首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
谈振辉 《世界电信》1996,9(1):20-23
本文简要介绍了无线个人通信网,主要讨论了无线个人通信网的频谱分配、移动管理、呼叫和流量控制、智能网结构、网络规划和设计等技术问题。  相似文献   

2.
分布式无线Ad Hoc传感器网络中的合作式波束形成的性能分析是建立在随机阵理论和移动通信波束形成的基础上的。在分布式Ad Hoc传感器网络中,每个传感器节点有一个全向天线,且在簇中的节点传输同一信号,使信号在远区场的目标方向上叠加。波束的方向的随机性是由无线Ad Hoc网络结构决定的。介绍了随机阵理论和移动通信波束形成,接着介绍了系统模型,分析了波束的方向特性,着重讨论了平均方向性增益,推导出平均方向性增益的近似公式。  相似文献   

3.
文章介绍了无线局域网的传输技术、网络拓扑、基本网络组成,以及与其他网络集成的技术,并在此基础上简单介绍了其应用与发展前景。  相似文献   

4.
Device-to-Device (D2D) communication and wireless small cell networks (SCNs) are two of the most promising paradigms in next generation cellular technologies. However, interference management is a major issue in regard to the use of either or both technologies. In this paper, we propose a D2D pair underlying SCNs using Wireless Power Transfer (WPT) technology. In particular, we have a D2D transmitter and D2D receiver underlying SCNs and operate in close proximity to a SCN primary user (PU). Two scenarios are proposed. The first scenario is when the best base station (BS) link is chosen to harvest energy from, and a second scenario where energy is harvested from all available SCN BSs. The transmission between the D2D pair is kept under a certain threshold so it could not have any harmful effects on the transmission link of PU. The results reveal that the number of interference users shows negative effect on the performance of the considered system. Besides, the primary network’s peak interference constraint has significant influence on the optimal value of energy harvesting time at the D2D transmitter.  相似文献   

5.
6.
This paper investigates secure transmission in a wireless powered communication network(WPCN)with an energy harvesting(EH)source configured with multiple antennas.In the WPCN,the EH source harvests energy from the radio frequency(RF)signals broadcasted by a power beacon(PB),and purely relies on the harvested energy to communicate with the destination in the presence of passive eavesdroppers.It is noteworthy that the RF-EH source is equipped with a finite energy storage to accumulate the harvested energy for the future usage.Moreover,due to energy-constraint and complexitylimitation,the multi-antenna source is only configured with a single RF-chain.To enhance the security for the WPCN,we propose two adaptive transmission schemes,i.e.,energy-aware transmit antenna selection(EATAS)and energy-aware differential spatial modulation(EADSM).According to the energy status and the channel quality,the source adaptively decides whether to transmit confidential information or harvest RF energy.To evaluate the secrecy performance of the proposed schemes,we first study the evolution of the energy storage,and then derive the analytical expressions of connection outage probability(COP),secrecy outage probability(SOP)and efficient secrecy throughput(EST).Numerical results demonstrate that our proposed schemes outperform the existing schemes,i.e.,time-switching based TAS(TS-TAS)Received:May 19,2020 Revised:Sep.13,2020 Editor:Deli Qiao and accumulate-then-transmit(ATT).And,increasing the transmit power of the PB or the capacity of the source’s energy storage is helpful to improve the secrecy performance.Moreover,there exists an optimal transmission rate for each proposed scheme to achieve best secrecy performance.  相似文献   

7.
8.
An energy-efficient adaptive-transmission protocol for mobile frequency-hop spread-spectrum wireless communication networks is described and evaluated. The purpose of the protocol is to permit each of the mobile terminals to adjust its transmitter power and code rate to match the characteristics of the time-varying communication links in the network. The proposed adaptive-transmission protocol bases its choice of transmission parameters on a very simple form of side information that is easy to obtain in a FH communication receiver. The performance of the adaptive-transmission protocol is evaluated for networks in which each communication link may have a time-varying propagation loss and intermittent partial-band interference. Our results demonstrate that the adaptive-transmission protocol can improve the utility of a link and reduce energy consumption by adjusting the transmission parameters in response to changes in the side information.  相似文献   

9.
We propose an energy-balanced allocation of a real-time application onto a single-hop cluster of homogeneous sensor nodes connected with multiple wireless channels. An epoch-based application consisting of a set of communicating tasks is considered. Each sensor node is equipped with discrete dynamic voltage scaling (DVS). The time and energy costs of both computation and communication activities are considered. We propose both an Integer Linear Programming (ILP) formulation and a polynomial time 3-phase heuristic. Our simulation results show that for small scale problems (with ≤10 tasks), up to 5x lifetime improvement is achieved by the ILP-based approach, compared with the baseline where no DVS is used. Also, the 3-phase heuristic achieves up to 63% of the system lifetime obtained by the ILP-based approach. For large scale problems (with 60–100 tasks), up to 3.5x lifetime improvement can be achieved by the 3-phase heuristic. We also incorporate techniques for exploring the energy-latency tradeoffs of communication activities (such as modulation scaling), which leads to 10x lifetime improvement in our simulations. Simulations were further conducted for two real world problems – LU factorization and Fast Fourier Transformation (FFT). Compared with the baseline where neither DVS nor modulation scaling is used, we observed up to 8x lifetime improvement for the LU factorization algorithm and up to 9x improvement for FFT.  相似文献   

