نتایج جستجو برای: channel assignment
تعداد نتایج: 266391 فیلتر نتایج به سال:
In a wireless network, when a single channel is employed, hidden terminal and radio interference problems may occur. The two problems are the main factors that cause low network throughput. In fact, the hidden node problem results from radio interference. Up to the present, many researchers have used multi-channel schemes to solve the interference problem. However, amulti-channel system causes ...
Vector quantization is very efficient for data compression of speech and image. The channel distortions are introduced due to channel noise. Assigning suitable indices to codevectors can reduce distortion due to an imperfect channel. Several codebook index assignment algorithms were proposed. Unfortunately, no algorithm is always better than the others for any bit error rate due to these algori...
A multihop Dynamic Channel Assignment Scheme is proposed here for Multihop Cellular network. The proposed scheme splits the cell into microcell and macrocell to accept and complete the call as single hop, two hops, or three hops call. The radio resources are assigned to each call based on the interference information in the surrounding cells, stored in Interference Information Table at MSC. Two...
Equipping mesh nodes with multiple radios that support multiple wireless channels is considered a promising solution to overcome the capacity limitation of single-radio wireless mesh networks. However, careful and intelligent radio resource management is needed to take full advantage of the extra radios on themesh nodes. Flow-radio assignment and channel assignment procedures should obey the ph...
Hyancinth is one of the popular node architectures proposed by Ashish et al. for efficient channel assignment in multi-radio multi-channel(MRMC) wireless mesh network(WMN). However, we found out that Hyacinth was designed without considering the security mechanism. A fake channel control packet from an external attacker can degrade the network goodput. Also, an internal attacker e.g., compromis...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید