摘要: 针对无线局域网中节点移动速度和方向的不确定性,在分析现有研究不足的基础上,提出了一种基于移动速度优先的快速切换机制。该机制通过资源的集中分配,将空闲信道信息通知需要切换的节点,避免了由于节点主动发起接入造成的接入冲突,实现了切换节点的快速调度,有效地改善了切换的服务质量。仿真显示,该机制将分组丢失率、切换失败率和切换时延分别提高了14%、14%和55%左右。
[1] Barolli L,Xhafa F.JXTA-OVERLAY:A P2P platform for distributed,collaborative and ubiquitous computing [J].IEEE Transactions on Industrial Electronics,2011,58(6):2163-2172 [2] Arnedo-Moreno J,Matsuo K,Barolli L,et al.Secure communication setup for a P2P based JXTA-Overlay platform [J].IEEE Transactions on Industrial Electronics,2011,58(6):2086-2096 [3] Choi B S,Lee J W,Lee J J,et al.A hierarchical algorithm for indoor mobile robots localization using RFID sensor fusion [J].IEEE Transactions on Industrial Electronics,2011,58(6):2226-2235 [4] Johnson D,Perkins C,Arkko J.Mobility Support in IPv6[S].IETF RFC 3775.June 2004 [5] Koodli R.Fast Handovers for Mobile IPv6 [S].IETF RFC4068.July 2005 [6] Soliman H,Castelluccia C,ElMalki K,et al.Hierarchical Mobile IPv6(HMIPv6) Mobility Management [S].IETF RFC 5380.Oct.2008 [7] Gundavelli S,Leung K,Devarapalli V,et al.Proxy Mobile IPv6[S].IETF RFC 5213.Aug.2008 [8] Yokota H,Chowdhury K,Koodli R,et al.Fast Handovers forProxy Mobile IPv6[S].IETF RFC 5949.Sept.2010 [9] Makaya C,Pierre S.An analytical framework for performance evaluation of IPv6-based mobility management protocols [J].IEEE Transactions on Wireless Communication,2008,7(3):972-983 [10] Lee J H,Han Y H,Gundavelli S,et al.A comparative perfor-mance ananlysis on Hierarchical Mobile IPv6and Proxy Mobile IPv6[J].Telecommunication Systems,2009,41(4):272-292 [11] Lee J H,Chung T M.How much do we gain by introducingroute optimization in Proxy Mobile IPv6Network? [J].Annals of Telecommunications,2010,65(5/6):233-246 [12] Hossain M S,Atiquzzaman M.Cost analysis of mobility protocols [J].Telecommunication Systems,2011,11(2):1-15 [13] Lee J H,Pack S,You I,et al.Cost analysis of IP mobility management protocols for consumer mobile devices [J].IEEE Transactions on Consume Electronics,2010,56(2):1010-1017 [14] Raghavendra R,Belding E M,Papagiannaki K,et al.Unwanted Link Layer Traffic in Large IEEE 802.11Wireless Networks [J].IEEE Transactions on Mobile Computing,2010,9(9):1212-1225 [15] Purushothaman R,Roy S.FastScan:a handoff scheme for voice over IEEE 802.11WLANs [J].Wireless Networks,2010,16(7):2049-2063 [16] Xu C Q,Teng J,Jia W J.Enabling faster and smoother handoffs in AP-dense 802.11wireless networks [J].Computer Communications,2010,33(15):1795-1803 [17] Shin S,Forte A G,Rawat A S,et al.Reducing MAC layer handoff latency in IEEE 802.11wireless LANs [C]∥Proceeding of the 2nd International Workshop on Mobility Management and Wireless Access Protocols.New York,USA,ACM CS-Press,2004:19-26 [18] Kim I,Kim Y T.Prediction-based smart channel scanning with minimized service disruption for IEEE 802.11e WLAN [J].IEEE Transactions on Consumer Electronics,2011,57(2):386-394 [19] Chatterjee S,Sarddar D,Saha J,et al.An Improved MobilityManagement Technique for IEEE 802.11based WLAN by Predicting the Direction of the Mobile Node [C]∥2012National Conference on Computing and Communication Systems,Piscataway.New Jersey,USA,IEEE Press,2012:1-5 [20] Lee S,Kim M,Kang S,et al.Smart Scanning for Mobile Devices in WLANs [C]∥2012IEEE International Conference on Communication.Piscataway,New Jersey,USA,IEEE Press,2012:4960-4964 [21] IEEE Computer Society.IEEE Standard for Information tech-nology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications [S].New York,USA,March 2012 [22] Phan T H,Lambertsen G,Yamada T.Seamless handover supported by parallel polling and dynamic multicast group in connected WLAN micro-cells system [J].Computer Communications,2012,35(1):89-99 [23] Yoo J,Luo H,Kim C K.Joint uplink/downlink opportunisticscheduling for Wi-Fi WLANs [J].Computer Communications,2008,31(14):3372-3383 [24] Yoo J,Kim C.On the hidden terminal problem in multi-rate ad hoc wireless networks [J].Lecture Notes in Computer Science,2005,3391:479-488 [25] Lee J H,Kim M,Koh B S.Adaptive authentication and registration key management scheme based on AAA architecture [J].Intelligent Automation and Soft Computing,2010,16(4):519-536 |
No related articles found! |
|