-
3361
-
3362
Hybrid wireless mesh protocol
Published 2009-01-01“…Hybrid wireless mesh protocol(HWMP), the default routing protocol of IEEE 802.11s, was described.HWMP provided two routing modes:on-demand and proactive.An efficient cooperation method of the two routing modes was proposed.It was implemented and its performance was evaluated.The experimental results show that HWMP has lower average latency and higher data transmission throughput compared with ad-hoc on demand distance vector routing(AODV).…”
Get full text
Article -
3363
Security Analysis in Wireless Sensor Networks
Published 2014-10-01“…This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. …”
Get full text
Article -
3364
Quality of Service Approach for Wireless Body Area Network Based on Grade
Published 2014-05-01“…Utilizing time slot-based CSMA/CA of beacon enabled model of IEEE 802.15.4, guaranteed time slot and traffic differentiation,the QoS framework was implemented. …”
Get full text
Article -
3365
-
3366
Optimal integration of photovoltaic sources and capacitor banks considering irradiance, temperature, and load changes in electric distribution system
Published 2025-01-01“…The algorithm is rigorously tested on standard distribution networks, including the IEEE 33, IEEE 69, and ZB-ALG-Hassi Sida 157-bus systems. …”
Get full text
Article -
3367
Algorithm оf Computer Model Realization оf High-Frequency Processes in Switchgears Containing Non-Linear Over-Voltage Limiters
Published 2007-08-01“…Analysis of the Over-Voltage Limiter (OVL) influence on electromagnetic high-frequency over-voltages at commutations with isolators of unloaded sections of wires and possibility of application of a frequency-dependent resistor in case of necessity to facilitate OVL operation conditions is provided in the paper.It is shown that it is necessary to take into account characteristics of OVL by IEEE circuit and its modifications at computer modeling of high-frequency over-voltages.…”
Get full text
Article -
3368
Collision and information error of topologies in clustering protocol
Published 2011-01-01“…After the analysis of the collision in the CSMA and TDMA multiple access methods,and information error of topologies information in clustering protocol,a measurement index is introduced for the information error,and several methods are given in order to improve the index.The algorithm is combined with IEEE 802.15.4 protocol,and remarkable simulation conclusions are drawn from NS2 with the analysis of the impact of communication distance and movement speed.…”
Get full text
Article -
3369
Discussion on technical solutions to fibre-optic home networking
Published 2021-05-01“…Technical solutions for fibre-optic home networking, including ITU-T standard G.hn, PON access networks, and IEEE fibre-optic Ethernet, were introduced, and they were analyzed and compared from the aspects of technical characteristics, standardization, industrial chain, future development, etc.Proposals on home gateway location and drop fibre cable termination were also given, and the experiment results show that the proposed solution can improve the Wi-Fi coverage of the home gateway and the wireless access rate.…”
Get full text
Article -
3370
A Software-Defined Radio System for Intravehicular Wireless Sensor Networks
Published 2010-01-01“…The MAC layer of the system follows the specification of the IEEE802.15.4 standard. The transceiver design, especially the receiver design, is detailed in the paper. …”
Get full text
Article -
3371
Auto-learning TSN: improvements on TSN usability
Published 2023-11-01“…., industrial control) require networks to provide deterministic transmission services, and traditional statistical multiplexing networks can not meet the needs of this type of applications.IEEE 802.1 TSN standard and related research can provide deterministic networking services over Ethernet.The basic principles of TSN were described briefly, the key queuing mechanisms of TSN by using network calculus were analyzed quantitatively, and an auto-learning TSN mechanism was proposed to adaptively support non-TSN device connections by network intelligence.Together with delay guarantee algorithms, a E2E TSN solution can be formed and used for the further promotion and application of TSN technology.…”
Get full text
Article -
3372
Development of visual surveillance standardization
Published 2018-10-01“…The standardization of visual surveillance in major standard organizations both domestic and international was focused on,and the progress of the visual surveillance standards in ITU-T,ONVIF,IEC,ISO,PSIA,HDcctv,IEEE,3GPP,ETSI,TC100,CCSA,AVS and National Information Technical Standardization Committee was introduced.The latest development in standardization area such as visual surveillance systems,architecture,terminals,codecs,intelligent applications,big data applications,cloud storage,cloud computing,edge storage and edge computing were introduced.On this basis,the future research areas of product development and standardization of visual surveillance were discussed.The visual surveillance standardization roadmap was laid out,and the future visual surveillance standardization and research fields were proposed.…”
Get full text
Article -
3373
Study on Key Technology of WLAN Service Non-Sense Authentication Method
