62 resultados para wireless ad hoc network
Resumo:
To optimize the performance of wireless networks, one needs to consider the impact of key factors such as interference from hidden nodes, the capture effect, the network density and network conditions (saturated versus non-saturated). In this research, our goal is to quantify the impact of these factors and to propose effective mechanisms and algorithms for throughput guarantees in multi-hop wireless networks. For this purpose, we have developed a model that takes into account all these key factors, based on which an admission control algorithm and an end-to-end available bandwidth estimation algorithm are proposed. Given the necessary network information and traffic demands as inputs, these algorithms are able to provide predictive control via an iterative approach. Evaluations using analytical comparison with simulations as well as existing research show that the proposed model and algorithms are accurate and effective.
Resumo:
Closing feedback loops using an IEEE 802.11b ad hoc wireless communication network incurs many challenges sensitivity to varying channel conditions and lower physical transmission rates tend to limit the bandwidth of the communication channel. Given that the bandwidth usage and control performance are linked, a method of adapting the sampling interval based on an 'a priori', static sampling policy has been proposed and, more significantly, assuring stability in the mean square sense using discrete-time Markov jump linear system theory. Practical issues including current limitations of the 802.11 b protocol, the sampling policy and stability are highlighted. Simulation results on a cart-mounted inverted pendulum show that closed-loop stability can be improved using sample rate adaptation and that the control design criteria can be met in the presence of channel errors and severe channel contention.
Resumo:
Mobile ad hoc networking of dismounted combat personnel is expected to play an important role in the future of network-centric operations. High-speed, short-range, soldier-to-soldier wireless communications will be required to relay information on situational awareness, tactical instructions, and covert surveillance related data during special operations reconnaissance and other missions. This article presents some of the work commissioned by the U. K. Ministry of Defence to assess the feasibility of using 60 GHz millimeter-wave smart antenna technology to provide covert communications capable of meeting these stringent networking needs. Recent advances in RF front-end technology, alongside physical layer transmission schemes that could be employed in millimeter-wave soldier-mounted radio, are discussed. The introduction of covert communications between soldiers will require the development of a bespoke directive medium access layer. A number of adjustments to the IEEE 802.11 distribution coordination function that will enable directional communications are suggested. The successful implementation of future smart antenna technologies and direction of arrival-based protocols will be highly dependent on thorough knowledge of transmission channel characteristics prior to deployment. A novel approach to simulating dynamic soldier-to-soldier signal propagation using state-of-the-art animation-based technology developed for computer game design is described, and important channel metrics such as root mean square angle and delay spread for a team of four networked infantry soldiers over a range of indoor and outdoor environments is reported.
Resumo:
The characterization and understanding of body to body communication channels is a pivotal step in the development of emerging wireless applications such as ad-hoc personnel localisation and context aware body area networks (CABAN). The latter is a recent innovation where the inherent mobility of body area networks can be used to improve the coexistence of multiple co-located BAN users. Rather than simply accepting reductions in communication performance, sensed changes in inter-network co-channel interference levels may facilitate intelligent inter-networking; for example merging or splitting with other BANs that remain in the same domain. This paper investigates the inter-body interference using controlled measurements of the full mesh interconnectivity between two ambulatory BANs operating in the same environment at 2.45 GHz. Each of the twelve network nodes reported received signal strength to allow for the creation of carrier to interference ratio time series with an overall entire mesh sampling period of 54 ms. The results indicate that even with two mobile networks, it is possible to identify the onset of co-channel interference as the BAN users move towards each other and, similarly, the transition to more favourable physical layer channel conditions as they move apart. © 2011 IEEE.