10.
International Journal of Wireless Information Networks -  相似文献   

11.
文章介绍了车辆通信网的基本概念、网络架构、国际标准及关键技术,分析了其在物理层、媒体接入层、路由层、安全技术的研究热点问题,并讨论了其在智能交通、安全行车、导航和智能驾驶等方面的应用前景。  相似文献   

12.
Benefit from the enhanced onboard pro-cessing capacities and high-speed satellite-terrestrial links,satellite edge computing has been regarded as a promising te...  相似文献   

13.
Wireless Mesh Network (WMN) is an emerging heterogeneous network architecture that is growing in importance among traditional wireless communication systems as a cost-effective way of providing Internet services. However, WMNs are particularly vulnerable to malicious nodes given their inherent attributes such as decentralized infrastructure and high dependence of node cooperation. We then propose a distributed and Collaborative Intrusion Detection System (CIDS) architecture for detecting insider attacks at real-time, which comprises: i) a Routing Protocol Analyzer (RPA) to analyze the collected routing traffic and generate respective Routing Events; ii) a Distributed Intrusion Detection Engine (DIDE) that treats the Routing Events by applying Routing Constraints and calculate related Misbehaving Metrics; iii) a Cooperative Consensus Mechanism (CCM) to check the Misbehaving Metrics using a proposed threshold scheme and to track down the source of intrusion. The entire CIDS solution is implemented in a virtualized mesh network platform. The experimental results show the proposed CIDS architecture efficiently detects message fabrication attacks with good precision and low resource consumption.  相似文献   

14.
Time synchronization is crucial for the implementation of cooperative communication in wireless sensor networks. In this paper, we explore the effect of synchronization error on cooperative communication utilizing distributed Alamouti code. The analysis and simulation results show that small synchronization error has negligible effect on bit error rate (BER) performance. In order to synchronize the distributed sensor nodes within an acceptable error, we propose a physical layer synchronization scheme. This scheme consists of an initial synchronization of the cooperative transmitters, synchronization error estimation at the cooperative receiver and finally a feedback phase. A maximum likelihood method is proposed to make the synchronization error estimation. It achieves better performance than the matched filter method at the price of moderate increase in computational complexity and memory space. Two strategies after synchronization error estimation have been analyzed. They provide better BER performance in the existence of initial synchronization error. They are practical to be implemented in the sensor nodes before the Alamouti decoding.  相似文献   

15.
Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications often impose stringent Quality-of-Service requirements including high detection probability, low false alarm rate, and bounded detection delay. Although a dense all-static network may initially meet these Quality-of-Service requirements, it does not adapt to unpredictable dynamics in network conditions (e.g., coverage holes caused by death of nodes) or physical environments (e.g., changed spatial distribution of events). This paper exploits reactive mobility to improve the target detection performance of wireless sensor networks. In our approach, mobile sensors collaborate with static sensors and move reactively to achieve the required detection performance. Specifically, mobile sensors initially remain stationary and are directed to move toward a possible target only when a detection consensus is reached by a group of sensors. The accuracy of final detection result is then improved as the measurements of mobile sensors have higher Signal-to-Noise Ratios after the movement. We develop a sensor movement scheduling algorithm that achieves near-optimal system detection performance under a given detection delay bound. The effectiveness of our approach is validated by extensive simulations using the real data traces collected by 23 sensor nodes.  相似文献   

16.
17.
System lifetime of wireless sensor networks (WSN) is inversely proportional to the energy consumed by critically energy-constrained sensor nodes during RF transmission. In that regard, modulated backscattering (MB) is a promising design choice, in which sensor nodes send their data just by switching their antenna impedance and reflecting the incident signal coming from an RF source. Hence, wireless passive sensor networks (WPSN) designed to operate using MB do not have the lifetime constraints of conventional WSN. However, the communication performance of WPSN is directly related to the RF coverage provided over the field the passive sensor nodes are deployed. In this letter, RF communication coverage in WPSN is analytically investigated. The required number of RF sources to obtain interference-free communication connectivity with the WPSN nodes is determined and analyzed in terms of output power and the transmission frequency of RF sources, network size, RF source and WPSN node characteristics.  相似文献   

18.
19.
20.
Emerging wireless sensor network (WSN) applications demand considerable computation capacity for in-network processing. To achieve the required processing capacity, cross-layer collaborative in-network processing among sensors emerges as a promising solution: sensors do not only process information at the application layer, but also synchronize their communication activities to exchange partially processed data for parallel processing. However, scheduling computation and communication events is a challenging problem in WSNs due to limited resource availability and shared communication medium. In this work, an application-independent task mapping and scheduling solution in multihop homogeneous WSNs, multihop task mapping and scheduling (MTMS), is presented that provides real-time guarantees. Using our proposed application model, the multihop channel model, and the communication scheduling algorithm, computation tasks and associated communication events are scheduled simultaneously. The dynamic voltage scaling (DVS) algorithm is presented to further optimize energy consumption. Simulation results show significant performance improvements compared with existing mechanisms in terms of minimizing energy consumption subject to delay constraints  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号