In wireless sensor networks, an improved throughput capacity region can be achieved by equipping multiple channels. However, such approach inevitably brings the issue of solving the coupled channel assignment and scheduling problem. This paper put forward a low-complexity distributed channel assignment and scheduling policy for multichannel wireless sensor networks with single-hop traffic flows, named LDCS, as well as its multihop multipath extension. Under the proposed algorithms, random access and backoff time techniques are introduced to keep the complexity low and independent of the number of links and channels. Through theoretical analysis and simulation experiments, it is proved that the proposed algorithms are throughput guaranteed, and in some network scenarios, the achieved capacity region can be larger than that of other comparable distributed algorithms.
In wireless networks, MAC scheduling methods can be divided into two types according to the implementation model: centralized and distributed scheduling. By reasonably designing MAC scheduling policies, both centralized and distributed schedulers can ensure a reliable throughput capacity region, i.e., realizing throughput-guaranteed. However, it can be found that some existing throughput-guaranteed scheduling schemes cannot further ensure bounded end-to-end average delay, and the reason for this phenomenon has not been deeply analyzed. In practical communication networks, throughput and delay are equally important. Based on this idea, the existing MAC scheduling strategies are investigated systematically in this paper from two aspects of throughput and delay, and their performances are evaluated and compared through both theoretical analysis and simulation experiments. The work of this paper provides a theoretical basis for the improvement of MAC scheduling technology in the next-generation wireless networks.
Cloud storage is an indispensable part of cloud computing solutions and the security of its stored data has become a key issue in the research and application of cloud storage systems. To solve this problem, this paper studies the anti-eavesdropping regenerating code technology for cloud storage systems, from the perspective of information theory. As opposed to the existing research ideas on regenerating code theory, that enable the system to obtain strong/weak security, this paper focuses on quantifying the relationship between security and system performance parameters, evaluating the system performance gains that can be obtained by appropriately reducing security, and designing regenerating code schemes with different information security levels to meet the personalized requirements of cloud storage customers. This paper puts forward a generalized matrix transposing method and applies it to the coding construction of fractional repetition codes. The scheme proposed in this paper will provide new ideas and methods for research on secure regenerating code technology in cloud storage systems.
Designing reasonable MAC scheduling strategies is an important means to ensure transmission quality in wireless sensor networks (WSNs). When there exist multiple available routes from the source to the destination, it is necessary to combine a data traffic allocation mechanism and design a multi-path MAC scheduling scheme in order to ensure QoS. This paper develops a multi-path resource allocation method for multi-channel wireless sensor networks, which uses random-access technology to complete MAC scheduling and selects the transmission path for each packet according to the probability. Through theoretical analysis and simulation experiments, it can be found that the proposed strategy can provide a reliable throughput capacity region. Meanwhile, due to the use of random-access technology, the computational complexity of the proposed algorithm can be independent of the number of links and channels.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.