856 resultados para Load Balancing in Wireless LAN


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Due to low cost and easy deployment, multi-hop wireless networks become a very attractive communication paradigm. However, IEEE 802.11 medium access control (MAC) protocol widely used in wireless LANs was not designed for multi-hop wireless networks. Although it can support some kinds of ad hoc network architecture, it does not function efficiently in those wireless networks with multi-hop connectivity. Therefore, our research is focused on studying the medium access control in multi-hop wireless networks. The objective is to design practical MAC layer protocols for supporting multihop wireless networks. Particularly, we try to prolong the network lifetime without degrading performances with small battery-powered devices and improve the system throughput with poor quality channels. ^ In this dissertation, we design two MAC protocols. The first one is aimed at minimizing energy-consumption without deteriorating communication activities, which provides energy efficiency, latency guarantee, adaptability and scalability in one type of multi-hop wireless networks (i.e. wireless sensor network). Methodologically, inspired by the phase transition phenomena in distributed networks, we define the wake-up probability, which maintained by each node. By using this probability, we can control the number of wireless connectivity within a local area. More specifically, we can adaptively adjust the wake-up probability based on the local network conditions to reduce energy consumption without increasing transmission latency. The second one is a cooperative MAC layer protocol for multi-hop wireless networks, which leverages multi-rate capability by cooperative transmission among multiple neighboring nodes. Moreover, for bidirectional traffic, the network throughput can be further increased by using the network coding technique. It is a very helpful complement for current rate-adaptive MAC protocols under the poor channel conditions of direct link. Finally, we give an analytical model to analyze impacts of cooperative node on the system throughput. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Global connectivity, for anyone, at anyplace, at anytime, to provide high-speed, high-quality, and reliable communication channels for mobile devices, is now becoming a reality. The credit mainly goes to the recent technological advances in wireless communications comprised of a wide range of technologies, services, and applications to fulfill the particular needs of end-users in different deployment scenarios (Wi-Fi, WiMAX, and 3G/4G cellular systems). In such a heterogeneous wireless environment, one of the key ingredients to provide efficient ubiquitous computing with guaranteed quality and continuity of service is the design of intelligent handoff algorithms. Traditional single-metric handoff decision algorithms, such as Received Signal Strength (RSS) based, are not efficient and intelligent enough to minimize the number of unnecessary handoffs, decision delays, and call-dropping and/or blocking probabilities. This research presented a novel approach for the design and implementation of a multi-criteria vertical handoff algorithm for heterogeneous wireless networks. Several parallel Fuzzy Logic Controllers were utilized in combination with different types of ranking algorithms and metric weighting schemes to implement two major modules: the first module estimated the necessity of handoff, and the other module was developed to select the best network as the target of handoff. Simulations based on different traffic classes, utilizing various types of wireless networks were carried out by implementing a wireless test-bed inspired by the concept of Rudimentary Network Emulator (RUNE). Simulation results indicated that the proposed scheme provided better performance in terms of minimizing the unnecessary handoffs, call dropping, and call blocking and handoff blocking probabilities. When subjected to Conversational traffic and compared against the RSS-based reference algorithm, the proposed scheme, utilizing the FTOPSIS ranking algorithm, was able to reduce the average outage probability of MSs moving with high speeds by 17%, new call blocking probability by 22%, the handoff blocking probability by 16%, and the average handoff rate by 40%. The significant reduction in the resulted handoff rate provides MS with efficient power consumption, and more available battery life. These percentages indicated a higher probability of guaranteed session continuity and quality of the currently utilized service, resulting in higher user satisfaction levels.