Connectivity Probability of Wireless Ad Hoc Networks Definition, Evaluation, Comparison

合集下载

Mobile and Wireless Communications

Mobile and Wireless Communications

Mobile and Wireless Communications Mobile and wireless communications have become a ubiquitous part of our daily lives. From making phone calls to browsing the internet, these technologies have revolutionized the way we communicate and access information. However, as with any technology, there are both benefits and drawbacks to mobile and wireless communications. In this essay, I will explore these perspectives and provide my own insights on the topic. One of the main benefits of mobile and wireless communications is their convenience. With a smartphone or tablet, we can access the internet, send messages, and make phone calls from almost anywhere. This allows us to stay connected with friends, family, and colleagues, even when we are on the go. Additionally, mobile and wireless communications have made it easierfor people in remote or rural areas to access information and communicate with others, which can help to bridge the digital divide. Another benefit of mobile and wireless communications is their ability to enhance productivity. With the ability to access emails, documents, and other work-related materials from anywhere, employees can work more efficiently and effectively. This has led to an increase in remote work, which can be beneficial for both employees and employers. Additionally, mobile and wireless communications have made it easier for businesses to stay connected with customers and clients, which can help to improve customer service and loyalty. Despite these benefits, there are also drawbacks to mobile and wireless communications. One of the main concerns is the potential health risks associated with exposure to electromagnetic radiation. While the evidence on this topic is still inconclusive, some studies have suggested that long-term exposure to electromagnetic radiation may increase the risk of cancer and other health problems. Additionally, the constant use of mobile devices can lead to eye strain, headaches, and other physical symptoms. Another concern with mobile and wireless communications is the potential for privacy breaches. With the amount of personal information we store on our devices, there is a risk that this information could be accessed by hackers or other malicious actors. Additionally, the use of location tracking and other data collection techniques by companies can raise concerns about privacy and surveillance. In my opinion, the benefits of mobile and wireless communications outweigh the drawbacks. While there arecertainly risks associated with these technologies, the convenience and productivity benefits they provide are significant. However, it is important that we take steps to mitigate these risks and protect our privacy and health. This includes using protective cases for our devices, limiting our exposure to electromagnetic radiation, and being cautious about the information we share online. Overall, mobile and wireless communications have had a profound impact on the way we communicate and access information. While there are certainly concerns about their potential health risks and privacy breaches, the benefits they provide in terms of convenience and productivity cannot be ignored. As we continue to rely on these technologies in our daily lives, it is important that we remain vigilant and take steps to protect ourselves from potential risks.。

WiFi及WLAN基础知识(专业英语)[培训].doc

WiFi及WLAN基础知识(专业英语)[培训].doc

What is WLAN ?The term wireless means any technology which is used without anv hard wired connection, such as Bluetooth, GSM/GPRS, and 3G. Among all, the wireless technology broadly refers to the WLAN, as is “Wireless Local Area Network: which links more than two devices without entangling wires.The wireless network enables you to surf the internet anywhere in the house・ You can save both the cost of extra Ethernet cables and times to set up the network. All you n eed to do is in stall the adapter and upgrade your PC into the wireless n etwork; you can then enjoy the ben efit of it.What is Wi-Fi ?The Term “Wi・Fi”,as short for ”Wireless Fidelity”, is invented by the Wi・Fi Alliance, which is intended to improve the interoperability of wireless local area network products.“Wi・Fi” was originally referring to the Wi-Fi Alliance and the Wi-Fi Certification applicable only to 802.11b standard. Today it is broadly referring to any of the IEEE 802.11 WLAN Standards, including 802.11b, 802.11a, 802.11g, and the latest 802.11n standards. (See What are WLAN stan dards?)Wi-Fi Alliance and Wi-Fi CertifiedThe Wi-Fi Allia nee is a nonprofit inter national association to certify a set of interoperable WLAN products based on the IEEE802.11 standards・Manufacturers that are members of Wi-Fi Alliance and whose products pass the interoperability tests hold by the Wi-Fi Alliance will be approved as “Wi-Fi Certified" and can mark their products with the Wi-Fi logo. Meanwhile a user who carries a fl Wi-Fi Certified H product can use any brand of access point with any other brand of client hardware that also is certified.What are WLAN standards ?WLAN Standards is also known as the IEEE802.11 technologies developed by the IEEE (Institute of Electrical and Electronics Engineers, Inc), which specifies an over・the・air interface between the client and base station or two wireless clients. According to different encryption and data rate,IEEE802.11 technologies mainly consist of 802.11b, 802.11 a, 802.11g, and 802.11 n.802.11bThe 802.11b specification was the first widely accepted wireless networking standard. It operates in the 2.4 GHz ISM band, and has a maximum speed of 11Mbps within the range up to 50 meters.Since 802.11 b operates at the frequency of 2.4GHz as the comm on cha nnel freque ncy, it can be interfered with obstacles like microwave or cordless phones.802.11aCompared with 802.11b, the 802.11a specification operates at the frequency of 5 GHz, which can be less affective by other devices in the crowded 2.4GHz range. It speeds up to 54Mbps better than the 11 Mbps as 802.11 b, but performs within the range only up to 30 meters.802.11a is incompatible with both 802.11b/g as they operate on separate bands; except if using devices that provide dual band functionality.802.11gThe 802.11g specification operates at the frequency of 2.4GHz, the same as 802.11b. But compared with 11 Mbps for 802.11b3 802.1 1g offers transmission up to 54Mbp like 802.11a does.Since the 802.11b and 802.11g works at the same frequency, the equipment with both specifications is interoperable. The 802.11g is backward compatible with 802.11b so that devices with 802.11g specification also work with 802.11b.However, 802.11g and 802.11b both suffer from the same interfere nee of crowded 2.4 GHz band. The performance might be affective by other devices like microwave, Bluetooth devices, and cordless phones.802.11n (draft 2.0)802.11 n specification is the next generatio n of 802.11 Wi-Fi tech no logies. It is estimated to deliver at the maximum speed of 600Mbps, within range of 100 meters.802.11 n is backward compatible with 802.11 b/g standards as well as supports high-data rate tran smission applications like HD video or audio streaming, garni ng and more.Comparison for 802.11a/b/g/n•802.11a suffers less from sign al integrity and supports 54Mbps over a relatively short distance. •802.11 n performs up to 5 times faster and 2 times farther than 802.11g.How does 802.11 n work ? (About the MIMO Technology)Building on previous 802.11 standards, 802.11 n adds the MIMO technology. MIMO stands forc<Multi-lnput Multi-Outpuf and uses multiple transmitter and receiver antennas to improve the performs nee of radio communicati on systems.In MIMO there can be a separate RF chai n for each antenna allowing multiple chai ns to coexist, so the MIMO system can process more signals and accommodate more data as multiple radio signal are carried on the same frequency simultaneous!y・ These allow the wireless network to improve the speed and throughput as well as reduce the dead spots without additional bandwidth or transmit power.Is wireless network secure?One con sideration of the wireless n etwork is securit y. Some of the main tech no logies to preve nt attackers from home network are as following:1. WEPWEP is short for the Wired Equivalent Privacy and refers to a security protocol for WLAN defined in the 802.11 b standards・ It is designed to provide the same level of security similar to that provided by the physical security inherent in a wired LAN. WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another.Since WEP was an early encryption technique to secure Wireless connection, some of its weakness has been identified・ It was then superseded by Wi-Fi Protected Access (WPA) and 802.11i (also know as WPA2) for better security. In spite of its weakness, WEP is capable of a level of security to prevent casual snooping・ WEP is usually presented as the first security choice in most installation instructions.2. WPAWPA (Wi-Fi Protected Access), based on the IEEE802.11i draft 3, is wireless security greater protection than WEP. WPA serves as an intermediate solution between WEP and 802.11i networks, and hasbackward compatible WEP supports for older devices・WPA adds authentication to WEP's basic encryption. It operates in either WPA-PSK mode (aka Personal mode) or WPA-802.1x mode (aka Enterprise mode). The Personal mode uses a pre-shared key (PSK) for authentication with less security since every user is given the same passphrase, while the Enterprise mode uses an IEEE802.11x authentication server for better securit y.WPA uses Temporal Key Integrity Protocol (TKIP) mechanism. TKIP dynamically changes keys as the system is used. This is difficult for hackers to read messages so as to improve the security in the WPA over WEP.3. WPA2WPA2 is the following security protocol to WPA and backward interoperable with WPA. WPA2 operates based on the full IEEE802.11i specification.WPA2 provides support for all of the mechanisms available in WPA. Both offer a high level of assurance for end-users and network administrators that their data will remain private and access to their network restricted to authorized users. Both have the Personal and Enterprise mode of operation for the authentication.Compared with WPA, the enhanced WPA2 uses Advanced Encryption Standard (AES) in addition to TKIP. This provides a stronger encryption mechanism.http://www. azurewave, comFAQ AW-GA200Common ProblemQ: There is a message that says this device has been owned by “xxxx" and I cannot connect to it.A: On the advanced setting page of wireless audio utility, current user can lock the utility and reject the other users connecting to this device・ Hence, you cannot connect to AW-GA200.Q: What is my device9s default IP Address?A: The device's default IP address is 192.168.0.10.Q: What should I do if I forget all the default settings?A: You may reset to the default settings of AW-GA200 by pressing and holdi ng the reset butt on on the rear panel for 10 seconds then go to Setup Wizard to con figure again.Q: My Device has a wired connection to my network. Why can't I see the Device on my Device Utility?A: Restart the PC and try agairu Check all the cable cormections and power.Q: My device is wirelessly connected to my network, why can't I see the Device on my Device Utility?A: Restart the PC and try again. If it happens again, please return to the Setup Wizard again and make sure you con figure the Device properly or move your Device closer to your wireless access point and try again.Music AdapterQ: What kind of music format I can play with AW-GA200?A: You can use anything that plays on your PC.Q: I cannot hear the musicA: Please check Audio LED(Blue), make sure the blue LED is turned on and flashing.If blue LED is turned off, please check your wireless conn ectio n, and open the Azure Wave Wireless Audio Utility to connect to the AW-GA200. Please check your wireless audio utility, it will display device status, make sure you are the person connect to the device・If blue LED is turn on but not flashi ng, it means wireless audio conn ection is successful but NO audio stream is running. Please restart your PC audio player and play the audio.Q: Can I listen to music from more than one AW-GA200 at the same time?A: Yes, you can stream PC audio to multiple AW-GA200 devices.Warning: This feature only support AW-GA200 is working under “Client” mode. Due to AW-GA200 hardware limitation, when AW-GA200 work as Access Point and support this feature, it could be cause the sound break occasionally.Q: I hear some sound breaks occasionally, what can I do?A: This should not happen in normal cases, but could happen due to some wireless RF interference, especially if there are many wireless devices nearby, such as access points or routers, a microwave oven, Bluetooth device, cordless phone, etc. Keep your AW-GA200 away from these devices.If you are using an Intel Centrino based laptop or some old WLAN card/dongle, it may have a short period of suspending time for background seanning around every minute. It may also cause sound streaming break. Please contact your wireless adapter factory to download the latest driver of your WLAN card・This problem only exists on Intel old driver version.You can also change the power management setting of your wireless adapter from Max power saving to Max performanceQ: The music is coming from PUs speaker and not the speaker that connects to the AW-GA200.A: Please open the AzureWave Wireless Audio Utility to connect to the AW-GA200, and restart your PC audio player.Q: My Wireless Device has been detected and connected to the utility, but there is no music coming from the speaker.A: Check LED on front panel, make sure the wireless audio LED (blue one) is lighting up and flashing. If yes, please check following item・1 ・Check your audio cable connection.2」f cable connection is correct, please close, then re open the audio player3.Reboot the PC and try again.If wireless audio LED (blue one) is turn-off, please check your wireless network, make sure your PC is connecting to AW-GA200. If wireless audio LED (blue one) is lighting up but not flashing, please check your wireless audio utility, make sure you already connect to AW-GA200・Basic AP FunctionsQ: My device does not turn on. No LED's light up.A: Connect the power adapter to your AP and plug it into the power outlet.Note: Only use the power adapter provided with your AP. Using any other adapter may damage your AP.Q: LAN Connection Problems ■ I can't access my AP.A: Make sure your AP is powered on.Make sure that your computer has a compatible IP Address・ Be sure that the IP Address used on your computer is set to the same subnet as the AP・ For example, if the AP is set to 192.168.0.10, change the IP address of your computer to 192.168.0.15 or another unique IP Address that corresponds to the 192.168.0.X subnet. Use the Reset button located on the rear of the AP to revert to the default settings.Q: I can't connect to other computers on my LAN.A: Make sure that each computer has a unique IP Address・ And the IP must be in the same subnet as the AP. Make sure that the Link LED is on. If it is not, try a different network cable・ Check each computer for correct network settings・Wireless TroubleshootingQ: I can't access the Wireless AP from a wireless network cardA: Make sure that the Mode, SSID, Channel and Encryption settings are set the same on each wirelessadapter. Make sure that your computer is within range and free from any strong electrical devices that may cause interference. Check your IP Address to make sure that it is compatible with the Wireless AP.Q: I can't establish connection with Wireless AP with WPA2 encryption by using Windows Zero Configuration A: Update Windows XP with latest Wi-Fi Protect Access 2 (WPA2) through windows update, or alter natively search Microsoffs support site for latest copy of service pack or patch for WPA2.单词throughputn.牛产量,牛产能力,吞吐量\supersede[7sju:pE5si:d ]Vt.代替,取代,接替,紧接着…而到來,[律]延期。

