The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Device-to-device (D2D) communications utilizing licensed spectrum have been considered a promising technology to improve cellular network spectral efficiency and offload local traffic from cellular base stations (BSs). In this paper, we develop Iunius: a peer-to-peer (P2P) system based on harvesting data in a community utilizing multi-hop D2D communications. The Iunius system optimizes D2D communications...
A Connected Dominating Set (CDS) is a subset V′ of V for the graph G(V, E) and induces a connected sub graph, such that each node in V - V′ is at least adjacent to one node in V′. CDSs have been proposed to formulate virtual backbones in wireless ad-hoc sensor networks to design routing protocols for alleviating the serious broadcast storms problem. It...
A Connected Dominating Set (CDS) performs a vital role in wireless ad-hoc sensor networks, which can establish a virtual backbone and thus leads to less maintenance overhead and information exchanges in wireless communications. In this paper, our algorithm first finds a prior CDS and then uses the Minimum-Weight Spanning Tree (MST) to optimize the result. Our algorithm applies effective degree, the...
A Connected Dominating Set (CDS) is a subset V′ of V for the graph G(V, E) and induces a connected sub graph, such that each node in V -- V′ is at least adjacent to one node in V′. CDSs have been proposed to formulate virtual backbones in wireless ad-hoc sensor networks to design routing protocols for alleviating the serious broadcast storms problem. It...
Information secrecy is achievable in a broadcast wireless communication system when the adversary channel witness a greater disruption as against the main channel. The secrecy level need to be enhanced as the adversary terminal can use advance method to eaves drop the hidden message being exchanged between the two legitimate communicating partners. The use of relay- assisted node in information-theoretic...
A connected dominating set (CDS) performs a vital role in wireless ad-hoc sensor networks, which can establish virtual backbones and thus leads to less maintenance overhead and information exchanges in wireless communications. In the literature, many distributed algorithms applied in wireless ad-hoc sensor networks have been proposed. However, we find many of these algorithms are divided into different...
In this paper, data collection schemes with data aggregation for static sink are proposed in wireless sensor networks. According to the distribution of source nodes in whole sensor field, we use a block partition scheme and then each block selects a sensor node as local sink for the data collection of the local area. Furthermore, the local sink would transmit the data to the global sink after aggregating...
In this paper, we discuss Sink-oriented Dynamic Location Service (SDLS) in wireless sensor networks. Since the data is collected by mobile sinks in sensor networks, sink and source must broadcast the information of locations to transfer data from a source node to a sink. To make source can built an efficiently forward data from a source node to a sink, we will discuss the direction of broadcasting...
The emerging Wireless Mesh Networks (WMN) is a broadband access technology with the properties of multi-hop and self-organization, which has advantages of easy deployment, self-recovering, low cost and high scalability. The paper firstly introduces related works of wireless mesh networks; then describes the deployment of a real indoor testbed SJTU-MESH architecture and click based implementation including...
MIMO (Multiple-Input-Multiple-Output) is a promising structure for wireless communication. While virtual MIMO structure has been proposed for distributed and cooperative wireless networks, this proposed structure has also put additional energy consumption where energy stands in the important position. At the same time, we have observed that this-problem-caused low energy nodes' mibehavior will degrade...
Wireless Mesh Network (WMN) is a promising broadband wireless network architecture. Security is an important component of the WMN architecture but is not fully considered so far. In this paper, we introduce a prototype secure wireless mesh network testbed called SJTU-MESH built by Shanghai Jiao Tong University. The detailed design and implementation of secure WMN nodes are presented, and the construction...
Efficient implementation of FIR (finite-impulse-response) equalizers for wireless channels has attracted much attention these days as equalizations can improve the link performance in hostile mobile radio environment by compensating for inter-symbol interference created by multipath within time dispersive channels. Meanwhile, the MIMO (multiple-input-multiple-output) technique becomes a trend in wireless...
Wireless Mesh Network (WMN) is an emerging technology that has developed a lot these years. WMN has the feather of self-organization, distributed structure. The main topological characteristic of WMN is that there are only one or several node connecting to the infrastructure network as gateway and all other nodes connect to the gateway through the relay of the neighboring nodes, and then connect with...
Much work has been done to modify the TCP protocol to improve TCP performance - mainly throughput, over wireless link. However, such improvements need to change the TCP implementation on user systems, which is usually difficult to deploy. In this paper, we investigate the effectiveness of enhancing the TCP performance over wireless link by tuning the packet scheduling schemes. Based on an opportunistic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.