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Due to huge popularity of portable terminals based on Wireless LANs and increasing demand for multimedia services from these terminals, the earlier structures and protocols are insufficient to cover the requirements of emerging networks and communications. Most research in this field is tailored to find more efficient ways to optimize the quality of wireless LAN regarding the requirements of multimedia services. Our work is to investigate the effects of modulation modes at the physical layer, retry limits at the MAC layer and packet sizes at the application layer over the quality of media packet transmission. Interrelation among these parameters to extract a cross-layer idea will be discussed as well. We will show how these parameters from different layers jointly contribute to the performance of service delivery by the network. The results obtained could form a basis to suggest independent optimization in each layer (an adaptive approach) or optimization of a set of parameters from different layers (a cross-layer approach). Our simulation model is implemented in the NS-2 simulator. Throughput and delay (latency) of packet transmission are the quantities of our assessments. © 2010 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Multilevel algorithms are a successful class of optimisation techniques which address the mesh partitioning problem. They usually combine a graph contraction algorithm together with a local optimisation method which refines the partition at each graph level. In this paper we present an enhancement of the technique which uses imbalance to achieve higher quality partitions. We also present a formulation of the Kernighan-Lin partition optimisation algorithm which incorporates load-balancing. The resulting algorithm is tested against a different but related state-of the-art partitioner and shown to provide improved results.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present a dynamic distributed load balancing algorithm for parallel, adaptive finite element simulations using preconditioned conjugate gradient solvers based on domain-decomposition. The load balancer is designed to maintain good partition aspect ratios. It can calculate a balancing flow using different versions of diffusion and a variant of breadth first search. Elements to be migrated are chosen according to a cost function aiming at the optimization of subdomain shapes. We show how to use information from the second step to guide the first. Experimental results using Bramble's preconditioner and comparisons to existing state-ot-the-art load balancers show the benefits of the construction.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Two technical solutions make it possible to perform bulk transmissions while retaining security without too high a performance overhead. These are: 1. a) hierarchical encryption - the stronger the encryption, the harder it is to break but also the more computationally expensive it is. A hierarchical approach to key exchange means that simple and relatively weak encryption and keys are used to encrypt small chunks of data, for example 10 seconds of video. Each chunk has its own key. New keys for this bottom-level encryption are exchanged using a slightly stronger encryption, for example a whole-video key could govern the exchange of the 10-second chunk keys. At a higher level again, there could be daily or weekly keys, securing the exchange of whole-video keys, and at a yet higher level, a subscriber key could govern the exchange of weekly keys. At higher levels, the encryption becomes stronger but is used less frequently, so that the overall computational cost is minimal. The main observation is that the value of each encrypted item determines the strength of the key used to secure it. 2. b) non-symbolic fragmentation with signal diversity - communications are usually assumed to be sent over a single communications medium, and the data to have been encrypted and/or partitioned in whole-symbol packets. Network and path diversity break up a file or data stream into fragments which are then sent over many different channels, either in the same network or different networks. For example, a message could be transmitted partly over the phone network and partly via satellite. While TCP/IP does a similar thing in sending different packets over different paths, this is done for load-balancing purposes and is invisible to the end application. Network and path diversity deliberately introduce the same principle as a secure communications mechanism - an eavesdropper would need to intercept not just one transmission path but all paths used. Non-symbolic fragmentation of data is also introduced to further confuse any intercepted stream of data. This involves breaking up data into bit strings which are subsequently disordered prior to transmission. Even if all transmissions were intercepted, the cryptanalyst still needs to determine fragment boundaries and correctly order them. These two solutions depart from the usual idea of data encryption. Hierarchical encryption is an extension of the combined encryption of systems such as PGP but with the distinction that the strength of encryption at each level is determined by the "value" of the data being transmitted. Non- symbolic fragmentation suppresses or destroys bit patterns in the transmitted data in what is essentially a bit-level transposition cipher but with unpredictable irregularly-sized fragments. Both technologies have applications outside the commercial and