无线网络第四章课后答案

无线网络第四章课后答案

第四章无线个域网课后答案填空题1、蓝牙技术一般用于10米之内的手机、PC、手持终端等设备之间的无线连接。

2、Zigebee是一种低能耗、低成本、较简单的射频通信标准(通常与蓝牙相比)。

3、定义个人域网的IEEE标准为802.15。

4、缩略语WPAN指的是无线个人局域网。

5、将自组织设备组成一个微微网的WPAN技术是蓝牙。

6、IEEE802.15标准的物理层是由蓝牙的无线电层提供的。

7、蓝牙标准中一个微微网可以连接8台处于活动模式的设备和255台处于休眠模式的设备。

8、多个蓝牙微微网连接成一个分布式网络。

9、无线USB使用超宽带UWB无线通信技术。

10、ZigBee联盟是为开发802.15.4标准而成立。

11、ZigBee的传输速率最高为250KB/s。

单选2、以下哪个RF通信标准可以将8台设备组织形成一个微微网?(A)A. 蓝牙B. IrDAC. UWBD. ZigBee3、以下哪个IEEE802标准定义了用于构建和管理个人域网的技术?( C )A.IEEE802.3B. IEEE802.11C. IEEE802.15D. IEEE802.164、以下哪个缩略语用于表示利用无线通信技术的PAN?(D)A. CPANB. PPANC. TPAND. WPAN5、以下哪一个为蓝牙的物理层?(A)A. 基带B. 广带C. 宽带D. 超宽带6、蓝牙用不足8台蓝牙设备构成的是什么自组织逻辑结构?(B)A. 微网B. 微微网C. 分布式网络D.超网7、当主设备的覆盖范围内有8台以上的蓝牙设备时,蓝牙构成的是什么自组织逻辑结构?( C)A. 多个微微网B. 多个分布式网络C. 组织成分布式网络的多个微微网D. 组织成微微网的多个分布式网络8、IEEE802.15.1标准中,FHSS系统的跳频速度是每秒(C)次A. 1200B. 1400C. 1600D. 1800多选1、蓝牙基带层定义哪些蓝牙设备的状态?(ABCD)A. 激活B. 呼吸C. 保持 D .休眠2、ZigBee定义了哪两种设备?(AC )A.完全功能设备B. 主设备C. 简化功能设备D. 从设备3、ZigBee物理层有哪几种速率标准?(ABC)A.250kb/sB.40kb/sC.20kb/sD.10kb/s判断题1、ZigBee主要用于传输高数据速率的通信。

