摘要:
A system and method for medium access control in a wireless communication network including the use of packets having a header and plural data portions, acknowledgement request features, corrupt packet identification, and adaptive duty cycling.
摘要:
A system and method for medium access control in a wireless communication network including the use of packets having a header and plural data portions, acknowledgement request features, corrupt packet identification, and adaptive duty cycling.
摘要:
An energy efficient radio having a clocking system utilizing two clocks with very different precision and power characteristics. In another aspect, the time that a radio spends on listening/receiving is optimized so that energy is not wasted when there is no need to keep receiving. In another aspect, to further improve the energy efficiency, two receive portions with drastic difference in power consumption, instead of a single receive portion as is used in a typical wireless receiver, and are used to process different parts of a received packet.
摘要:
An energy efficient radio having a clocking system utilizing two clocks with very different precision and power characteristics. In another aspect, the time that a radio spends on listening/receiving is optimized so that energy is not wasted when there is no need to keep receiving. In another aspect, to further improve the energy efficiency, two receive portions with drastic difference in power consumption, instead of a single receive portion as is used in a typical wireless receiver, and are used to process different parts of a received packet.
摘要:
Local clock modeling for a discrete event simulator is described. A local clock generator provides realistic clock characteristics in terms of clock precision and clock drift and clock mapping utilities provide API for other modules and/or protocols in the discrete event simulator to schedule events on local clocks instead of global clock of the simulator.
摘要:
Local clock modeling for a discrete event simulator is described. A local clock generator provides realistic clock characteristics in terms of clock precision and clock drift and clock mapping utilities provide API for other modules and/or protocols in the discrete event simulator to schedule events on local clocks instead of global clock of the simulator.
摘要:
The use of Protocol Enhancing Proxies (PEPs) and HAIPE encryption has traditionally been mutually exclusive. IP-layer encryption renders the upper layers, such as TCP, unavailable to the PEP. By integrating the IP layer encryption into the modem and using additive or multiplicative increase and decrease signals as bandwidth notification, signaling is provided across the cryptographic boundary to support the use of a bandwidth aware PEP in a network protected by IP-layer encryption.
摘要:
A method for establishing and maintaining a wireless ad hoc network comprising backbone nodes which forward packets through the network and non-backbone nodes which are capable of using the network, but do not forward packets. Signaling packets containing one or more protocol support records are periodically generated and transmitted by each node to neighboring nodes and are forwarded through the network by backbone nodes. Non-network nodes are initially selected to become backbone members during a SELECTION process based on an assessment of the node's connectivity relative to its neighbors. Link quality between nodes is monitored and used during an EXPANSION process in which additional non-network nodes may become backbone members. Disconnected backbone segments are interconnected during a CONNECTION process and the network is maintained during a MAINTENANCE process by periodically assessing the value of a backbone node's membership in the backbone. Efficient multicast routing is supported over the backbone by dynamically establishing and maintaining multicast trees. Signaling packets are periodically and frequently generated, thereby facilitating rapid adaptation to network changes. Further, the signaling packets are efficiently forwarded only by backbone nodes, thereby reducing bandwidth associated with establishing and maintaining the network.
摘要:
The use of Protocol Enhancing Proxies (PEPs) and HAIPE encryption has traditionally been mutually exclusive. IP-layer encryption renders the upper layers, such as TCP, unavailable to the PEP. By integrating the IP layer encryption into the modem and using additive or multiplicative increase and decrease signals as bandwidth notification, signaling is provided across the cryptographic boundary to support the use of a bandwidth aware PEP in a network protected by IP-layer encryption.
摘要:
An apparatus, a method, and a computer program product for effective communication routing of unicast and broadcast data traffic in wireless ad-hoc networks are presented. The routing technique separates the signaling and data transmission portions of a data frame such that the length of the signaling portion is independent of the length of the data portion. In the signaling portion, reservations are able to be performed and confirmed, while the data portion also includes a reservation confirmation portion which allows reservations made in during the signaling portion of the frame to be confirmed immediately prior to transmission of the data. In addition, the present invention also provides a mechanism for dynamically adjusting reservations.