can be used in conjunction with other forms of encryption, being functionally orthogonal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This work deals with analysis of cracked structures using BEM. Two formulations to analyse the crack growth process in quasi-brittle materials are discussed. They are based on the dual formulation of BEM where two different integral equations are employed along the opposite sides of the crack surface. The first presented formulation uses the concept of constant operator, in which the corrections of the nonlinear process are made only by applying appropriate tractions along the crack surfaces. The second presented BEM formulation to analyse crack growth problems is an implicit technique based on the use of a consistent tangent operator. This formulation is accurate, stable and always requires much less iterations to reach the equilibrium within a given load increment in comparison with the classical approach. Comparison examples of classical problem of crack growth are shown to illustrate the performance of the two formulations. (C) 2009 Elsevier Ltd. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fracture mechanics tests were carried out for AerMet 100 in distilled water and NaCl (3.5 and 35 gl(-1)). The initiation period at higher values of the stress intensity factor indicated that load application in the stress corrosion cracking (SCC) environment is a necessary but not sufficient factor for SCC and that time is needed for some other factor (e.g., the local hydrogen concentration) to reach an appropriate value. The threshold stress intensity factor, K-ISSC, was found to increase with decreasing NaCl concentration. The plateau stress corrosion crack velocity was 2 x 10(-8) ms(-1) for NaCl (3.5 and 35 gl(-1)). The fracture mode was transgranular with small areas of an intergranular nature. (C) 1998 Chapman & Hall.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We modified the noninvasive, in vivo technique for strain application in the tibiae of rats (Turner et al,, Bone 12:73-79, 1991), The original model applies four-point bending to right tibiae via an open-loop, stepper-motor-driven spring linkage, Depending on the magnitude of applied load, the model produces new bone formation at periosteal (Ps) or endocortical surfaces (Ec.S). Due to the spring linkage, however, the range of frequencies at which loads can be applied is limited. The modified system replaces this design with an electromagnetic vibrator. A load transducer in series with the loading points allows calibration, the loaders' position to be adjusted, and cyclic loading completed under load central as a closed servo-loop. Two experiments were conducted to validate the modified system: (1) a strain gauge was applied to the lateral surface of the right tibia of 5 adult female rats and strains measured at applied loads from 10 to 60 N; and (2) the bone formation response was determined in 28 adult female Sprague-Dawley rats. Loading was applied as a haversine wave with a frequency of 2 Hz for 18 sec, every second day for 10 days. Peak bending loads mere applied at 33, 40, 52, and 64 N, and a sham-loading group tr as included at 64 N, Strains in the tibiae were linear between 10 and 60 N, and the average peak strain at the Ps.S at 60 N was 2664 +/- 250 microstrain, consistent with the results of Turner's group. Lamellar bone formation was stimulated at the Ec.S by applied bending, but not by sham loading. Bending strains above a loading threshold of 40 N increased Ec Lamellar hone formation rate, bone forming surface, and mineral apposition rate with a dose response similar to that reported by Turner et al, (J Bone Miner Res 9:87-97, 1994). We conclude that the modified loading system offers precision for applied loads of between 0 and 70 N, versatility in the selection of loading rates up to 20 Hz, and a reproducible bone formation response in the rat tibia, Adjustment of the loader also enables study of mechanical usage in murine tibia, an advantage with respect to the increasing variety of transgenic strains available in bone and mineral research. (Bone 23:307-310; 1998) (C) 1998 by Elsevier Science Inc. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: To determine whether coinfection with sexually transmitted diseases (STD) increases HIV shedding in genital-tract secretions, and whether STD treatment reduces this shedding. Design: Systematic review and data synthesis of cross-sectional and cohort studies meeting. predefined quality criteria. Main Outcome Measures: Proportion of patients with and without a STD who had detectable HIV in genital secretions, HIV toad in genital secretions, or change following STD treatment. Results: Of 48 identified studies, three cross-sectional and three cohort studies were included. HIV was detected significantly more frequently in participants infected with Neisseria gonorrhoeae (125 of 309 participants, 41%) than in those without N gonorrhoeae infection (311 of 988 participants, 32%; P = 0.004). HIV was not significantly more frequently detected in persons infected with Chlamydia trachomatis (28 of 67 