HP Color LaserJet Enterprise MFP M776用户指南说明书

HP Color LaserJet Enterprise MFP M776用户指南说明书

Legal informationCopyright and License© Copyright 2019 HP Development Company, L.P.Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowedunder the copyright laws.The information contained herein is subject to change without notice.The only warranties for HP products and services are set forth in the express warranty statementsaccompanying such products and services. Nothing herein should be construed as constituting anadditional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.Edition 1, 10/2019Trademark CreditsAdobe®, Adobe Photoshop®, Acrobat®, and PostScript® are trademarks of Adobe Systems Incorporated.Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries.macOS is a trademark of Apple Inc., registered in the U.S. and other countries.AirPrint is a trademark of Apple Inc., registered in the U.S. and other countries.Google™ is a trademark of Google Inc.Microsoft®, Windows®, Windows® XP, and Windows Vista® are U.S. registered trademarks of MicrosoftCorporation.UNIX® is a registered trademark of The Open Group.iiiT able of contents1 Printer overview (1)Warning icons (1)Potential shock hazard (2)Printer views (2)Printer front view (2)Printer back view (4)Interface ports (4)Control-panel view (5)How to use the touchscreen control panel (7)Printer specifications (8)T echnical specifications (8)Supported operating systems (11)Mobile printing solutions (12)Printer dimensions (13)Power consumption, electrical specifications, and acoustic emissions (15)Operating-environment range (15)Printer hardware setup and software installation (16)2 Paper trays (17)Introduction (17)Load paper to Tray 1 (multipurpose tray) (17)Load Tray 1 (multipurpose tray) (18)Tray 1 paper orientation (19)Use alternative letterhead mode (24)Enable Alternative Letterhead Mode by using the printer control-panel menus (24)Load paper to Tray 2 (24)Load Tray 2 (24)Tray 2 paper orientation (26)Use alternative letterhead mode (29)Enable Alternative Letterhead Mode by using the printer control-panel menus (29)Load paper to the 550-sheet paper tray (30)Load paper to the 550-sheet paper tray (30)550-sheet paper tray paper orientation (32)Use alternative letterhead mode (35)Enable Alternative Letterhead Mode by using the printer control-panel menus (35)ivLoad paper to the 2 x 550-sheet paper trays (36)Load paper to the 2 x 550-sheet paper trays (36)2 x 550-sheet paper tray paper orientation (38)Use alternative letterhead mode (41)Enable Alternative Letterhead Mode by using the printer control-panel menus (41)Load paper to the 2,700-sheet high-capacity input paper trays (41)Load paper to the 2,700-sheet high-capacity input paper trays (41)2,700-sheet HCI paper tray paper orientation (43)Use alternative letterhead mode (45)Enable Alternative Letterhead Mode by using the printer control-panel menus (45)Load and print envelopes (46)Print envelopes (46)Envelope orientation (46)Load and print labels (47)Manually feed labels (47)Label orientation (48)3 Supplies, accessories, and parts (49)Order supplies, accessories, and parts (49)Ordering (49)Supplies and accessories (50)Maintenance/long-life consumables (51)Customer self-repair parts (51)Dynamic security (52)Configure the HP toner-cartridge-protection supply settings (53)Introduction (53)Enable or disable the Cartridge Policy feature (53)Use the printer control panel to enable the Cartridge Policy feature (54)Use the printer control panel to disable the Cartridge Policy feature (54)Use the HP Embedded Web Server (EWS) to enable the Cartridge Policy feature (54)Use the HP Embedded Web Server (EWS) to disable the Cartridge Policy feature (55)Troubleshoot Cartridge Policy control panel error messages (55)Enable or disable the Cartridge Protection feature (55)Use the printer control panel to enable the Cartridge Protection feature (56)Use the printer control panel to disable the Cartridge Protection feature (56)Use the HP Embedded Web Server (EWS) to enable the Cartridge Protection feature (56)Use the HP Embedded Web Server (EWS) to disable the Cartridge Protection feature (57)Troubleshoot Cartridge Protection control panel error messages (57)Replace the toner cartridges (58)T oner-cartridge information (58)Remove and replace the cartridges (59)Replace the imaging drums (62)Imaging drum information (62)Remove and replace the imaging drums (63)Replace the toner-collection unit (66)T oner-collection unit information (66)vRemove and replace the toner-collection unit (67)Replace the staple cartridge (M776zs model only) (70)Staple cartridge information (70)Remove and replace the staple cartridge (71)4 Print (73)Print tasks (Windows) (73)How to print (Windows) (73)Automatically print on both sides (Windows) (74)Manually print on both sides (Windows) (74)Print multiple pages per sheet (Windows) (75)Select the paper type (Windows) (75)Additional print tasks (76)Print tasks (macOS) (77)How to print (macOS) (77)Automatically print on both sides (macOS) (77)Manually print on both sides (macOS) (77)Print multiple pages per sheet (macOS) (78)Select the paper type (macOS) (78)Additional print tasks (79)Store print jobs on the printer to print later or print privately (79)Introduction (79)Create a stored job (Windows) (79)Create a stored job (macOS) (80)Print a stored job (81)Delete a stored job (81)Delete a job that is stored on the printer (81)Change the job storage limit (82)Information sent to printer for Job Accounting purposes (82)Mobile printing (82)Introduction (82)Wi-Fi, Wi-Fi Direct Print, NFC, and BLE printing (82)Enable wireless printing (83)Change the Wi-Fi Direct name (83)HP ePrint via email (83)AirPrint (84)Android embedded printing (85)Print from a USB flash drive (85)Enable the USB port for printing (85)Method one: Enable the USB port from the printer control panel (85)Method two: Enable the USB port from the HP Embedded Web Server (network-connectedprinters only) (85)Print USB documents (86)Print using high-speed USB 2.0 port (wired) (86)Method one: Enable the high-speed USB 2.0 port from the printer control panel menus (86)Method two: Enable the high-speed USB 2.0 port from the HP Embedded Web Server (network-connected printers only) (87)vi5 Copy (88)Make a copy (88)Copy on both sides (duplex) (90)Additional copy tasks (92)6 Scan (93)Set up Scan to Email (93)Introduction (93)Before you begin (93)Step one: Access the HP Embedded Web Server (EWS) (94)Step two: Configure the Network Identification settings (95)Step three: Configure the Send to Email feature (96)Method one: Basic configuration using the Email Setup Wizard (96)Method two: Advanced configuration using the Email Setup (100)Step four: Configure the Quick Sets (optional) (104)Step five: Set up Send to Email to use Office 365 Outlook (optional) (105)Introduction (105)Configure the outgoing email server (SMTP) to send an email from an Office 365 Outlookaccount (105)Set up Scan to Network Folder (108)Introduction (108)Before you begin (108)Step one: Access the HP Embedded Web Server (EWS) (108)Step two: Set up Scan to Network Folder (109)Method one: Use the Scan to Network Folder Wizard (109)Method two: Use Scan to Network Folder Setup (110)Step one: Begin the configuration (110)Step two: Configure the Scan to Network Folder settings (111)Step three: Complete the configuration (118)Set up Scan to SharePoint (118)Introduction (118)Before you begin (118)Step one: Access the HP Embedded Web Server (EWS) (118)Step two: Enable Scan to SharePoint and create a Scan to SharePoint Quick Set (119)Scan a file directly to a SharePoint site (121)Quick Set scan settings and options for Scan to SharePoint (122)Set up Scan to USB Drive (123)Introduction (124)Step one: Access the HP Embedded Web Server (EWS) (124)Step two: Enable Scan to USB Drive (124)Step three: Configure the Quick Sets (optional) (125)Default scan settings for Scan to USB Drive setup (126)Default file settings for Save to USB setup (126)Scan to email (127)Introduction (127)Scan to email (127)Scan to job storage (129)viiIntroduction (129)Scan to job storage on the printer (130)Print from job storage on the printer (132)Scan to network folder (132)Introduction (132)Scan to network folder (132)Scan to SharePoint (134)Introduction (134)Scan to SharePoint (134)Scan to USB drive (136)Introduction (136)Scan to USB drive (136)Use HP JetAdvantage business solutions (138)Additional scan tasks (138)7 Fax (140)Set up fax (140)Introduction (140)Set up fax by using the printer control panel (140)Change fax configurations (141)Fax dialing settings (141)General fax send settings (142)Fax receive settings (143)Send a fax (144)Additional fax tasks (146)8 Manage the printer (147)Advanced configuration with the HP Embedded Web Server (EWS) (147)Introduction (147)How to access the HP Embedded Web Server (EWS) (148)HP Embedded Web Server features (149)Information tab (149)General tab (149)Copy/Print tab (150)Scan/Digital Send tab (151)Fax tab (152)Supplies tab (153)Troubleshooting tab (153)Security tab (153)HP Web Services tab (154)Networking tab (154)Other Links list (156)Configure IP network settings (157)Printer sharing disclaimer (157)View or change network settings (157)Rename the printer on a network (157)viiiManually configure IPv4 TCP/IP parameters from the control panel (158)Manually configure IPv6 TCP/IP parameters from the control panel (158)Link speed and duplex settings (159)Printer security features (160)Introduction (160)Security statements (160)Assign an administrator password (160)Use the HP Embedded Web Server (EWS) to set the password (160)Provide user access credentials at the printer control panel (161)IP Security (161)Encryption support: HP High Performance Secure Hard Disks (161)Lock the formatter (161)Energy-conservation settings (161)Set the sleep timer and configure the printer to use 1 watt or less of power (161)Set the sleep schedule (162)Set the idle settings (162)HP Web Jetadmin (163)Software and firmware updates (163)9 Solve problems (164)Customer support (164)Control panel help system (165)Reset factory settings (165)Introduction (165)Method one: Reset factory settings from the printer control panel (165)Method two: Reset factory settings from the HP Embedded Web Server (network-connectedprinters only) (166)A “Cartridge is low” or “Cartridge is very low” message displays on the printer control panel (166)Change the “Very Low” settings (166)Change the “Very Low” settings at the control panel (166)For printers with fax capability (167)Order supplies (167)Printer does not pick up paper or misfeeds (167)Introduction (167)The printer does not pick up paper (167)The printer picks up multiple sheets of paper (171)The document feeder jams, skews, or picks up multiple sheets of paper (174)Clear paper jams (174)Introduction (174)Paper jam locations (174)Auto-navigation for clearing paper jams (175)Experiencing frequent or recurring paper jams? (175)Clear paper jams in the document feeder - 31.13.yz (176)Clear paper jams in Tray 1 (13.A1) (177)Clear paper jams in Tray 2 (13.A2) (182)Clear paper jams in the fuser (13.B9, 13.B2, 13.FF) (188)ixClear paper jams in the duplex area (13.D3) (194)Clear paper jams in the 550-sheet trays (13.A3, 13.A4) (199)Clear paper jams in the 2 x 550 paper trays (13.A4, 13.A5) (206)Clear paper jams in the 2,700-sheet high-capacity input paper trays (13.A3, 13.A4, 13.A5, 13.A7) (213)Resolving color print quality problems (220)Introduction (220)Troubleshoot print quality (221)Update the printer firmware (221)Print from a different software program (221)Check the paper-type setting for the print job (221)Check the paper type setting on the printer (221)Check the paper type setting (Windows) (221)Check the paper type setting (macOS) (222)Check toner-cartridge status (222)Step one: Print the Supplies Status Page (222)Step two: Check supplies status (222)Print a cleaning page (222)Visually inspect the toner cartridge or cartridges (223)Check paper and the printing environment (223)Step one: Use paper that meets HP specifications (223)Step two: Check the environment (223)Step three: Set the individual tray alignment (224)Try a different print driver (224)Troubleshoot color quality (225)Calibrate the printer to align the colors (225)Troubleshoot image defects (225)Improve copy image quality (233)Check the scanner glass for dirt and smudges (233)Calibrate the scanner (234)Check the paper settings (235)Check the paper selection options (235)Check the image-adjustment settings (235)Optimize copy quality for text or pictures (236)Edge-to-edge copying (236)Improve scan image quality (236)Check the scanner glass for dirt and smudges (237)Check the resolution settings (238)Check the color settings (238)Check the image-adjustment settings (239)Optimize scan quality for text or pictures (239)Check the output-quality settings (240)Improve fax image quality (240)Check the scanner glass for dirt and smudges (240)Check the send-fax resolution settings (242)Check the image-adjustment settings (242)Optimize fax quality for text or pictures (242)Check the error-correction setting (243)xSend to a different fax machine (243)Check the sender's fax machine (243)Solve wired network problems (244)Introduction (244)Poor physical connection (244)The computer is unable to communicate with the printer (244)The printer is using incorrect link and duplex settings for the network (245)New software programs might be causing compatibility problems (245)The computer or workstation might be set up incorrectly (245)The printer is disabled, or other network settings are incorrect (245)Solve wireless network problems (245)Introduction (245)Wireless connectivity checklist (245)The printer does not print after the wireless configuration completes (246)The printer does not print, and the computer has a third-party firewall installed (246)The wireless connection does not work after moving the wireless router or printer (247)Cannot connect more computers to the wireless printer (247)The wireless printer loses communication when connected to a VPN (247)The network does not appear in the wireless networks list (247)The wireless network is not functioning (247)Reduce interference on a wireless network (248)Solve fax problems (248)Checklist for solving fax problems (248)What type of phone line are you using? (249)Are you using a surge-protection device? (249)Are you using a phone company voice-messaging service or an answering machine? (249)Does your phone line have a call-waiting feature? (249)Check fax accessory status (249)General fax problems (250)The fax failed to send (250)No fax address book button displays (250)Not able to locate the Fax settings in HP Web Jetadmin (250)The header is appended to the top of the page when the overlay option is enabled (251)A mix of names and numbers is in the recipients box (251)A one-page fax prints as two pages (251)A document stops in the document feeder in the middle of faxing (251)The volume for sounds coming from the fax accessory is too high or too low (251)Index (252)xiPrinter overview1Review the location of features on the printer, the physical and technical specifications of the printer,and where to locate setup information.For video assistance, see /videos/LaserJet.The following information is correct at the time of publication. For current information, see /support/colorljM776MFP.For more information:HP's all-inclusive help for the printer includes the following information:●Install and configure●Learn and use●Solve problems●Download software and firmware updates●Join support forums●Find warranty and regulatory informationWarning iconsUse caution if you see a warning icon on your HP printer, as indicated in the icon definitions.●Caution: Electric shock●Caution: Hot surface●Caution: Keep body parts away from moving partsPrinter overview1●Caution: Sharp edge in close proximity●WarningPotential shock hazardReview this important safety information.●Read and understand these safety statements to avoid an electrical shock hazard.●Always follow basic safety precautions when using this product to reduce risk of injury from fire orelectric shock.●Read and understand all instructions in the user guide.●Observe all warnings and instructions marked on the product.●Use only a grounded electrical outlet when connecting the product to a power source. If you do notknow whether the outlet is grounded, check with a qualified electrician.●Do not touch the contacts on any of the sockets on the product. Replace damaged cordsimmediately.●Unplug this product from wall outlets before cleaning.●Do not install or use this product near water or when you are wet.●Install the product securely on a stable surface.●Install the product in a protected location where no one can step on or trip over the power cord.Printer viewsIdentify certain parts of the printer and the control panel.Printer front viewLocate features on the front of the printer.2Chapter 1 Printer overviewPrinter front view3Printer back viewLocate features on the back of the printer.Interface portsLocate the interface ports on the printer formatter. 4Chapter 1 Printer overviewControl-panel viewThe control panel provides access to the printer features and indicates the current status of the printer.NOTE:Tilt the control panel for easier viewing.The Home screen provides access to the printer features and indicates the current status of the printer.screens.NOTE:The features that appear on the Home screen can vary, depending on the printerconfiguration.Control-panel view5Figure 1-1Control-panel view?i 12:42 PM6Chapter 1 Printer overviewHow to use the touchscreen control panelPerform the following actions to use the printer touchscreen control panel.T ouchT ouch an item on the screen to select that item or open that menu. Also, when scrolling T ouch the Settings icon to open the Settings app.How to use the touchscreen control panel 7SwipeT ouch the screen and then move your finger horizontally to scroll the screen sideways.Swipe until the Settings app displays.Printer specificationsDetermine the specifications for your printer model.IMPORTANT:The following specifications are correct at the time of publication, but they are subject to change. For current information, see /support/colorljM776MFP .T echnical specificationsReview the printer technical specifications.Product numbers for each model ●M776dn - #T3U55A ●Flow M776z - #3WT91A ●Flow M776zs - #T3U56APaper handling specificationsPaper handling features Tray 1 (100-sheet capacity)Included Included Included Tray 2 (550-sheet capacity)IncludedIncludedIncluded8Chapter 1 Printer overview550-sheet paper trayOptional Included Not included NOTE:The M776dn models accept one optional550-sheet tray.Optional Included Included2 x 550-sheet paper tray and standNOTE:The M776dn models accept one optional550-sheet tray that may be installed on top of thestand.Optional Not included Not included2,700-sheet high-capacity input (HCI) paper trayand standNOTE:The M776dn models accept one optional550-sheet tray that may be installed on top of theoptional printer stand.Printer standOptional Not included Not included NOTE:The M776dn models accept one optional550-sheet tray that may be installed on top of theoptional printer stand.Inner finisher accessory Not included Not included Included Automatic duplex printing Included IncludedIncludedIncluded Included Included10/100/1000 Ethernet LAN connection with IPv4and IPv6Hi-Speed USB 2.0Included Included IncludedIncluded Included IncludedEasy-access USB port for printing from a USBflash drive or upgrading the firmwareIncluded Included Included Hardware Integration Pocket for connectingaccessory and third-party devicesHP Internal USB Ports Optional Optional OptionalOptional Optional OptionalHP Jetdirect 2900nw Print Server accessory forWi-Fi connectivity and an additional Ethernet portOptional IncludedIncludedHP Jetdirect 3100w accessory for Wi-Fi, BLE, NFC,and proximity badge readingPrints 45 pages per minute (ppm) on Letter-sizepaper and 46 ppm on A4-size paperEasy-access USB printing for printing from a USBIncluded Included Includedflash driveT echnical specifications9Included Included Included Store jobs in the printer memory to print later orprint privatelyScans 100 pages per minute (ppm) on A4 andIncluded Included Included letter-size paper one-sidedIncluded Included Included 200-page document feeder with dual-headscanning for single-pass duplex copying andscanningNot included Included Included HP EveryPage T echnologies including ultrasonicmulti-feed detectionNot included Included Included Embedded optical character recognition (OCR)provides the ability to convert printed pages intotext that can be edited or searched using acomputerIncluded Included Included SMART Label feature provides paper-edgedetection for automatic page croppingIncluded Included Included Automatic page orientation for pages that haveat least 100 characters of textIncluded Automatic tone adjustment sets contrast,Included Includedbrightness, and background removal for eachpageIncluded Included Includedfolders on a networkIncludedSend documents to SharePoint®Included IncludedIncluded Included Included NOTE:Memory reported on the configurationpage will change from 2.5 GB to 3 GB with theoptional 1 GB SODIMM installed.Mass storage: 500 GB hard disk drive Included Included IncludedSecurity: HP Trusted Platform Module (TPM)Included Included IncludedT ouchscreen control panel Included Included IncludedRetractable keyboard Not included Included Included 10Chapter 1 Printer overviewFax Optional Included IncludedSupported operating systemsUse the following information to ensure printer compatibility with your computer operating system.Linux: For information and print drivers for Linux, go to /go/linuxprinting.UNIX: For information and print drivers for UNIX®, go to /go/unixmodelscripts.The following information applies to the printer-specific Windows HP PCL 6 print drivers, HP print driversfor macOS, and to the software installer.Windows: Download HP Easy Start from /LaserJet to install the HP print driver. Or, go tothe printer-support website for this printer: /support/colorljM776MFP to download the printdriver or the software installer to install the HP print driver.macOS: Mac computers are supported with this printer. Download HP Easy Start either from /LaserJet or from the Printer Support page, and then use HP Easy Start to install the HP print driver.1.Go to /LaserJet.2.Follow the steps provided to download the printer software.Windows 7, 32-bit and 64-bit The “HP PCL 6” printer-specific print driver is installed for this operating system aspart of the software installation.Windows 8.1, 32-bit and 64-bit The “HP PCL-6” V4 printer-specific print driver is installed for this operating systemas part of the software installation.Windows 10, 32-bit and 64-bit The “HP PCL-6” V4 printer-specific print driver is installed for this operating systemas part of the software installation.Windows Server 2008 R2, SP 1, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2012, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2012 R2, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2016, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Windows Server 2019, 64-bit The PCL 6 printer-specific print driver is available for download from the printer-support website. Download the driver, and then use the Microsoft Add Printer tool toinstall it.Supported operating systems11macOS 10.13 High Sierra, macOS 10.14 MojaveDownload HP Easy Start from /LaserJet , and then use it to install the print driver.NOTE:Supported operating systems can change.NOTE:For a current list of supported operating systems and HP’s all-inclusive help for the printer, go to /support/colorljM776MFP .NOTE:For details on client and server operating systems and for HP UPD driver support for this printer, go to /go/upd . Under Additional information , click Specifications .●Internet connection●Dedicated USB 1.1 or 2.0 connection or a network connection● 2 GB of available hard-disk space ●1 GB RAM (32-bit) or2 GB RAM (64-bit)●Internet connection●Dedicated USB 1.1 or 2.0 connection or a network connection●1.5 GB of available hard-disk spaceNOTE:The Windows software installer installs the HP Smart Device Agent Base service. The file size is less than 100 kb. Its only function is to check for printers connected via USB hourly. No data is collected. If a USB printer is found, it then tries to locate a JetAdvantage Management Connector (JAMc) instance on the network. If a JAMc is found, the HP Smart Device Agent Base is securelyupgraded to a full Smart Device Agent from JAMc, which will then allow printed pages to be accounted for in a Managed Print Services (MPS) account. The driver-only web packs downloaded from for the printer and installed through the Add Printer wizard do not install this service.T o uninstall the service, open the Control Panel , select Programs or Programs and Features , and then select Add/Remove Programs or Uninstall a Programto remove the service. The file name isHPSmartDeviceAgentBase.Mobile printing solutionsHP offers multiple mobile printing solutions to enable easy printing to an HP printer from a laptop, tablet, smartphone, or other mobile device.T o see the full list and to determine the best choice, go to /go/MobilePrinting .NOTE:Update the printer firmware to ensure all mobile printing capabilities are supported.●Wi-Fi Direct (wireless models only, with HP Jetdirect 3100w BLE/NFC/Wireless accessory installed)●HP ePrint via email (Requires HP Web Services to be enabled and the printer to be registered with HP Connected)●HP Smart app ●Google Cloud Print12Chapter 1 Printer overview。

