18 resultados para Bianchi identities


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we analyze the coexistence of a primary and a secondary (cognitive) network when both networks use the IEEE 802.11 based distributed coordination function for medium access control. Specifically, we consider the problem of channel capture by a secondary network that uses spectrum sensing to determine the availability of the channel, and its impact on the primary throughput. We integrate the notion of transmission slots in Bianchi's Markov model with the physical time slots, to derive the transmission probability of the secondary network as a function of its scan duration. This is used to obtain analytical expressions for the throughput achievable by the primary and secondary networks. Our analysis considers both saturated and unsaturated networks. By performing a numerical search, the secondary network parameters are selected to maximize its throughput for a given level of protection of the primary network throughput. The theoretical expressions are validated using extensive simulations carried out in the Network Simulator 2. Our results provide critical insights into the performance and robustness of different schemes for medium access by the secondary network. In particular, we find that the channel captures by the secondary network does not significantly impact the primary throughput, and that simply increasing the secondary contention window size is only marginally inferior to silent-period based methods in terms of its throughput performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We study black hole solutions in Chern-Simons higher spin supergravity based on the superalgebra sl(3 vertical bar 2). These black hole solutions have a U(1) gauge field and a spin 2 hair in addition to the spin 3 hair. These additional fields correspond to the R-symmetry charges of the supergroup sl(3 vertical bar 2). Using the relation between the bulk field equations and the Ward identities of a CFT with N = 2 super-W-3 symmetry, we identify the bulk charges and chemical potentials with those of the boundary CFT. From these identifications we see that a suitable set of variables to study this black hole is in terms of the charges present in three decoupled bosonic sub-algebras of the N = 2 super-W-3 algebra. The entropy and the partition function of these R-charged black holes are then evaluated in terms of the charges of the bulk theory as well as in terms of its chemical potentials. We then compute the partition function in the dual CFT and find exact agreement with the bulk partition function.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks. In our protocol, a multicast group is defined only at the time of the multicasting. The authentication server (AS) in the network generates a session key and authenticates it to each of the members of a multicast group using the computationally inexpensive least common multiple (LCM) method. In addition, a pseudo random function (PRF) is used to bind the secret keys of the network members with their identities. By doing this, the AS is relieved from storing per member secrets in its memory, making the scheme completely storage scalable. The protocol minimizes the load on the network members by shifting the computational tasks towards the AS node as far as possible. The protocol possesses a membership revocation mechanism and is protected against replay attack and brute force attack. Analytical and simulation results confirm the effectiveness of the proposed protocol.