participants, 42%) than in those without C trachomatis infection (375 of 1149 participants, 33%; P = 0.13). Median HIV load reported in only one study was greater in men with urethritis (12.4 x 10(4) versus 1.51 x 10(4) copies/ml; P = 0.04). In the only cohort study in which this could be fully assessed, treatment of women with any STD reduced the proportion of those with detectable HIV from 39% to 29% (P = 0.05), whereas this proportion remained stable among controls (15-17%), A second cohort study reported fully on HIV load; among men with urethritis, viral load fell from 12.4 to 4.12 x 10(4) copies/ml 2 weeks posttreatment, whereas viral load remained stable in those without urethritis. Conclusion: Few high-quality studies were found. HIV is detected moderately more frequently in genital secretions of men and women with a STD, and HIV load is substantially increased among men with urethritis, Successful STD treatment reduces both of these parameters, but not to control levels. More high-quality studies are needed to explore this important relationship further.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Addition of a load to a moving upper limb produces a perturbation of the trunk due to transmission of mechanical forces. This experiment investigated the postural response of the trunk muscles in relation to unexpected limb loading. Subjects performed rapid, bilateral shoulder flexion in response to a stimulus. In one third of trials, an unexpected load was added bilaterally to the upper limbs in the first third of the movement. Trunk muscle electromyography, intra-abdominal pressure and upper limb and trunk motion were measured. A short-latency response of the erector spinae and transversus abdominis muscles occurred similar to 50 ms after the onset of the limb perturbation that resulted from addition of the load early in the movement and was coincident with the onset of the observed perturbation at the trunk. The results provide evidence of initiation of a complex postural response of the trunk muscles that is consistent with mediation by afferent input from a site distant to the lumbar spine, which may include afferents of the upper limb.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Chemokines comprise a structurally related family of cytokines that regulate leukocyte trafficking. Because infection with Toxoplasma gondii can induce an important inflammatory reaction that, if left uncontrolled, can lead to death, we investigated the role of the chemokine receptor CCR2 in T gondii infection. We orally infected CCR2(-/-) mice with five ME-49 T gondii cysts and monitored morbidity, survival, and immune response thereafter. The CCR2(-/-) mice displayed higher susceptibility to infection as all mice died on day 28 after infection. Despite similar Th1 responses, a more evident anti-inflammatory response was induced in the peripheral organs of CCR2(-/-) mice compared with wild-type C57BL/6 mice. Additionally, CCR2-/- mice presented greater parasitism and a milder inflammatory reaction in their peripheral organs with lesser CD4(+) and MAC-1(+) and greater CD8(+) cell migration. The parasite load decreased in these organs in CCR2(-/-) mice but remained uncontrolled in the central nervous system. Additionally, we observed down-regulated inducible nitric oxide synthase expression in peripheral organs from CCR2(-/-) mice that was associated with a small nitric oxide production by spleen macrophages. In conclusion, in the absence of CCR2, another mechanism is activated to control tissue parasitism in peripheral organs. Nevertheless, CCR2 is essential for the activation of microbicidal mediators that control T gondii replication in the central nervous system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposed a novel model for short term load forecast in the competitive electricity market. The prior electricity demand data are treated as time series. The forecast model is based on wavelet multi-resolution decomposition by autocorrelation shell representation and neural networks (multilayer perceptrons, or MLPs) modeling of wavelet coefficients. To minimize the influence of noisy low level coefficients, we applied the practical Bayesian method Automatic Relevance Determination (ARD) model to choose the size of MLPs, which are then trained to provide forecasts. The individual wavelet domain forecasts are recombined to form the accurate overall forecast. The proposed method is tested using Queensland electricity demand data from the Australian National Electricity Market. (C) 2001 Elsevier Science B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

[1] In this paper a detailed design, development and performances of a 5 GHz microstrip Yagi antenna, which uses a two-dimensional (2-D) electromagnetic band gap (EBG) structure in the ground plane, are presented. The results indicate that the use of the EBG structure improves the radiation pattern of the antenna. The cross polarization is suppressed by properly choosing the period and dimensions of EBGs. Also, the broadside gain is improved in comparison with the analogous antenna without the EBGs.