Resumo:
Many modern networks are \emph{reconfigurable}, in the sense that the topology of the network can be changed by the nodes in the network. For example, peer-to-peer, wireless and ad-hoc networks are reconfigurable. More generally, many social networks, such as a company's organizational chart; infrastructure networks, such as an airline's transportation network; and biological networks, such as the human brain, are also reconfigurable. Modern reconfigurable networks have a complexity unprecedented in the history of engineering, resembling more a dynamic and evolving living animal rather than a structure of steel designed from a blueprint. Unfortunately, our mathematical and algorithmic tools have not yet developed enough to handle this complexity and fully exploit the flexibility of these networks. We believe that it is no longer possible to build networks that are scalable and never have node failures. Instead, these networks should be able to admit small, and maybe, periodic failures and still recover like skin heals from a cut. This process, where the network can recover itself by maintaining key invariants in response to attack by a powerful adversary is what we call \emph{self-healing}. Here, we present several fast and provably good distributed algorithms for self-healing in reconfigurable dynamic networks. Each of these algorithms have different properties, a different set of gaurantees and limitations. We also discuss future directions and theoretical questions we would like to answer. %in the final dissertation that this document is proposed to lead to.
Resumo:
The provision of security in mobile ad hoc networks is of paramount importance due to their wireless nature. However, when conducting research into security protocols for ad hoc networks it is necessary to consider these in the context of the overall system. For example, communicational delay associated with the underlying MAC layer needs to be taken into account. Nodes in mobile ad hoc networks must strictly obey the rules of the underlying MAC when transmitting security-related messages while still maintaining a certain quality of service. In this paper a novel authentication protocol, RASCAAL, is described and its performance is analysed by investigating both the communicational-related effects of the underlying IEEE 802.11 MAC and the computational-related effects of the cryptographic algorithms employed. To the best of the authors' knowledge, RASCAAL is the first authentication protocol which proposes the concept of dynamically formed short-lived random clusters with no prior knowledge of the cluster head. The performance analysis demonstrates that the communication losses outweigh the computation losses with respect to energy and delay. MAC-related communicational effects account for 99% of the total delay and total energy consumption incurred by the RASCAAL protocol. The results also show that a saving in communicational energy of up to 12.5% can be achieved by changing the status of the wireless nodes during the course of operation. Copyright (C) 2009 G. A. Safdar and M. P. O'Neill (nee McLoone).
Resumo:
<p>The goal of the POBICOS project is a platform that facilitates the development and deployment of pervasive computing applications destined for networked, cooperating objects. POBICOS object communities are heterogeneous in terms of the sensing, actuating, and computing resources contributed by each object. Moreover, it is assumed that an object community is formed without any master plan; for example, it may emerge as a by-product of acquiring everyday, POBICOS-enabled objects by a household. As a result, the target object community is, at least partially, unknown to the application programmer, and so a POBICOS application should be able to deliver its functionality on top of diverse object communities (we call this opportunistic computing). The POBICOS platform includes a middleware offering a programming model for opportunistic computing, as well as development and monitoring tools. This paper briefly describes the tools produced in the first phase of the project. Also, the stakeholders using these tools are identified, and a development process for both the middleware and applications is presented. © 2009 IEEE.</p>
Resumo:
This study reports the performance of an Archimedean spiral antenna, which exhibits unidirectional circularly polarized radiation patterns with a peak gain >8 dBic in the lower (2.4–2.485 GHz) and upper (5.15–5.35 and 5.725–5.875 GHz) Wireless local area network frequency bands. The required backlobe suppression and impedance match are obtained by placing a multiresonant high impedance surface (HIS) in close proximity to the radiating aperture. Simulated and measured radiation patterns are shown at the center frequency of all three channels and a comparison of the key performance metrics is made with free space and metal backed antenna arrangements to demonstrate the enhancements which are attributed to the HIS reflector.
Resumo:
In the aftermath of a disaster event, and in the absence of trained professionals, many responsibilities are taken on by uninjured citizens who are willing and able to help, such as care of the injured or search and rescue. These citizens are constrained by communications and logistics problems but are less equipped to deal with them as most often they are cut off from any coordinated assistance. The method proposed in this study would increase the survivability of those injured or trapped by a disaster event by providing a facility to allow citizens to coordinate and share information among themselves. This is facilitated by the proposed deployment and the autonomous management of an ad hoc infrastructure that liaises (OK?) directly with survivors without central control. Furthermore, as energy concerns present critical constraints to these networks, this research proposes a system of categorising information elements within the network to ensure efficient information exchange.
