Abstract:Wireless sensors are an irreplaceable link in the chain of global networking today. There is almost no area of human activity where they are still not used, and they will be used in the near future almost everywhere. Wireless sensor networks consist of a large number of sensor nodes that are arranged (usually randomly) in an area. The main problem is the limited power supply. Sensors are usually powered by the battery which is not possible to replace. The lifetime of the network depends on the duration of battery power of sensor nodes. The largest part of the consumed energy goes for communication with the rest of the network. Therefore, the selection of good routing protocol is essential for the long life-span of the network. There are a large number of proposed protocols and they can be divided into several groups, depending on the approach to the problem. In this paper we present a family of hierarchical protocols, their common features and specifi c implementation, we will present advantages and disadvantages as well as possible directions of further development.
Sažetak: U ovom radu urađen je kritički pregled algoritama za kontrolu pristupa u mobilnim bežičnim mrežama. Dat je i osvrt na metode adaptivnog upravljanja prihvatanjem zahteva u WCDMA mrežama, kao i pregled algoritama koji se koriste za ovu namenu. Izvršeno je njihovo poređenje i dati su odgovarajući komentari na osnovne karakteristike ovih algoritama. Pojašnjeni su OVSF kodovi i uticaj načina njihove raspodele na kapacitet sistema i verovatnoću blokiranja zahteva.
In this paper, three technologies intended to be implemented in Private Mobile Radio systems are analyzed and compared: TETRA (Terrestrial Trunked Radio), LTE (Long Term Evolution) and DMR (Digital Mobile Radio). Characteristics of these networks are collected and compared in one SWOT table. Based on this analysis, appropriate recommendations are made, which should be taken into account when choosing a specific solution for specific uses in Critical Communications systems.
Users today expect email and instant messaging access, surf, video games and other services through mobile broadband access networks. In order to support this increasing data traffi c, advanced resource management has to be implemented. As CAC (Call Admission Control) algorithm plays an important role in this resource management, comparing of two proposed call admission control algorithms has been done in this paper. Algorithms are tested in simulation environment, for two different periods of time. They showed expected characteristics in both 1000 and 10000 seconds periods, and newly proposed DG CAC algorithm showed better results than other algorithm, in number of handover requests, and in the way of returning resources to degraded connections.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.