Published 2013-09-01“…The current situation and the problems in access authentication of WLAN service were introduced, the IEEE 802.1x architecture and authentication method were analyzed, the key technology of non-sense authentication based on the EAP for principle,network structure and the certification process were discussed, and the main non-sense authentication method were compared.Finally,its application promotion were summarized.…”
Get full text
Article -
3374
Multi-channel based on power control protocol for mobile ad hoc networks
Published 2006-01-01“…To solve the collision problem brought by power control in mobile ad-hoc network(MANET),multi-channel MAC protocol and on-demand minimum energy routing protocol were employed,to carry out a multi-channel based power control ad hoc network,MCBPC.This architecture controlled the frequent changes of topology,decreased the probability of contact brought by power control,and achieved the goal of energy conservation.Simulation results indicate that compared with AODV@IEEE 802.11 approaches,the proposed MCBPC solution achieves about 90% increase in the throughput and network lifetime,and 30% increase in the packet delivery ratio.…”
Get full text
Article -
3375
Optimal transmissions for space-time coded OFDM UWB systems
Published 2005-01-01“…The emerging ultra-wideband (UWB) system offers a great potential for the design of high-speed short-range communications.Compared with great progress at physical layer,the corresponding medium access control (MAC) layer designs are naturally placed on the schedules.We focus on the optimal power load scheme,which is an integral part of the MAC layer protocol design,for UWB space-time coded (STC) orthogonal frequency-division multiplexing (OFDM) transmissions.Assumed the transmitter has perfect or partial channel stage information (CSI).Based on the optimization criteria of maximizing capacity,three kinds of power load schemes were presented with different tradeoff among performance,complexity and feedback bandwidth overhead.The proposed schemes are verified and compared under the channel prototype proposed by IEEE 802.15.3a Task Group.…”
Get full text
Article -
3376
Multi-user coordination technology
Published 2021-04-01“…Wi-Fi 6 was the new name of IEEE 802.11ax by the Wi-Fi Alliance to facilitate the promotion of new Wi-Fi technology.Wi-Fi 6 technology focused on improving multi-user performance and efficiency in dense deployment scenario.Introducing OFDMA, UL MU-MIMO and other multi-user collaboration technologies, greatly increases system capacity and reduces transmission delay.The principles of OFDMA, MU-MIMO, MU-RTS/CTS technologies were described, the communication process in multi-user scenario was introduced in detail, and the UL and DL simultaneous user numbers of Wi-Fi 6 were analyzed in theory.Finally, the application potential of Wi-Fi 6 were discussed.…”
Get full text
Article -
3377
Survey of control and management mechanisms for time-sensitive network
Published 2021-12-01“…Time-sensitive network can provide deterministic transmission services with bounded low latency for applications.Besides, it brings a unified architecture and standards to heterogeneous real-time Ethernet in the industry.However, the implementation and deployment of time-sensitive network based on IEEE Std 802.1Qcc face many challenges in various application scenarios.The research on the control and management mechanisms in time-sensitive network was summarized.Then the problems to be solved were analyzed and summarized from transmission performance, scalability and technology fusion.The latest research progress of control and management mechanisms was shown.The open issues and future research directions were discussed.…”
Get full text
Article -
3378
Effective frame transmitting mechanism for improving the network throughput
Published 2010-01-01“…The limited radio resource can be used reasonably by the frame transmitting mechanism well designed.Based on the analysis on the normalize throughput of IEEE 802.11 wireless LAN,combining adaptive contention window and random varying timing method,a simple and effect frame transmitting mechanism was proposed.Actively,the dynamical varying timing method adjusts the number of packets sending to queue;moreover,the adaptive contention window scheme determines the size of contention window based on the collision status rapidly.The simulations show that the mechanism is able to optimize the parameters of packets sending out,and network throughput can be improved 30 per-cent,consequently,the radio resource is utilized more reasonably.…”
Get full text
Article -
3379
Iterative channel estimation based on the Turbo principle for UWB system
Published 2008-01-01“…An iterative channel estimation algorithm and receiver structures based on Turbo principle were proposed for estimating channel parameters in a TH-UWB system under the realistic UWB channel model from IEEE 802.15. In each iteration, the soft-output of decoder is fed back to the channel estimation module, and used as the prior information, which means no training sequences are used. …”
Get full text
Article -
3380
Probabilistic Model Checking: One Step Forward in Wireless Sensor Networks Simulation
Published 2015-05-01“…The algorithm called 2CS-WSN is specifically designed to be used during the contention phase of IEEE 802.15.4. Discrete time Markov chains (DTMCs) have been proposed as modelling formalism and the well-known probabilistic symbolic model checker PRISM is used to check some correctness properties and different operating modes and, furthermore, to collect some performance measures. …”
Get full text
Article