42 resultados para Wireless telecommunication systems


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Sensor Networks have applications in diverse fields. While unique addressing is not a requirement of many data collecting applications of wireless sensor networks, it is vital for the success of applications such as emergency response. Data that cannot be associated with a specific node becomes useless in such situations. In this work we propose a dynamic addressing mechanism for wireless sensor networks. The scheme enables successful reuse of addresses in event-driven wireless sensor networks. It also eliminates the need for network-wide Duplicate Address Detection (DAD) to ensure uniqueness of network level addresses.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Conserving of battery power is a critical requirement in WSNs. Past studies have shown that the transceiving process consumes more energy than the internal processing. This work focuses on eliminating overhead messages used for address allocation by employing multiple base-stations. In this context we explore address allocation without Duplicate Address Detection (DAD). We present an alternative approach to Duplicate address detection using the sink as an address pool to maintain and systematize available addresses. Experimental results show that this approach eliminates overhead messages generated by DAD; resulting in energy savings when used in conjunction with an on-demand address allocation mechanism.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to introduce a wireless web-based ordering system called iMenu in the restaurant industry. Design/methodology/approach – By using wireless devices such as personal digital assistants and WebPads, this system realizes the paradigm of pervasive computing at tableside. Detailed system requirements, design, implementation and evaluation of iMenu are presented.

Findings – The evaluation of iMenu shows it explicitly increases productivity of restaurant staff. It also has other desirable features such as integration, interoperation and scalability. Compared to traditional restaurant ordering process, by using this system customers get faster and better services, restaurant staff cooperate more efficiently with less working mistakes, and enterprise owners thus receive more business profits.

Originality/value – While many researchers have explored using wireless web-based information systems in different industries, this paper presents a system that employs wireless multi-tiered web-based architecture to build pervasive computing systems. Instead of discussing theoretical issues on pervasive computing, we focus on practical issues of developing a real system, such as choosing of web-based architecture, design of input methods in small screens, and response time in wireless web-based systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time  embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop endto- end communication path with either replayed packets or injected spurious packets. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Maintaining QoS (quality of service) guaranteed communication links, and improving the energy consumption; are two aspects that received a significant consideration in the modern wireless sensor network research. This paper formulates a transmission power control problem which satisfies both considerations mentioned above. Moreover, a class of functions for an iterative controller was introduced and analyzed for its convergence. The experimental evaluation of the controller justifies the theoretical assertions as well as the applicability of the control scheme in wireless nodes with minimum measurement capabilities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In wireless mobile computing, location management is introduced whenever users move from one place to another. In order to track a mobile user, the system must store information about their current location and report new locations to a home base station. Numerous techniques have been proposed to optimally manage the location of mobile hosts in mobile networks. This paper attempts to present a more structured and comprehensive analysis of the current location management techniques architectures and their technology enablers. We discuss some of the principal issues involved in location management and present a taxonomy and survey of location management strategies that have been proposed in the literature over the years for mobile computing systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

When building a cost-effective high-performance parallel processing system, a performance model is a useful tool for exploring the design space and examining various parameters. However, performance analysis in such systems has proven to be a challenging task that requires the innovative performance analysis tools and methods to keep up with the rapid evolution and ever increasing complexity of such systems. To this end, we propose an analytical model for heterogeneous multi-cluster systems. The model takes into account stochastic quantities as well as network heterogeneity in bandwidth and latency in each cluster. Also, blocking and non-blocking network architecture model is proposed and are used in performance analysis of the system. The message latency is used as the primary performance metric. The model is validated by constructing a set of simulators to simulate different types of clusters, and by comparing the modeled results with the simulated ones.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Optimizing energy consumption for extending the lifetime in wireless sensor networks is of dominant importance. Groups of autonomous robots and unmanned aerial vehicles (UAVs) acting as mobile data collectors are utilized to minimize the energy expenditure of the sensor nodes by approaching the sensors and collecting their buffers via single hop communication, rather than using multihop routing to forward the buffers to the base station. This paper models the sensor network and the mobile collectors as a system-of-systems, and defines all levels and types of interactions. A practical framework that facilitates deploying heterogeneous mobiles without prior knowledge about the sensor network is presented. Realizing the framework is done through simulation experiments and tested against several performance metrics.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Power control design is a critical aspect of CDMA cellular systems design. This paper develops an adaptive power controller design method for CDMA systems. The key to the power control design is on the recursive identification of the underlying wireless stochastic channel model parameters. The identification process guarantees the power controller to work well for systems in unknown or time varying network environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to-end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we consider wireless sensor networks designed to collect and store data. In a path-based attack, both sensor nodes and the database containing collected data can be compromised. We propose a recovery method using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes along with the database.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a framework for indoor location prediction system using multiple wireless signals available freely in public or office spaces. We first propose an abstract architectural design for the system, outlining its key components and their functionalities. Different from existing works, such as robot indoor localization which requires as precise localization as possible, our work focuses on a higher grain: location prediction. Such a problem has a great implication in context-aware systems such as indoor navigation or smart self-managed mobile devices (e.g., battery management). Central to these systems is an effective method to perform location prediction under different constraints such as dealing with multiple wireless sources, effects of human body heats or mobility of the users. To this end, the second part of this pa- per presents a comparative and comprehensive study on different choices for modeling signals strengths and prediction methods under different condition settings. The results show that with simple, but effective modeling method, almost perfect prediction accuracy can be achieved in the static environment, and up to 85% in the presence of human movements. Finally, adopting the proposed framework we outline a fully developed system, named Marauder, that support user interface interaction and real-time voice-enabled location prediction.