Taking into account the constraints in compressive sensing theory, we propose an approach for constructing a novel network tomography model that obeys the constraints of compressive sensing. In the proposed network tomography model, a framework of measurement matrix according to routing matrix is proposed. To obtain optimal traffic matrix estimates, we propose an iteration algorithm to solve the proposed model. Numerical results demonstrate that our method is able to pursuit the trace of each origin–destination flow faithfully. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

9.
The separation of oil–water mixtures in highly acidic, alkaline, and salty environment remains a great challenge. Simple, low‐cost, efficient, eco‐friendly, and easily scale‐up processes for the fabrication of novel materials to effective oil–water separation in highly acidic, alkaline, and salty environment, are urgently desired. Here, a facile approach is reported for the fabrication of stable hydrogel‐coated filter paper which not only can separate oil–water mixture in highly acidic, alkaline, and salty environment, but also separate surfactant‐stabilized emulsion. The hydrogel‐coated filter paper is fabricated by smartly crosslinking filter paper with hydrophilic polyvinyl alcohol through a simple aldol condensation reaction with glutaraldehyde as a crosslinker. The resultant multiple crosslinked networks enable the hydrogel‐coated filter paper to tolerate high acid, alkali, and salt up to 8 m H2SO4, 10 m NaOH, and saturated NaCl. It is shown that the hydrogel‐coated filter paper can separate oil–water mixtures in highly acidic, alkaline, and salty environment and oil‐in‐water emulsion environment, with high separation efficiency (>99%).  相似文献   

10.
The increasing demand of wireless communication introduces a challenge to an effective spectrum utilization. In wireless communication systems, the Cognitive Radio (CR) has emerged as a new key technology to address this issue, which allows an opportunistic access to the spectrum. The CRs form a CRN by extending the radio link features to network layer functions. The existing CR based wireless communication techniques has some drawbacks such as, inability to differentiate interference or noise from primary signals, it does not distinguish the different types of noise, low performance, not effective in spread spectrum detection, long observation time and high computational cost. To overwhelm these disadvantages, a novel method, namely, partial distribution based cyclostationary feature extraction–hidden probability state Markov model (PDCFE‐HPSMM) is proposed in this work. The main intention of this technique is to extract the node features, classify the attacker nodes and predict the licensed and unlicensed bandwidth. At first, the CRN is formed with some set of CR nodes, and the communication links between the nodes are estimated. Then, the node features are extracted by employing the PDCFE technique. After that, the attacking nodes are classified based on those features with the help of a HPSMM classification technique. If the attacker is present in the network, the link between the attacking nodes to other nodes is disconnected; otherwise, the communication link is updated. In this work, the Rayleigh channels are used to predict the licensed and unlicensed bandwidth. Again, the HPSMM model is employed to optimally select the channel, and the scheduling technique is implemented to check the status of the channel for message transmission. If the channel is not busy, the message signals are multiplexed and transmitted to the receiver via the selected channel. The novel concept of this paper is, the proposed PDCFE technique extracts the features of the nodes in CRN; based on these features, the attacker nodes in the network are classified with the help of HPSMM technique. Moreover, the HPSMM is used to select the optimal channel for message transmission. The experimental results evaluate the performance of the proposed system in terms of bit error rate (BER), error rate, relay, false detection rate (FDR) and cumulative distribution function (CDF). Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号