Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In multihop wireless networks, end-to-end throughput is often hard to predict and is even harder to optimize due to the effect of interference. To date there is no precise result other than asymptotic bounds for this question: if there is no routing information given, what is the maximum throughput of a network using uncoordinated transmission such as IEEE 802.11 MAC? This paper attempts to address...
Wireless networks are susceptible to various attacks due to their open nature of operations. Existing security mechanisms and systems are rarely robust under attacks, misoperation and internal faults. Most of the solutions are targeted to specific attacks and also works after detecting considerable damage and provides little protection if one or more components are compromised. These approaches are...
Users using the same video streaming service within a wireless network share the same limited backbone bandwidth to the Internet. These users are motivated to collaborate with each other to obtain better-quality service. The decisions and actions of users influence the performance of others, hence they form a social network. In a fully-distributed wireless network, malicious attack can cause much...
Cognitive Radio (CR) networks have become an important component of the modern communication infrastructure due to their capability of improving spectrum usage efficiency by exploiting channels opportunistically. In CR networks, the network topology changes very frequently because of the temporarily available channels and dynamic transmitting parameters (e.g. transmission power and transmitting frequency),...
In this paper we show how to quantify dependency between the node distributions of wireless networks and the underlying population densities. Furthermore, we show that a quantitative analysis of this relation can be beneficial for understanding and generating realistic network models. Towards this direction we argue that spatial statistics is an appropriate method for this purpose. As a case study...
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems. Within this paradigm, we explore strategies to improve secure connectivity in a wireless network. We first consider the intrinsically secure communications graph (iS-graph),...
Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion...
As the wireless network scales up in size and complexity, the need to study the scalability and behaviors of these networks and their protocols becomes essential. Opportunistic routing utilizes broadcast nature of wireless network, and significantly increases the unicast throughput. However, all of the current opportunistic routing protocols have to rely on the whole topology information. This indeed...
This paper addresses the question of throughput guarantees through distributed scheduling in wireless sensor networks (WSNs) with relay based cooperative communications. We prove that in a single frequency network with bidirectional, equal power communication, low complexity distributed maximal scheduling attains a guaranteed fraction of the maximum throughput region in arbitrary wireless networks...
We present a mobile wireless network evaluation tool (MOWINE) that can analyze mobility and wireless connectivity traces to quantify performance of different network protocols in a given application scenario. We model the highly dynamic connectivity of mobile networks using time-expanded graphs which allow us to study the best-case performance of network protocols. MOWINE also integrates with a network...
The Data Distribution Service for Real-time Systems(DDS) mainly describes how data is dealt with in a single node, but not the mode of data-exchange among nodes. The centralized label publication subscription mechanism is used for data-exchange in this article. In the wireless network, especially low speed wireless network of battlefield, it is important to research on performance of this mechanism...
In this paper we address the problem of distributed Bayesian hypothesis testing in wireless networks where correlations among nodes are modeled as exponential Markov Random Fields (MRF). Applying distributed Belief Propagation (BP), we first derive message and belief update rules for the above model expressed under a likelihood ratio formulation. Then we analyze the properties of BP when the MRF correlation...
Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing...
We consider content discovery and provision in wireless networks with infrastructure, where mobile nodes store, advertise and consume contents while Broker entities running on infrastructure devices let demand and offer meet. We refer to this paradigm as match-making, and study its performance in terms of query success probability, i.e., the probability that a content query is successful. To ensure...
The rapid spread of wireless mobile devices and the advances of wireless communication have fueled the interest about streaming 3D graphics on mobile devices to be used in augmented reality based classes of applications. In these types of applications, a real world is mapped into the virtual world and thin mobile devices are employed to navigate in the virtual simulated environment (VE). In evidence,...
Traffic-aware dynamic spectrum access (TDSA), in which demand-driven spectrum allocation is employed with the aid of cognitive radios, can improve the performance of the wireless network with increasing and dynamic user demands. However, selfish behaviors of participants, such as cheating and deviation for more spectrum, can decrease the efficiency of TDSA a lot. In this paper, with the help of game...
Providing reliable and high quality video over wireless networks is extremely challenging task due to unstable wireless nature. Scalable Video Coding (SVC) is very vulnerable to channel disturbance when transmitted over error-prone wireless channels. Conventional Forward Error Correcting (FEC) codes and retransmission solutions will become less effective while streaming SVC over wireless networks...
Mapping and dynamic routing in a wireless network are essential and basic operations that are the prerequisites for all higher order interactions between nodes on that network. The Intent of network mapping by multi mobile software agents is to obtain the topology of network in a distributed manner. In this paper we examine how software agents can wander in an unknown Ad hoc network with cooperation...
Coolstreaming is one of the first and currently most popular collaborative content distribution system working over the Internet. Such a system has demonstrated how live video streaming can be delivered by exploiting the peer-to-peer (p2p) paradigm. In this paper we propose W-Coolstreaming, a porting of Coolstreaming tailored to work over a mobile wireless network. We show how porting the whole architecture...
Directional antennas offer many potential advantages for wireless networks such as increased network capacity, extended transmission range and reduced energy consumption. Exploiting these advantages, however, requires new protocols and mechanisms at various communication layers to intelligently control the directional antenna system. With directional antennas, many trivial mechanisms, such as neighbor...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.