Resumo:
A novel wireless local area network (WLAN) security processor is described in this paper. It is designed to offload security encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable hardware accelerator. The unique design, which comprises dedicated cryptographic instructions and hardware coprocessors, is capable of performing wired equivalent privacy, temporal key integrity protocol, counter mode with cipher block chaining message authentication code protocol, and wireless robust authentication protocol. Existing solutions to wireless security have been implemented on hardware devices and target specific WLAN protocols whereas the programmable security processor proposed in this paper provides support for all WLAN protocols and thus, can offer backwards compatibility as well as future upgrade ability as standards evolve. It provides this additional functionality while still achieving equivalent throughput rates to existing architectures. © 2006 IEEE.
Resumo:
Background: Infection remains a severe complication following a total hip replacement. If infection is suspected when revision surgery is being performed, additional gentamicin is often added to the cement on an ad hoc basis in an attempt to reduce the risk of recurrent infection.<br/><br/>Methods and results: In this in vitro study, we determined the effect of incorporating additional gentamicin on the mechanical properties of cement. We also determined the degree of gentamicin release from cement, and also the extent to which biofilms of clinical Staphylococcus spp. isolates form on cement in vitro. When gentamicin was added to unloaded cement (1–4 g), there was a significant reduction in the mechanical performance of the loaded cements compared to unloaded cement. A significant increase in gentamicin release from the cement over 72 h was apparent, with the amount of gentamicin released increasing significantly with each additional 1 g of gentamicin added. When overt infection was modeled, the incorporation of additional gentamicin did result in an initial reduction in bacterial colonization, but this beneficial effect was no longer apparent by 72 h, with the clinical strains forming biofilms on the cements despite the release of high levels of gentamicin.<br/><br/>Interpretation: Our findings indicate that the addition of large amounts of gentamicin to cement is unlikely to eradicate bacteria present as a result of an overt infection of an existing implant, and could result in failure of the prosthetic joint because of a reduction in mechanical performance of the bone cement.
Resumo:
This letter reports the statistical characterization and modeling of the indoor radio channel for a mobile wireless personal area network operating at 868 MHz. Line of sight (LOS) and non-LOS conditions were considered for three environments: anechoic chamber, open office area and hallway. Overall, the Nakagami-m cdf best described fading for bodyworn operation in 60% of all measured channels in anechoic chamber and open office area environments. The Nakagami distribution was also found to provide a good description of Rician distributed channels which predominated in the hallway. Multipath played an important role in channel statistics with the mean recorded m value being reduced from 7.8 in the anechoic chamber to 1.3 in both the open office area and hallway.
Resumo:
This study highlights how heuristic evaluation as a usability evaluation method can feed into current building design practice to conform to universal design principles. It provides a definition of universal usability that is applicable to an architectural design context. It takes the seven universal design principles as a set of heuristics and applies an iterative sequence of heuristic evaluation in a shopping mall, aiming to achieve a cost-effective evaluation process. The evaluation was composed of three consecutive sessions. First, five evaluators from different professions were interviewed regarding the construction drawings in terms of universal design principles. Then, each evaluator was asked to perform the predefined task scenarios. In subsequent interviews, the evaluators were asked to re-analyze the construction drawings. The results showed that heuristic evaluation could successfully integrate universal usability into current building design practice in two ways: (i) it promoted an iterative evaluation process combined with multi-sessions rather than relying on one evaluator and on one evaluation session to find the maximum number of usability problems, and (ii) it highlighted the necessity of an interdisciplinary ad hoc committee regarding the heuristic abilities of each profession. A multi-session and interdisciplinary heuristic evaluation method can save both the project budget and the required time, while ensuring a reduced error rate for the universal usage of the built environments.
Resumo:
The government of Greece has gained notoriety for its failure to implement EU environmental directives in general, and is criticised specifically for its lack of an effective plan for the safe disposal of waste. Local mobilisations against a series of planned 'Sanitary Waste Disposal Sites' (HETAs) in three municipalities of Attica are examined. Should such protests be classified as NIMBY (not in my backyard)? Or do they present broader claims of justice and equity? Qualitative analysis of the protesters' on-line campaign material reveals that while these mobilisations do demonstrate some NIMBY characteristics, such campaigns should rather be perceived as ad hoc mobilisations reflective of tensions of late modernity. The public's mistrust of science and concerns about democratic deficit and accountability, as well as different perceptions of risk, are prominent.