2023年度上半年信息系统监理师考试模拟真题含参考答案

2023年度上半年信息系统监理师考试模拟真题含参考答案

上半年信息系统监理师考试真题上半年信息系统监理师真题上午卷一、单项选择题1.微信是移动即时沟通工具之一,其觉察功能模块下扫一扫功能重要应用了智能标签(C) 技术。

(l) A.NFC B.RFID C.二维码D.条形码参照答案:C试题分析:(1)近场通信(Near Field Communication,NFC)是一种短距高频无线电技术,NFC 近场通信技术是由非接触式射频识别(RFID)及互联互通技术整合演化而来,在单一芯片上结合感应式读卡器、感应式卡片和点对点功能,能在短距离内与兼容设备进展识别和数据互换。

工作频率为 13.56MHz.但是使用这种手机支付方案顾客必要更换特制手机(2)射频识别,RFID(Radio Frequency Identification)技术,又称无线射频识别,是一种通信技术,可通过无线电讯号识别特定目的并读写有关数据,而无需识别系统与特定目的之间建立机械或光学接触。

(3)二维条码/二维码(2-dimensional bar code)是用某种特定几何图形按确定规律在平面(二维方向上)分布黑白相间图形记录数据符号信息;在代码编制上奇异地运用构成计算机内部规律根本“0”、“1”比特流概念,使用假设干个与二进制相相应几何形体来表达文字数2.风险小、安全牢靠,但人力和设备消耗较大、旧信息系统切换方式是(B)。

A.直接切换B.并行切换C.试点后直接切换D.渐渐切换参照答案:C试题分析:(1)近场通信(Near Field Communication,NFC)是一种短距高频无线电技术,NFC 近场通信技术是由非接触式射频识别(RFID)及互联互通技术整合演化而来,在单一芯片上结合感应式读卡器、感应式卡片和点对点功能,能在短距离内与兼容设备进展识别和数据互换。

工作频率为 13.56MHz.但是使用这种手机支付方案顾客必要更换特制手机(2)射频识别,RFID(Radio Frequency Identification)技术,又称无线射频识别,是一种通信技术,可通过无线电讯号识别特定目的并读写有关数据,而无需识别系统与特定目的之间建立机械或光学接触。

Data Forwarding

Data Forwarding

Data Forwarding in Mobile Social Networkswith Diverse Connectivity Characteristics Xiaomei Zhang and Guohong CaoDepartment of Computer Science and EngineeringThe Pennsylvania State University,University Park,PA,16802Email:{xqz5057,gcao }@Abstract —Mobile Social Network (MSN)with diverse con-nectivity characteristics is a combination of opportunistic net-work and mobile ad hoc network.Since the major difficulty of data forwarding is the opportunistic part,techniques designed for opportunistic networks are commonly used to forward data in MSNs.However,this may not be the best solution since they do not consider the ubiquitous existences of Transient Connected Components (TCCs),where nodes inside a TCC can reach each other by multi-hop wireless communications.In this paper,we first TCCs and analyze their properties based Then,we propose TCC-aware data forwarding strategies which exploit the special characteristics of TCCs to increase the contact opportunities and then improve the performance of data forwarding.Trace-driven simulations show that our TCC-aware data forwarding strategies outperform existing data forwarding strategies in terms of data delivery ratio and network overhead.I.I NTRODUCTIONIn Mobile Social Networks (MSNs),human-carried mo-bile devices opportunistically form wireless peer-to-peer connections with each other in the absence of the network infrastructure [1].Due to the unpredictable human mobility,it is hard to maintain end-to-end connections.As a result,“carry-and-forward”[2][3]is used,where mobile nodes physically “carry”the data,and forward the data when contacting a node with “higher”forwarding capability.Although most research assumes that MSNs are highly sparse,a close scrutiny on most current MSN traces reveals that the connectivity inside a network is diverse,and there are ubiquitous existences of Transient Connected Compo-nents (TCCs).Inside TCCs,nodes have transient contacts with each other and form a connected component.For example,students in a classroom have transient connections with each other,and vehicles on highways form platoons and have transient connections inside a platoon [4].An MSN with diverse connectivity characteristics is a combination of opportunistic network and mobile ad hoc network (MANET).Inside a TCC,a MANET is formed where nodes can reach each other by multi-hop wireless communications.Outside of TCC,nodes contact each oth-er opportunistically through “carry-and-forward”.Since theThis work was supported in part by Network Science CTA under grant W911NF-09-2-0053.ABCDE(a)(b)Figure 1.The left figure shows a TCC of five nodes.The right table shows their forwarding metrics.A line between two nodes means that they are within communication distance.major difficulty of data forwarding is the opportunistic part,techniques designed for opportunistic networks are commonly used to forward data in MSNs.However,this may not be the best solution since they do not consider the diverse connectivity characteristics of MSNs.For example,Figure 1(a)shows a TCC of five nodes and Figure 1(b)shows their forwarding metrics which represent the capability of forwarding data to other nodes (e.g.,node centrality [5]).Node A has the data which will be forwarded to the destination through “carry-and-forward”.Based on existing techniques,the data should be forwarded to a contacted node with higher forwarding metric.In this example,node A has two possible contacts:B and E (contacts are represented by lines).Since node B has lower forwarding metric (2.1)than A ’s (3.0),B will not get the data.E has higher forwarding metric (4.5)than A ,and thus A forwards the data to E .After E receives the data,its contact D ,which has higher forwarding metric (5.8),will get the data.D will not forward the data to its contact B which has a lower forwarding metric.Although C has a much higher forwarding metric (7.0)and much higher chance of reaching the destination,the data will not be forwarded to C since it is not the contact of D (i.e.,no line between them).However,since C and A are within the same TCC,it is better for them to exchange their forwarding metrics through multi-hop wireless communication,and then it will be possible for C to forward the data to the destination.In this paper,we address the problem of data forwarding in MSNs with diverse connectivity characteristics by propos-ing two TCC-aware data forwarding strategies.Since a TCCis a MANET,it is treated as one component and data carriers in this TCC are selected for opportunistic data forwarding. More specifically,the paper has two contributions.1)We identify the existence of TCCs and analyze theirproperties based onfive traces.Wefind that thereare significant number of TCCs in MSNs,and thedistributions of TCC size and node degree followexponential distribution.By treating multi-hop wire-less communications inside TCCs as indirect contacts,through theoretical analyses,we show that the contactopportunities can be significantly increased in alltraces.2)Wefirst propose a TCC-aware data forwarding strat-egy to exploit TCCs to improve the performance ofdata forwarding in MSNs.In our solution,nodes insidea TCC exchange their forwarding metrics throughmulti-hop wireless communications,and the node withthe highest forwarding metric is selected to get areplicated data copy.Although the TCC-aware dataforwarding strategy can increase the data deliveryratio,it increases the data copies in the network.Toaddress this problem,we enhance the TCC-aware dataforwarding by selecting an optimal set of nodes in theTCC to avoid overlap in their contacts and maximizethe data forwarding opportunity with a small numberof nodes.Trace-driven simulations show that our TCC-aware data forwarding strategies outperform existingdata forwarding strategies with less network overhead. The rest of the paper is organized as follows.In Section II, we identify the properties of TCCs based onfive traces.Sec-tion III presents our TCC-aware data forwarding strategies. In Section IV,we evaluate the performance of the TCC-aware data forwarding strategies.Section V reviews related work,and Section VI concludes the paper.II.T RACE-BASED TCC ANALYSISIn this section,we identify the existence of TCCs and analyze their properties based onfive realistic MSN traces.A.TracesWe study the properties of TCCs based onfive traces: Social Evolution[6],Friends&Family[7],Reality Min-ing[8],Infocom[9]and UCSD[10].These traces record contacts among users carrying different kinds of mobile devices.Thefirst three traces are collected by the MIT Reality group based on Bluetooth on smartphones.Among them,Social Evolution records the contacts among students in an undergraduate dormitory.Friends&Family records the contacts among members of a young-family residential community.Reality Mining tracks the contacts between indi-viduals in research labs.The trace of Infocom is collected in a conference environment by recording the contacts between conference attendants carrying imotes.In these four traces, mobile devices periodically detect their peers via Bluetooth interfaces.A contact is recorded when two mobile devices move into the detection range of each other.The UCSD trace is collected at a campus scale,where the devices are WiFi enabled PDAs.These devices search for nearby WiFi Access Points(APs),and a contact is detected when two devices detect the same AP.The details of thesefive traces are shown in Table1.B.Properties of the Contact GraphBased on the collected traces,we can draw contact graphs which consist of mobile devices(nodes)and their contacts (edges),with which we study the transient contact status between nodes.A contact graph can be drawn at each time point,i.e.,there is an edge between two nodes if they are contacting each other at that time point.Here,a contact graph is drawn every10minutes in the traces.The extracted contact graphs have some interesting prop-erties,and one of them is related to the distribution of the node degree.The Complementary Cumulative Distribution Function(CCDF)of the node degree P(K>k),which represents the probability that a node has more than k contacts with other nodes,follows exponential distribution for k≥1:P(K>k)=e−kk∗=1when k=0,we have the following:P(K>k)=e−kTable IT RACE S UMMARYSocial Evolution Friends&Family Reality Mining Infocom UCSD DeviceNetwork typeNumber of devicesNumber of contactsStart DateDurations(days)Granularity(secs)(a)Social Evolution(k∗=1.70)(b)Friends&Family(k∗=1.14)(c)Reality Mining(k∗=1.55)(d)Infocom(k∗=4.31)(e)UCSD(k∗=2.36)Figure2.The distribution of node degree can be approximated by exponential distribution.k∗is the exponential constant. contact graph.The GCC is commonly used to represent theoverall connectivity of the network[12],and the propertyof the GCC is closely related to the degree distribution[13][14][15].Based on[15],in a random graph with ex-ponential degree distribution,if the exponential constant k∗is larger than1,there exists a GCC with size that scaleslinearly with the size of graph.With the increase of k∗,thesize of the GCC also increases.Since k∗in all traces islarger than1as shown in Figure2,we can expect that thereare large GCCs inside these contact graphs.Figure3uses boxplot to show the size of the largest TCC as a proportion of the network size,where the largest TCC is detected every10minutes.Here,the network size is the number of nodes that are in contact with some nodes in the trace.Other nodes may turn off their devices or contact nodes that are not included in the trace,and these nodes are not included in our analysis.The results in Figure3 are consistent with our conclusion that a larger exponential constant k∗leads to a larger GCC.For example,the Family &Friends trace has the smallest GCC,because k∗is only slightly larger than1.For the trace of Infocom,k∗is larger than4and thus most nodes belong to the GCC.Even though the size of GCC implies the overall con-nectivity of the network,it is not enough to characterize the complete TCC structure.Therefore,we are also interested in the distribution of the TCC size.Figure4plots the distribu-tion of the TCC size.Similar to the degree distribution,the TCC size distribution also follows exponential distribution. The CCDF of the TCC size P(S>s)is exponential for Figure3.The boxplot of the largest TCC size as a proportion of the network size.The middle line inside the box represents the median.The lower and upper edges of the box represents the25th and75th percentiles, respectively.s≥2:P(S>s)= e−s(a)Social Evolution(s∗=5.25)(b)Friends&Family(s∗=1.52)(c)Reality Mining(s∗=3.13)(d)Infocom(s∗=2.86)(e)UCSD(s∗=4.09)Figure4.The distribution of TCC size can be well approximated by exponential distribution for most of the traces.s∗is the exponential constant. nodes are within a TCC,they have TCC-contact,which canbe direct contact or indirect contact.Direct contacts arecontacts between two nodes within one-hop communicationdistance,and indirect contacts are contacts between nodeswithin the same TCC but multi-hop away.Next,we analyzewhether and how contact opportunities are increased byconsidering TCC-contacts.Wefind that the increase ofcontact opportunities is related to the distributions of nodedegree and TCC size.Specifically,we have the followingtheorem:Theorem1.For a contact graph,the contact opportunitiescan be increased by considering TCC-contacts,if the fol-lowing two conditions are satisfied:1)The distribution of node degree and the distributionof TCC size both follow exponential distributions withexponential constants k∗and s∗respectively.(Equa-tions(1)and(2))2)k∗<ˆk∗,whereˆk∗is a function of s∗:ˆk∗=1s∗+(1−e−13e−1s∗)3(3)The proof of Theorem1can be found in Appendix A.In the proof,we also compute the ratio of TCC-contacts todirect contacts,which can be determined by two exponentialconstants k∗and s∗:m tk∗)·e−1s∗)3 s∗+(1−e−1m din Equation(4)(i.e.,Est.m tm d)and the results are shown in Table II.As can be seen,k∗is smaller thanˆk∗in all traces,which indicates that the contact opportunities are increased in all these traces.We alsofind that the error of the estimated m tm dis8.86,which indicates that the contact opportunities are also significantly increased in the Infocom trace.Table IITCC-CONTACTS&D IRECT C ONTACTSk∗s∗ˆk∗Est.m tm d Social EvolutionFriends&FamilyReality MiningUCSDE.Durations of TCC-contactsBecause TCCs are formed when nodes have direct con-tacts with each other,the duration of the TCC-contact is smaller than the duration of direct contact.The comparisons between the durations of TCC-contacts and direct contacts infive traces are shown in Figure5.As shown in thefigure, even though TCC-contacts have smaller durations than direct contacts,the median durations for TCC-contacts are still several minutes.Therefore,by considering both direct and indirect contacts inside TCCs,contact opportunities are increased and the contact durations are still pretty long. This property can be exploited to design more efficient data forwarding strategies,as shown in the next section.III.TCC-AWARE D ATA F ORWARDING S TRATEGIES Data forwarding in MSNs is difficult due to the oppor-tunistic nature of the network.Being aware of the existence of TCCs,we propose better data forwarding strategies by utilizing the contact opportunities in TCCs.Inside a TCC, nodes can reach each other by multi-hop wireless com-munications,which will significantly increase the contact opportunities and increase the chance of forwarding data to the destination.In this section,wefirst present ourFigure5.The durations of direct contacts and TCC-contacts. TCC-aware data forwarding strategy and then improve itsperformance with an enhanced version.A.TCC-Aware Data Forwarding StrategyThe objective of the TCC-aware data forwarding strategy is to utilize TCCs to improve the performance of data forwarding in MSNs.1)Identifying the TCC:To utilize TCCs,thefirst step is to identify the TCCs.A node can detect the nodes in the current TCC by broadcasting inside the TCC,and each node receiving the broadcast sends an acknowledgement.In order to know what data items are being forwarded in the current TCC,the node receiving the broadcast message replies with an acknowledgement that carries the information about the data items in its buffer.By collecting acknowledgements from other nodes in the TCC,the original sender can identify the nodes and the forwarded data in its current TCC.2)Forwarding Strategy:For each data item created in the network,we intend to forward it from the source to the destination within the time constraint T.In the process of forwarding,data can be replicated and forwarded to other nodes in accordance with specific strategies.The forwarding is successful as long as one data copy of this data item arrives at the destination.Strategies designed for opportunistic networks are com-monly used to forward data in MSNs.These data forwarding strategies are normally based on social-aware forwarding metrics such as centrality[3][16][5],which quantify mobile node’s capability of contacting others in the network.When a node carrying data contacts another node,the data packet is forwarded based on Compare-and-Forward[3][2];i.e.,the data carrier forwards the data if and only if the contacted node has a higher centrality and does not have this data.The original data carrier also keeps a copy after forwarding the data.In our TCC-aware data forwarding strategy,a similar method is used.However,the data forwarding decisions are not limited to these two contacted nodes,but among all nodes in the TCC.A TCC can be formed by merging two existing TCCs or by adding new nodes to existing TCCs.For example,nodes A and B are originally from two different TCCs before they contact.After A contacts B,the two TCCs are merged to a new TCC.1:M A←the set of nodes in A’s original TCC2:M B←the set of nodes in B’s original TCC3:if M A=M B then4:Do NOTHING/*A,B are already in the same TCC*/ 5:else/*Forwarding decision inside the TCC will be made centrally at a command node C,which is chosen from A,B.*/6:if|M A|≤|M B|then7:C←B8:else9:C←A10:end if/*C will identify the nodes inside the new TCC and the data items carried by them,and make the forwarding decision.*/ 11:M←M A M B12:D←the set of unique data items in the new TCC13:for each data item d∈D do14:if M includes d’s destination then15:d is forwarded to d’s destination16:Go to next data item17:end if18:H d←node with the highest centrality19:if H d has the data then20:Do NOTHING and go to the next data item21:else22:d is forwarded to H d23:end if24:end for25:end ifBCA(a)(b)Figure6.The leftfigure shows a TCC of three nodes.The right table shows their contact probabilities with all other nodes in the network.The network has7nodes.3)The Algorithm:The whole process of the TCC-aware data forwarding strategy is outlined in Algorithm1.When two nodes contact,theyfirst check if they belong to the same TCC(Lines3∼5).If so,the data packet has already been forwarded in the TCC.If not,a new TCC is formed,and the data items will be forwarded inside the new TCC. The forwarding decision inside this TCC is made centrally at a node,denoted as“command”node,which is chosen from the two nodes in contact.The node that has more nodes in its original TCC will be the command node(Lines 6∼10).Then,the command node checks all the nodes and their carried data items in the new TCC and makes the forwarding decisions(Lines11∼24).Specifically,for each data item that exists in the TCC,if its destination is inside this TCC,it is directly forwarded to the destination(Lines 14∼17).Otherwise,the command node checks if the node with the highest centrality has the data.If the node has the data,nothing needs to be done.Otherwise,one data copy is created and forwarded to the node with the highest centrality (Lines18∼23).B.Enhanced TCC-aware Data Forwarding Strategy1)Motivation:In the TCC-aware data forwarding strate-gy,the node with the highest centrality in the TCC gets one data copy and the original data carriers also keep their data copies.However,this may not be the best option in many cases.For example,Figure6(a)shows a TCC of three nodes and Figure6(b)lists each node’s contact probability with others in the network.If the centrality metric is based on the Cumulative Contacting Probability(CCP)[5],the CCP of node A is1+1+0.7+0.6+0.3+0.2=3.8,the CCP of node B is1+1+0.1+0.1+0.6+0.5=3.3,and the CCP of node C is1+1+0.5+0.6+0.1+0.1=3.3.If C originally carries the data,A will receive one data copy since it has the highest centrality.However,nodes A and C have similar contact probabilities to other nodes B,D, E,F and G;i.e.,they both have high contact probabilities with B,D and E,and low contact probabilities with F and G.Thus,keeping data copies at A and C may not help too much since their contact capabilities to other nodes have a large“overlap”.To deal with this problem,it is better to choose A and B as data carriers,because B has high contact probabilities to F and G,which is complement to A.Even though B and C have the same CCP centrality,using A and B as data carriers is better than using A and C.Thus,we propose an enhanced TCC-aware data forwarding strategy,where data carriers are selected to maximize the data forwarding opportunity.Different from the previous TCC-aware data forwarding strategy,which selects the highest centrality node as the data carrier,we select a set of nodes as data carriers which can maximize the data forwarding opportunity.2)Set Centrality:Wefirst define the concept of set centrality to quantify the data forwarding capability of a set of nodes.Given that a data item is created at time0,and expires at time T,the set centrality of a node set S at time t is defined as follows:Definition1.The set centrality of a node set S at time t<T is defined as the summation of their overall probability to contact each of the remaining nodes in N\S before time T.C S(t)= i∈N\S(1− j∈S(1−p ji(T−t)))(5)where N is the set of nodes in the network,and p ji(T−t) is the probability that node j will contact node i within time T−t.Assume symmetric contacts between nodes i and j,and then we have p ij(T−t)=p ji(T−t).Since the inter-contact time between node i and node j has been experimentally validated in[5]to follow an exponential distribution with rate parameterλij,the probability that the two nodes will contact before T can be calculated as:p ij(T−t)=p ji(T−t)=1−e−λij(T−t)(6) 3)Selecting the Optimal Set of Data Carriers:We as-sume that there are k data copies carried by nodes in a TCC(denoted as M),where k<|M|.Our objective is to choose an optimal node set S∗of size k with the highest set centrality,where S∗⊂M.Nodes in the optimal node set S∗will be the new data carriers for the k data copies. The detection of the optimal node set S∗can be formalized as an optimization problem:max i∈N(1−x i)(1− j∈N(1−x j·p ji(T−t)))(7) s.t.x i∈{0,1},∀i∈M(8)x i=0,∀i∈N\M(9)i∈M x i=k(10)where x i∈{0,1}indicates whether the node i is selected to the optimal node set S∗.Formula(7)maximizes the set centrality of the selected nodes.Since S∗is selected1:M A←the set of nodes in A’s original TCC2:M B←the set of nodes in B’s original TCC3:if M A=M B then4:Do NOTHING/*A,B are already in the same TCC*/ 5:else/*Forwarding decision inside the TCC will be made centrally at a command node C,which is chosen from A,B.*/6:if|M A|≤|M B|then7:C←B8:else9:C←A10:end if/*C will identify the nodes inside the new TCC and the data items carried by them,and make the forwarding decision.*/ 11:M←M A M B12:D←the set of unique data items in the new TCC13:for each data item d∈D do14:if M includes d’s destination then15:d is forwarded to d’s destination16:Go to next data item17:end if18:k d←number of copies of d in M19:H d←node with the highest centrality20:if H d does not have d then21:k d←k d+1/*Add one extra data copy*/ 22:end if23:S∗←the optimal set of k d nodes/*Decide S∗as discussed in Section III-B3.*//*Nodes in S∗will be new carries of data item d.*/ 24:Data are forwarded from old carriers to nodes in S∗25:end for26:end if(a)Social Evolution (b)Friends &Family(c)Reality Mining (d)Infocom(e)UCSDFigure 7.Comparisons based on data delivery ratio under different time constraints.(a)Social Evolution(b)Friends &Family (c)Reality Mining (d)Infocom (e)UCSDFigure 8.Comparisons based on the number of data copies (overhead)created under different time constraints.simulation results in detail by first comparing our TCC-aware data forwarding strategies with Compare-and-Forward and R3,and then comparing these two TCC-aware data forwarding strategies.1)Comparisons with Compare-and-Forward:As shown in Figure 7and Figure 8,both TCC and Enhanced TCC have better performance than Compare-and-Forward,with higher data delivery ratio and lower network overhead.Specif-ically,the TCC-aware data forwarding strategies achieve 10%−40%higher delivery ratio than Compare-and-Forward in all five traces.This is because by utilizing the contact opportunities inside TCCs,nodes have higher probabilities to forward data to the destination.Moreover,the TCC-aware data forwarding strategies consume 15%−50%less network overhead than Compare-and-Forward.The decrease in network overhead is because there is at most one data copy created when a new TCC is formed.However,in Compare-and-Forward,data copies can be created upon every contact.These results demonstrate the effectiveness of TCC-aware data forwarding strategies when compared with strategies designed for opportunistic networks.2)Comparisons with R3:To compare with R3[20],we set the number of data copies (paths)to be 5(R3-5copies)in R3.As shown in Figure 7,the data delivery ratio for R3with 5copies is about 50%less than that of TCC and Enhanced TCC.We also test R3with 10copies and 20copies,and find that the delivery ratio does not increase much as the number of data copies increases.This observation is consistent with the results in [20],which also found that the performance does not increase much as the number of data copies is larger.The reason for R3’s low delivery ratio is that R3is based on source routing,andsource routing is extremely time-consuming when utilized in networks with opportunistic feature.MSNs with diverse connectivity characteristics have the opportunistic feature,because nodes contact opportunistically outside of TCCs.3)Comparisons between the TCC-aware data forwarding strategies:From Figure 7and Figure 8,we can also see that Enhanced TCC consumes less overhead than TCC but achieves similar delivery ratio.This is because,in the enhanced strategy,data copies can be forwarded from the original data carriers to a set of nodes with the highest set centrality;i.e.,more effective nodes are selected as data carriers.By choosing a small number of effective nodes to carry data,the enhanced strategy requires less data carriers than the original strategy.Therefore,the number of data copies can be decreased with Enhanced TCC.V.R ELATED W ORKData forwarding algorithms designed for opportunistic networks are commonly used to forward data in MSNs,and most of them are based on Epidemic [19],where data is flooded upon contacts with other ter solutions attempt to reduce the number of data copies created by Epidemic,and these strategies are known as controlled flood-ing [21].For example,Compare-and-Forward is commonly used to control the data copies created,and the data carrier only forwards data to another node with higher forwarding metric.The forwarding metric measures node’s capability of forwarding data to the destination.In some research,the forwarding metrics are determined based on node’s contact probability with the destination,such as PROPHET [2]and MaxProp [22].By further aggregating the networks to social graphs [23],social properties of mobile nodes are analyzed.Based on this,node centrality[16][18][24]or community based solutions[25][26][27][28]are used as forwarding met-rics.However,these strategies are designed for opportunistic networks,and they are not the best solutions for MSNs with diverse connectivity characteristics,since they neglect the multi-hop communication opportunities inside TCCs.Phe-Neau et al.considered the multi-hop communication opportunities around a node’s vicinity in[29].However, in their approach,multi-hop communication opportunities around a node are only utilized when the destination of the data is within the node’s vicinity,which is basically a W AIT strategy and then it does not contain mechanisms to make the data reach more nodes and get closer to the destination. The work by Tie et al.[20]considered data forwarding in networks with diverse connectivity characteristics;however, their solution is different from ours and they do not consider the effects of TCCs.They identified packet replication to be the key difference between protocols designed for well-connected networks and sparsely-connected networks,and designed a routing protocol called R3,which determines the number of data copies to be created based on the predicted delays along network paths.R3is based on source routing;i.e.,data copies are forwarded along the pre-determined forwarding path.However,protocols based on source routing are not suitable for networks with opportunistic features, because it is extremely time-consuming to forward data along the pre-determined paths.Moreover,R3does not consider the effects of TCCs on data forwarding,which is the key contribution of our work.Other existing algorithms try to modify well-known MANET protocols to make them more adaptive to net-works with diverse connectivity characteristics.For example, Raffelsberger et al.[30]integrated store-and-forward to MANET protocols.In MANET protocols,a data item is dropped when the routing table does not contain an entry for the destination.With store-and-forward,data is buffered until a route to the destination can be found using MANET protocols.However,their solution lacks a mechanism to choose effective data carriers to deliver data to destination. There exists some work on analyzing TCCs.For ex-ample,[31]demonstrated the size of the giant connected components changes over time.[13][14][15]proved that the property of connected component is closely related with the distribution of node degree.However,they did not examine the detailed structure of TCCs using real traces, and did not consider how to use them to increase the contact opportunities and improve the performance of data forwarding,which is the focus of our work.VI.C ONCLUSIONSIn this paper,we designed efficient data forwarding s-trategies for MSNs with diverse connectivity characteristics, by exploiting the existence of TCCs.Wefirst identified the existence of TCCs and analyzed their properties based on five traces.By treating multi-hop wireless communications inside TCCs as indirect contacts,through theoretical analy-ses,we showed that the contact opportunities can be signifi-cantly increased in all traces.Based on this observation,we designed a TCC-aware data forwarding strategy to improve the performance of data forwarding in MSNs.Then,we enhanced the TCC-aware data forwarding by selecting an optimal set of nodes in the TCC to avoid overlap in their contacts and maximize the data forwarding opportunity with a small number of nodes.Trace-driven simulations showed that our TCC-aware data forwarding strategies outperform existing data forwarding strategies with less network over-head.R EFERENCES[1]S.Ioannidis,A.Chaintreau,and L.Massouli´e,“Optimal and scalabledistribution of content updates over a mobile social network,”in INFOCOM2009,IEEE.IEEE,2009,pp.1422–1430.[2] A.Lindgren, A.Doria,and O.Schel´e n,“Probabilistic routing inintermittently connected networks,”ACM SIGMOBILE CCR,vol.7, no.3,pp.19–20,2003.[3] E.Daly and M.Haahr,“Social network analysis for routing indisconnected delay-tolerant manets,”in Proc.ACM MobiHoc.ACM, 2007,pp.32–40.[4]Y.Zhang and G.Cao,“V-pada:Vehicle-platoon-aware data access invanets,”Vehicular Technology,IEEE Transactions on,vol.60,no.5, pp.2326–2339,2011.[5]W.Gao,Q.Li,B.Zhao,and G.Cao,“Multicasting in delay tolerantnetworks:a social network perspective,”in Pro ACM MobiHoc.ACM,2009,pp.299–308.[6] A.Madan,M.Cebrian,S.Moturu,K.Farrahi,and A.Pentland,“Sensing the health state of a community,”Pervasive Computing, vol.11,no.4,pp.36–45,2012.[7]N.Aharony,W.Pan, C.Ip,I.Khayal,and A.Pentland,“Socialfmri:Investigating and shaping social mechanisms in the real world,”Pervasive and Mobile Computing,vol.7,no.6,pp.643–659,2011.[8]N.Eagle and A.Pentland,“Reality mining:sensing complex socialsystems,”Personal and Ubiquitous Computing,vol.10,no.4,pp.255–268,2006.[9] A.Chaintreau,P.Hui,J.Crowcroft,C.Diot,R.Gass,and J.Scott,“Impact of human mobility on opportunistic forwarding algorithms,”Mobile Computing,IEEE Transactions on,vol.6,no.6,pp.606–620, 2007.[10]M.McNett and G.V oelker,“Access and mobility of wireless pdausers,”ACM SIGMOBILE CCR,vol.9,no.2,pp.40–55,2005. [11]˚A.Bj¨o rck,Numerical methods for least squares problems.Siam,1996.[12]T.Spyropoulos,K.Psounis,and C.Raghavendra,“Spray and wait:an efficient routing scheme for intermittently connected mobile net-works,”in Proceedings of the2005ACM SIGCOMM workshop on Delay-tolerant networking.ACM,2005,pp.252–259.[13]M.Molloy and B.Reed,“The size of the giant component of a randomgraph with a given degree sequence,”Combinatorics probability and computing,vol.7,no.3,pp.295–305,1998.[14]W.Aiello,F.Chung,and L.Lu,“A random graph model for powerlaw graphs,”Experimental Mathematics,vol.10,no.1,pp.53–66, 2001.[15]M. E.J.Newman,“2random graphs as models of networks,”Handbook of graphs and networks,p.35,2003.[16]P.Hui,J.Crowcroft,and E.Yoneki,“Bubble rap:Social-basedforwarding in delay-tolerant networks,”IEEE Transactions on Mobile Computing,vol.10,no.11,pp.1576–1589,2011.。

LINKSYS WPC55AG 说明书

LINKSYS WPC55AG 说明书

Universal wireless connectivity for your notebook computer—high-speed networking without wires!Universal wireless adapter con-nects your notebook PC to Wireless-A (802.11a), Wireless-B (802.11b), or Wireless-G (802.11g) networksWirelessProtects your wire-less communica-tions with up to 152-bit encryptionIncredible data rates up to 54Mbps in Wireless-G and A modesAlso downward compatible with popular 11Mbps Wireless-B networksThe Linksys Dual-Band Wireless A+G Notebook Adapter lets your notebook communicate with all three wireless network standards. With one PC Card, you can connect to Wire-less-A (802.11a), Wireless-G (802.11g) and Wireless-B (802.11b) networks.Wireless-B networks have a data rate of 11Mbps, and are commonly found in corporate environments and in homes for household Internet connectivity without the need for running cables. They’re also popping up all over the coun-try in coffee shops, airports, hotels, convention centers, and other public spaces offering “on the go” connectivity to mobile users.In high speed or heavy usage environments, Wireless-B is quickly being replaced by a new standard, Wireless-G, which uses the same 2.4GHz radio band, but at 54Mbps, is almost five times faster. The third wireless network standard is Wireless-A, which also runs at 54Mbps, but operates in the less-crowded 5GHz radio band. Wireless-A is mostly used in corporate installations.Whichever standard you encounter, the Dual-Band Wire-less A+G Notebook Adapter is ready to connect. And it's simple to use. Just pop it into a PC Card slot and run the included Setup Wizard which will walk you through the con-figuration. All wireless communications can be protected by up to 152-bit encryption, so your data stays secure.Join the wireless revolution. With the Linksys Dual-Band Wire-less A+G Notebook Adapter, you'll be ready to connect to all three types of wireless networks, wherever you go, now and in the future.Model Number Product DataModel No.Features•Connects to either 2.4GHz (802.11b or 802.11g) or 5GHz (802.11a) networks without changing adapters •Advanced security features with Wi-Fi Protected Access TM (WPA) and up to 152-Bit WEP encryption •Easy-to-use Setup Wizard •Detailed monitoring and per-formance utility •802.11a, 802.11b and 802.11g compliant •32-Bit CardBus InterfaceLinksysA Division of Cisco Systems, Inc.18582 Teller Avenue Irvine, CA 92612 USA E-mail:************************************Web:Linksys products are available in more than 50countries, supported by 12 Linksys Regional Offices throughout the world. For a complete list of local Linksys Sales and Technical Support contacts, visitWPC55AGPackage Contents•Dual-Band Wireless A+G Notebook Adapter•Setup CD-ROM•User Guide on CD-ROM•Quick Installation and Registration CardNotebook AdapterDual-Band Wireless A+GMinimum Requirements•200MHz or Faster Processor •64 MB of RAM•Available CardBus Slot •CD-ROM Drive•Windows 98SE, Me, 2000 or XPSpecifications Model Number WPC55AGStandards IEEE 802.11a, 802.11b, 802.11g Interface CardBus LEDsPower, Link Transmit Power 11 dBm to 17 dBmModulation 802.11a and 802.11g: OFDM;802.11b: CCK, DQPSK, DBPSK Security Features WEP, LEAP, WPA WEP Key Bits 64, 128, 152 Bits Protocol TCP/IPEnvironmental Dimensions 4.72" x 0.51" x 2.13"(120 mm x 13 mm x 54 mm)Unit Weight 1.48 oz. (0.04 kg)Power 3.3V Bus PoweredCertifications FCC, CE, IC-03, Wi-Fi (802.11a, 802.11b,802.11g), WPA, CCX, WHQL: XP, 2000, Me Operating Temp.0ºC to 55ºC Storage Temp.-20ºC to 85ºCOperating Humidity 10% to 85%, Non-Condensing Storage Humidity5% to 90%, Non-Condensing Specifications are subject to change without notice. Linksys and Instant Wireless are registered trademarks of Cisco Systems, Inc. Other brands and product names are trademarks or registered trademarks of their respective holders. Copyright © 2003 Cisco Systems, Inc. All rights reserved.The Cisco Systems, Inc. Cisco Compatible logo signifies that theWPC55AG product has undergone interoperability testing by Linksys together with Cisco and/or a third party test-house based on testing criteria set by Cisco. Linksys is solely responsible for the support and warranty of its produ ct. Cisco makes no warranties, express or implied, with respect to the Linksys product or its interoperation with the listed Cisco product(s) and disclaims any implied wa rranties of merchantability, fitness for a par-ticular use or against infringement. The following version(s) of the WPC55AG has/have been tested for interoperability with the listed product(s) of Cisco Systems, Inc.:Linsksy WPC55AG, Firmware Version 2.3.2.4 Compatible with Cisco 1200s running vxworks 12.02T1. LEAP tests used Cisco ACS server 3.1 running on Windows 2000 Advanced Server. EAP-TLS tests used the Microsoft Internet Authentication Server running on Windows 2000 Advanced Server.WPC55AG-DS-30718B-KL。

无线法则的英文

无线法则的英文

无线法则的英文The Law of Wireless Connectivity。

In today's digital age, wireless connectivity has become an integral part of our daily lives. From smartphones to smart homes, the ability to connect to the internet and other devices without the use of physical cables has revolutionized the way we live, work, and communicate. The law of wireless connectivity governs the principles and technology behind this phenomenon, and understanding it is crucial for anyone who wants to fully harness the power of wireless communication.The law of wireless connectivity can be broken down into several key principles that govern how wireless devices communicate with each other. These principles include:1. Radio Waves: Wireless communication relies on the use of radio waves to transmit data between devices. Thesewaves are a form of electromagnetic radiation that cantravel through the air and other materials. Different wireless technologies, such as Wi-Fi, Bluetooth, andcellular networks, use different frequencies of radio waves to transmit data.2. Signal Strength: The strength of a wireless signalis crucial to the quality of the connection between devices. Factors such as distance, obstacles, and interference from other devices can all affect the strength of a wireless signal. Understanding how to optimize signal strength is essential for maintaining a reliable wireless connection.3. Security: Wireless communication can be vulnerableto security threats such as hacking and data interception. The law of wireless connectivity includes principles for securing wireless networks and devices, such as encryption and authentication protocols, to ensure that data remains private and secure.4. Interference: Wireless devices can interfere with each other if they operate on the same frequency or useconflicting transmission methods. The law of wireless connectivity includes principles for minimizinginterference between devices, such as using different frequency bands or implementing interference mitigation techniques.5. Standards and Protocols: The law of wireless connectivity also encompasses the standards and protocols that govern how wireless devices communicate with each other. These standards, such as the IEEE 802.11 for Wi-Fi and the Bluetooth SIG for Bluetooth, ensure that different devices can communicate with each other effectively and reliably.Understanding and applying the principles of the law of wireless connectivity is essential for anyone who wants to design, implement, or troubleshoot wireless communication systems. Whether you are a network engineer, a software developer, or a consumer who wants to make the most oftheir wireless devices, having a solid grasp of these principles is crucial.For network engineers and IT professionals, understanding the law of wireless connectivity is essential for designing and maintaining wireless networks. By optimizing signal strength, minimizing interference, and implementing security measures, they can ensure thatwireless networks operate smoothly and reliably.For software developers, understanding the law of wireless connectivity is crucial for creating applications and services that work seamlessly over wireless connections. By adhering to wireless communication standards and protocols, they can ensure that their software iscompatible with a wide range of wireless devices and networks.For consumers, understanding the law of wireless connectivity can help them make informed decisions about their wireless devices and networks. By knowing how to optimize signal strength, secure their wireless networks, and troubleshoot common connectivity issues, they can get the most out of their wireless technology.In conclusion, the law of wireless connectivity governs the principles and technology behind wireless communication. Understanding these principles is essential for anyone who wants to harness the power of wireless connectivity,whether they are network engineers, software developers, or consumers. By mastering the law of wireless connectivity,we can ensure that our wireless devices and networksoperate smoothly, reliably, and securely in the digital age.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Connectivity Probability of Wireless Ad Hoc Networks: Definition,Evaluation,ComparisonTatiana K.Madsen,Frank H.P.Fitzek and Ramjee PrasadCenter for TeleInFrastructure,Deptartment of Communication Technology, Aalborg University,DenmarkE–mail:[tatiana|ff|prasad]@kom.aau.dkGerrit SchulteTechnical University of Berlin,Berlin,GermanyE–mail:gerrit@Abstract.The paper presents a new approach investigating mobile ad hoc network connectivity.It is shown how to define and evaluate the connectivity probability of a mobile network where the position of the nodes and the link quality changes over time.The connectivity probability is a measure that can capture the impact of the node movement on the network connectivity.A number of mobility models is considered ranging from the classical Random Direction model to the Virtual World model based on the mobility measurements of a multi–player game.We introduce an Attractor model as a simple way to model non–homogeneous node distribution by incorporating viscosity regions in the simulation area.Methods of ergodic theory are used to show the correctness of the approach and to reduce the computational time.Simulation results show how the node density distribution affects the network connectivity.Keywords:ad hoc network,mobility models,simulations,connectivity probability1.IntroductionThe movement pattern of users has a significant impact on perfor-mance of mobile and wireless communication systems and networks.To incorporate user mobility in the simulation evaluation of e.g.routing protocols,a variety of models have been proposed(see[1,2,3]and refer-ences therein).The mobility models define how the nodes move within the network.Trustworthy mobility models should satisfy some criteria. Models used for cellular systems should provide realistic values for such parameters as the cell residence time,number of handoffs during a call, etc.In ad hoc networks the emphasis is shifted and other issues play the key role.These issues are connectivity of a network[4],path duration (also called longevity of routes[5])and stability of routes[3].To achieve a connected ad hoc network,there must be a multi–hop path from each node to any other node.Observing a network at a given moment in time,we can determine if some of the nodes are isolated from other nodes or not.Assuming some initial node distribution inc 2005Kluwer Academic Publishers.Printed in the Netherlands.2Madsen,Fitzek,Schulte,Prasada simulation area,we can guarantee with some probability that the network is connected at that moment in time[4].Now the question arises what will happen when the nodes start moving around.Some links will be broken and new links will be established.It is desirable to have an estimation whether or not the network will remain connected and it would be practically convenient to have a measure of a network being connected under mobility of nodes.To estimate a network connectivity in the presence of mobility,we introduce a measure,called connectivity probability.This parameter is defined as a measure of time intervals during which a network is connected.It gives the probability that observing a network in ran-domly chosen point in time we willfind it connected.Connectivity probability can capture the important properties of a network when position of nodes and states of the links changes over time.We define a general framework for evaluating the impact of node movement on the network connectivity.To incorporate the nodes dynamics in the theoretical analysis of the connectivity properties of a network,we use some results of the theory of dynamical systems.Ergodic properties of mobility models based on deterministic modelling of node movement, allow us to derive a simple expression for the connectivity probability. For example,this can be done for Random Direction(RD)model and its extensions.A number of different mobility models are considered in the pa-per.We illustrate how the connectivity probability can be estimated with the examples of Random Waypoint[2],Attractor,Virtual world model[3],and Model with obstacles[14,17]:−The Random Waypoint(RW)model is widely used for proto-col performance evaluation and is implemented in the network simulator ns–2.−We introduce the Attractor model as a simple enhancement of any mobility model when regions of slow movements are incorpo-rated in the simulation area.This leads to non–homogeneous node distribution.−The Virtual World model is based on the mobility patterns ob-tained from the measurements of the virtual world scenarios.The mobility measurements of a multi–player game,such as Quake II, can be used for investigation of the impact of mobility on the performance of multi–hop protocols.−The mobility model with obstacles incorporates the rectangular-shaped obstructions in the simulation region to make the simula-tion scenarios more realistic.It is especially actual when simulatingConnectivity Probability of Wireless Ad Hoc Networks3 indoor scenarios where the influence of walls and other objects can not be ignored.The remainder of the paper is organized as follows.Section2pro-vides the motivation for our work and gives a short overview of the re-lated work.Section3introduces a formal definition of the connectivity probability.Section4explains how the connectivity probability can be estimated for different mobility models.Section5presents simulation results.Section6offers some concluding remarks.2.Motivation and related workA problem of connectivity of ad hoc networks has got a lot of attention during last years.For multi–hop networks the connectivity is one of the fundamental and important properties.The majority of research considers only the static situation,when the nodes do not move.For example,in[4]connectivity dependence on the node density and the transmission radius is evaluated in the static scenario.Another problem that was tackled is defining the critical transmission range,a threshold transmission range that is required for connectivity(see e.g.[6,7]).Including the mobility of nodes complicates analysis of network char-acteristics,though many applications of ad hoc networks requires that the nodes are mobile but still connected.It has been realized that the mobility pattern of the nodes has a big impact on the performance of ad hoc protocols[2,8].But for the correct interpretation of the results,one should be aware of the properties of the network under consideration,including the connectivity property.Let us consider the situation when at the initial moment of time nodes are distributed uniformly on the simulation area and the network is connected.Then the nodes start moving to any of the corners of the area and after some time the network will become and remain partitioned.This example is an extreme case when an initially connected network becomes uncon-nected,but it illustrates the importance of understanding how mobility of the nodes influences the connectivity.Under–or overestimation of network connectivity can potentially lead to misinterpretation of the results,when falls in the protocol performance would be attributed to the specifics of a protocol design and not to the characteristics of the network.The main tools used for investigation of network connectivity come from the graph theory and the probability theory.For example,the theory of geometric random graphs(GRG)deals with a set of n points distributed according to some density and focuses on the properties of4Madsen,Fitzek,Schulte,Prasadthe resulting node ing GRG theory some conclusions can be made on the transmission range in a dense ad hoc network[9].Other results for ad hoc network connectivity can be obtained making use of the percolation theory[10](see also[11]for the connectivity of hybrid ad hoc networks).In[6]the problem of connectivity is approached from the probabilistic angle and the transmission range is defined as a random variable allowing statistical modelling of the connectivity. Probabilistic approach can be also used for the investigation of sparse ad hoc networks,namely to determine the critical transmission range which generates communication graphs that are connected with high probability[7].Unfortunately,these instruments are only amiable for the analysis of static scenarios,since they fail to capture situations when edges of the connectivity graph changes over time.To incorporate the dynamics of a network topology into the analysis of the connectivity problem, we resort to the methods provided by the theory of dynamical systems. Dynamical systems are exactly the mathematicalfield that is developed and used for description of evolution in time of objects of different nature.Therefore,it is also natural in our situation,for discussion of the qualitative estimation of the network connectivity under mobility of nodes,to use ideas and methods of the modern theory of dynamical systems.3.Definition of Connectivity ProbabilityWe start with giving some insights in the problem of network con-nectivity in a static environment.Then we show how connectivity can be defined when the nodes are mobile and introduce connectiv-ity probability as a measure of network connectivity in a dynamic environment.Let D be a bounded domain on the Euclidean plane R2={x,y} with piecewise smooth borders.Inside domain D there are n nodes.In the initial moment t=0nodes are somehow placed and then they start moving.Let r i=(x i,y i)be the radius–vector of node i.Further,we assume that every node has a transceiver with communication range r: if the distance between two nodes is larger than r,they cannot establish a direct communication link.Nodes can transmit information by using multi–hop connections.Definition1.A network is connected(or fully connected)if for every pair of nodes there exists a path between them.Note that for a network to be connected we require existence of a path from source to destination at any moment in time.As it isConnectivity Probability of Wireless Ad Hoc Networks5 shown in[12]it might not be necessary,but it imposes design of specific routing protocols.We do not include this special case in the scope of our consideration.Connectivity probability is used to quantify the network connectiv-ity.In the static environment(when the positions of nodes arefixed), the probability for a network to be connected depends on the density of the nodes and their transmission range.In a typical static simulation scenario,in order to evaluate the connectivity probability a number of nodes are placed at random in the simulation area.A random variable is introduced which is equal to one if the network is found connected and zero if it is disconnected.The average of this random variable over several trials gives the connectivity probability.Now we will show how to extend this approach to the case of dynamic environment.Under motion of nodes a semiaxis of time R+is divided into intervalsτ±1,τ∓2,τ±3,...whereτ+k (τ−k)denotes a time interval during which the network isconnected(disconnected).Lets introduce the function f+(t)such thatf+(t)=1if t∈τ+k ,and f+(t)=0if t∈τ−k.Time intervalsτ±kcan beconsidered as randomly distributed;thus,f+(t)is a stochastic process.Definition2.In the dynamic environment,connectivity probability P+is defined byP+=E[f+(t)](1) where E[·]stands for the expected value(if the expected value exists).Analogously the function f−(t)can be introduced:f−(t)=1,t∈τ−k 0,t∈τ+kThe probability that a network is disconnected is given by P−= E[f−(t)].Since f+(t)=1−f−(t),then P++P−=1.One can see that in general case the probability P+is time-dependent: P+=P+(t).For stationary stochastic processes P+(t)=const.If stationary process is ergodic,then equality(1)can be substituted by the following:with probability onelim τ→∞1ττf+(t)dt=P+This equality is equivalent to the following:P+=limτ→∞1τmes(T+[0,τ])(2)6Madsen,Fitzek,Schulte,Prasad where T += τ+k 1.That is,the probability that a network is connectedcan be defined as a density of set T +on the semiaxis R +={t >0}.Therefore,the problem of connectivity of a network consisting of moving nodes is reduced to the problem of existence and estimation of the expected value (1).If the mobility model is stationary and ergodic,then formula (2)can be used for estimation of connectivity.Detailed analysis of the estimation of the connectivity probability is presented in the next section.4.Analysis4.1.Note on dynamical systems and stochastic processes Dynamical systems theory can be useful for modelling the movement of nodes in an ad hoc network.In homogeneous networks,where the properties and capabilities of the nodes are the same,we can reasonably assume that the movement of a single node can be described by one and the same system of differential equations.If we introduce some form of randomization in the movement pattern of a node,then it would re-quire construction of stochastic differential processes.If the considered process is stationary,a system of autonomous differential equations can be used,where the right–sides of equations do not depend explicitly on time and different nodes differ only by their initial conditions.In the theory of dynamical systems a phase flow is introduced that is a group of shifts along the trajectories during one and the same time interval.The phase flow generates a dynamical system.The system can be described by differential equations of the following form:˙x =g (x ),x ∈Π(3)where Πis the phase space,x is a set of coordinates in Π(usually it is position and velocity),dot means time differentiation.Let n be a number of nodes and x (1),...,x (n )are their phase coordinates.Then these coordinates satisfy the following differential equations:˙x (k )=g (x (k )),k =1,...,n (4)In this way dynamics of n nodes is completely defined by dynamical system (4),that is a direct product of n copies of original dynamical sys-tem (3).Its phase space ˆΠ=Π×...×Π=(Π)n is a direct product of n copies of initial phase space,and phase coordinates ˆx =(x (1),...,x (n ))1mes stands for measure of a domain.In this case it is the total length of theintervals T + [0,τ]Connectivity Probability of Wireless Ad Hoc Networks7 are a set of coordinates of individual nodes.Note that if the system (3)has an invariant measureµinΠ,then the system(4)also has an invariant measure inˆΠ,that is a direct productˆµ=µ1×···×µn.In the problem of the nodes connectivity,the phase spaceˆΠcan be divided into two domains D and¯D=ˆΠ\D in the following way:when ˆx∈D,then every node from n nodes x1,...,x n can communicate with any other node;whenˆx∈¯D,then some of the nodes can not ”reach”some of the others.Following dynamical systems approach, the connectivity probability can be estimated as a fraction of time t whenˆx(t)∈D.The problem of estimation of the connectivity measure can be sim-plified significantly if dynamical system(4)is ergodic inˆΠ.By defin-ition,the system is ergodic if a measure of any invariant sub–domain of the phase space is either equal to zero or is equal to the measure of the whole space.The key result of the ergodic theory is Birkhoffergodic theorem[13]. Here we provide it’s formulation using our notations.Let f(ˆx)be a measurable integrable function onˆΠ.Then for almost all solutions of the ergodic system(3)the following equality takes place:lim T→∞1TTf(ˆx(t))dt=ˆΠf(ˆx)dˆµmesˆΠ,(5)wheremesˆΠ=ˆΠdˆµ=ˆµ(ˆΠ)is the measure of the whole phase space.Let,for example,f be a characteristic function of a measurable domain D:f(ˆx)=1ifˆx∈D and f(ˆx)=0ifˆx∈¯D.Due to the the fact that f is limited and D is measurable,function f:ˆΠ→R is integrable.In this case,the left–side of(5)is equal to the fraction of time interval0≤t≤T whenˆx(t)lies in the domain D.Then the connectivity probability of a network will be equal to the right–side of (5),that in this case ismes D/mesˆΠ(6) This approach can be also interpreted in terms of the theory of stochastic processes.One can introduce the probabilistic measure in the phase spaceˆΠ.Probability for a system to be in the measurable domain D is determined by formula(6).Let f(x)be a characteristic function of the domain D introduced above and x(t)be the solution of system(3).Then the function f(x(t))can be interpreted as a stochastic process.It’s realization will be dependent on the choice of the initial conditions.Let E[f(τ)]be the expected value of the function f(t)at8Madsen,Fitzek,Schulte,Prasadthe momentτ.If the right–sides of the equation(3)do not depend on time,then the stochastic process is stationary.In particular,it means that E[f(τ)]does not depend onτ.If,in addition to being stationary, the system is ergodic,the expected value can be calculated by using formula(6):lim T→∞1TTf(ˆx(t))dt=E[f]=mes D/mesˆΠThis is true for almost all realization of the stochastic process.There-fore,the problem of calculation of the expected value(1)is reduced to the geometrical problem of calculation of domain volumes in a phase space if the process is ergodic.As we show in the following,using formula(6)is computationally more efficient than evaluating the expected value.Thus,it should be preferred when possible,i.e.when the system is ergodic.At this point a natural question comes:can we expect that one or another widely-used mobility model is ergodic?The problem of ergodicity has been intensively studied,but it is far from being completely resolved due to its complexity.There exist a number of well–known examples of ergodic systems from the theory of dynamical systems.For example,consider a system of nodes within a rectangular domain moving along the straight lines.Once the boundary is reached,a new direction of movement is chosen such that the trajectory forms equal angles with the boundary. One can imagine a trajectory as a stroke of light reflected by a mirror. These kind of systems are called billiards.One can easily notice that they correspond to a particular case of Random Direction mobility model(in RD model a new direction is chosen uniformly towards the inside of the simulation area).Billiards,restricted on the integral many-fold,are ergodic.Their ergodicity property can be established with the help of Weyl’s theorem on homogeneous distribution(see e.g.[13]).One should note,though,that not every statinary process is ergodic and in realistic scenarios ergodicity is more the exception than the rule.If the right–side of(3)explicitly depends on time,then the process f(t)=f(x(t))is non–stationary.In general,formula(6)is not applica-ble and the expected value depends on time.However,it turns out that under a large range of conditions,the expected value of f(t)calculated over a long interval of time gives sufficiently good approximation of the expected value E[f(t)]over semiaxis0≤t<∞.Thus,if E[f(t)] changes slowly over time,then this value can be estimated as the average value of f(t)over long(but not infinitely-long)time interval [t,t+τ]:with probability onelim T→∞1TTf(t)dt=limT→∞1TTE[f(t)]dt(7)Connectivity Probability of Wireless Ad Hoc Networks9 If we consider time interval where f(t)oscillates but E[f(t)]changes slowly,then E can be approximated as a constant and the right–side of(7)is equal to E(t).Thus,for slow stochastic processes formula(7) can be used for estimation of the connectivity probability.4.2.Estimation of connectivity probability for differentmobility modelsIn[14]we present a detailed analysis and derivation of formula(6) for Random Direction model.In this case mesˆΠis just the area of a simulation domain:mesˆΠ=a×b where a and b are lengths of the sides if rectangular region is considered.mes D is area of a domain consisting of all possible positions of the nodes such that the network is connected. It seems to be difficult tofind a close form expression for the measure of D as a function of communication radius r.Instead,Monte–Carlo simulations can be used:nodes are placed randomly,independently and uniformly in a simulation area and the connectivity of the network is verified.Then P+≈M/N,where N is a total number of simulation trials and M is a number of successful trials(when the network is connected)if N is chosen sufficiently large.Formula(6)can be used for the range of other mobility models that generalize RD model:when speeds of nodes are different or when borders of the area consist of horizontal and vertical lines,or speak-ing more generally,when rectangular–shaped obstacles are placed in a simulation area.Thefirst case is illustrated by an example of Attractor model in Section5.3.The realization of the second case by the model with obstacles can be found in[15,16].It is discussed in Section5.5.Using formula(6)for estimation of the connectivity probability,any fixed moment of time can be considered,since the process is stationary. In principle,t=0is as good choice as any other,and by using t=0 the complexity of the simulation is of the same order as for the static case evaluation.However,in practise,it is recommendable to consider t=t0>0to make the result less correlated with the initial conditions.Considering other stationary mobility models,it is more difficult to answer if the limit(2)exists.If a collection of mobile nodes comprises a dynamical system with some particular properties(namely,a system has an invariant measure),then for almost all initial conditions the limit exists.It can happen that for different initial conditions(i.e.different initial positions and velocities of the nodes)the limiting values will be different.In this situation averaging over initial node distribution should be done,and the obtained average connectivity probability can be used as an estimate that a network is connected in any point in time.10Madsen,Fitzek,Schulte,PrasadTable I.Calculation approaches for different modelsRD RW Attractor VW ObstFormula(6)Formula(1)Formula(6)Formula(7)Formula(6)For mobility models based on RD pattern,we have two ways to calculate the connectivity probability:either evaluating the expected value(1)or by applying formula(6).Comparing these two approaches, we have done some measurements of cpu time.To obtain connectivity probability for one set of parameters,using formula(6)it takes approx. 132sec,whereas if we calculate directly by using(1),cpu time is more than2000sec.The big difference in cpu times can be explained by the fact that in the second case modelling in time is required and at each time stamp we have to recalculate the positions of the nodes.Moreover, using Monte–Carlo approach,we can estimate how many simulation runs are required in order for results to lie within a specified confidence interval.Applying direct calculation,it is not possible by any analytical means to estimate how long in time we have to perform the simulation,–it can differ in each particular case.Therefore,we have chosen to calculate connectivity by using formula(6)when possible,since it is computationally less expensive.To summarize this section,Table I is given showing what approach is used for estimation of the connectivity probability for the results in Section5.5.Simulation resultsDifferent application scenarios of ad hoc networks would require dif-ferent connectivity probability.For example,in a network used for safety–critical or life–critical operations,the connectivity probability should be more than90%.If temporary network disconnections can be tolerated,then the connectivity probability can go down to50%or even lower.5.1.Random Direction modelIn Random Direction model,nodes select a direction in which to move, uniformly between0and2π,and speed from a given distribution. Subsequently motion starts.Once the simulation boundary is reached, a node pauses for a specified period of time,then it chooses a newdirection uniformly toward the inside of the simulation domain and the process continues.Especial interest has a case when a new direction is chosen such that the trajectory of movement forms equal angles with the boundary.We refer to it as Billiard model.One of the important characteristics of the Billiard model is a uni-form node density distribution.This can be shown directly [17]or by using the following well–known fact from the theory of dynamical sys-tems:in a billiard system for almost every initial conditions a trajectory of a node covers a region of motion everywhere dense. 0 0.20.4 0.6 0.810 20 40 6080 100C o n n e c t i v i t y p r o b a b i l i t y Communication radius 5 nodes 10 nodes 50 nodesFigure 1.Connectivity probability as a function of communication radius.Simula-tion area 100x100m 2Figure 1presents the connectivity probability dependence on a com-munication radius where the simulation area is a square of 100x100m 2and the number of nodes is equal to 5,10and 50.When the density of nodes is high,in order to have a connected network with probability 95%at any moment of time,we should require the communication radius of 20m.One can observe that for the dense network the line pre-senting connectivity probability is steeper than the one for the sparse network.One should note that in the case when all nodes move with the same speed,the connectivity probability would not depend on the actual value of the speed.5.2.Random Waypoint modelAnother widely used model for protocol performance evaluation is the Random Waypoint model.A node chooses a random destination and a travelling speed and travel towards the destination along a straight line.Upon arrival,it pauses and repeats the process.Table II shows connectivity probability for the following set of pa-rameters:simulation area is 150x150m 2,number of nodes n is 100Table II.Connectivity Probability for Billiard,Random Way-point and Attractor modelsB RW Attr=30,n=1000.92±0.0170.85±0.0070.55±0.003r=40,n=800.99±0.0060.97±0.030.90±0.018and communication radius r is30m,and n=80and r=40m.For RW model the results are obtained as the average of50simulation runs.For Billiard model1000trials are performed.The95%confidence interval is given in Table paring results for Billiard and Random Waypoint,one can observe that the connectivity probability for RW model is lower,though the same set of parameters were considered. This result can be explained if we consider the node distribution in the simulation area for these two models.As it was already noticed (see e.g.[18]),the node density distribution for RW is not uniform, but has a convex shape.Figure2shows a histogram obtained through simulation on a150x150m2area with80nodes.The area is divided into15x15subareas and the number of nodes in the subarea at every time step is counted.A higher node density in the middle of the area and a significantly lower density at the area edges is due to the fact that nodes at the borders are more likely to move back to the middle by randomly choosing a new direction of movement.The node density has a direct impact on the connectivity probabil-ity.The existence of areas with low density leads to the decrease in the connectivity,as we can see from Table II.If a sparse network is considered with low number of nodes,then the opposite effect can be observed.Table III shows results when the number of nodes is equal to 13.The probability tofind a network fully connected under Random Waypoint is higher than for Random Direction model.In this case the density of nodes is so low even in the high density region,that the number of nodes might not be enough to form a connected network. Therefore,here the fact that for RW model in the central part of the simulation area the node density is higher plays crucial role.5.3.Attractor modelThe considered above models result in almost uniform spatial node distribution.Tough we can imagine situations when mobile users tend to gather in one subarea(shopping mall or traffic jam due to a road construction).These scenarios can not be captured by group mobility。

相关文档
最新文档