Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)最新文献

筛选
英文 中文
The effect of retransmitted packet size preservation property on TCP goodput over links with Bernoulli bit-errors 在伯努利误码链路上,重传包大小保留特性对TCP good - put的影响
T. Ikegawa, Yukio Takahashi
{"title":"The effect of retransmitted packet size preservation property on TCP goodput over links with Bernoulli bit-errors","authors":"T. Ikegawa, Yukio Takahashi","doi":"10.1109/WIOPT.2005.46","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.46","url":null,"abstract":"In this paper, we investigate the effect of the retransmitted packet size preservation (RPSP) property on TCP performance over links with Bernoulli bit-errors, where RPSP means that the sizes of all packets transferred over datalinks (referred to as transferred packets) with the same sequence-number at retransmissions are equal to the size of a packet generated from a message at the original transmission (namely, generated packet). To achieve this, we present a Markov model for size-sequences of the generated and transferred packets, in which the TCP message-segmentation and error-recovery functions with RPSP are taken into account, respectively. Furthermore, we derive the round-trip time and the transferred packet corruption probability, which are the main parameters of TCP performance. Applying them to the conventional TCP-Reno send-rate formula, we discuss the effect of RPSP on TCP-Reno goodput. The key findings from the numerical results include that RPSP cannot be negligible for networks that suffer from a high bit-error rate (e.g., 1 /spl times/ 10/sup -4/, which is the mean bit-error rate of a wireless link in an industrial environment), when the message-segmentation occurrence probability is relatively small.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using the 802.11e EDCF to achieve TCP upload fairness over WLAN links 采用802.11e EDCF实现WLAN链路上TCP上传的公平性
D. Leith, P. Clifford
{"title":"Using the 802.11e EDCF to achieve TCP upload fairness over WLAN links","authors":"D. Leith, P. Clifford","doi":"10.1109/WIOPT.2005.54","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.54","url":null,"abstract":"We investigate the use of the 802.11e MAC EDCF to address transport layer unfairness in WLANs. A simple solution is developed that uses the 802.11e AIFS and CW/sub min/ parameters to ensure fairness between competing TCP uploads. An analytic model of TCP transport over the modified channel is developed in order to analyse the fairness properties of the proposed scheme. In addition to fairness between competing TCP flows, consideration is extended to include characteristics of TCP flows such as RTT unfairness and responsiveness and we observe that TCP flows with a wireless bottleneck link exhibit quite different properties from flows with a wired bottleneck.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132845098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
A new relaying scheme for cheap wireless relay nodes 一种新的廉价无线中继节点中继方案
R. Khalili, Kave Salamatian
{"title":"A new relaying scheme for cheap wireless relay nodes","authors":"R. Khalili, Kave Salamatian","doi":"10.1109/WIOPT.2005.3","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.3","url":null,"abstract":"Wireless networks consist of senders, receivers, and intermediate nodes collaborating (more or less) to establish the communication paths. Most of the researches in the domain of wireless network have focused on routing based approaches. In such an approach, wireless network is reduced to a dynamic graph, and a minimum cost routing mechanism is applied. These approaches have led to several routing mechanisms as OLSR and AODV. However, the fundamental nature of wireless network is the broadcast. In the wireless network, all the tuned receivers potentially receive every transmission. This basic property is not well captured by graph-based approaches where packets follow a single path from sender to receiver. In this paper we propose a relaying scheme for wireless multi-hop networks. It is based on collaboration of intermediate relays at network layer to forward useful side information in place of forwarding packets. In our scheme we assume that the nodes are not able to benefit from any interference cancellation mechanism. The channels from sender to relay nodes and from sender to receiver are logically separated through a temporal scheduling. This model is realistic for many practical scenarios in the context of wireless networks. We show in this paper the information theoretic bounds and show that they are achievable using practical codes. The proposed coding scheme is simulated in realistic scenarios. The obtained results show a remarkable improvement in throughput, relay load and reliability compared to network using classical routing approach.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115599264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Energy saving dynamic source routing for ad hoc wireless networks 自组织无线网络的节能动态源路由
M. Tarique, K. Tepe, M. Naserian
{"title":"Energy saving dynamic source routing for ad hoc wireless networks","authors":"M. Tarique, K. Tepe, M. Naserian","doi":"10.1109/WIOPT.2005.21","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.21","url":null,"abstract":"In this paper, energy saving dynamic source routing (ESDSR) protocol is introduced to maximize the life-span of a mobile ad hoc network (MANET). Many theoretical studies show that energy consumption in MANET can be significantly reduced using energy-aware routing protocols compared to fixed-power minimum-hop routing protocols. Two approaches are broadly suggested for energy-aware routing protocols - transmission power control approach and load sharing approach. ESDSR integrates the advantages of those two approaches. In ESDSR, the routing decision is based on a load balancing approach. Once a routing decision is made, link by link transmit power adjustment per packet is done based on a transmit power control approach. We modified dynamic source routing (DSR) protocol to make it energy aware by a network simulator (network simulator-2 of University of California). The simulation results show that the proposed ESDSR can save energy up to 40% per packet and it can send 20 % more packets to destinations by spending the same battery power in compare to DSR.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124599049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Interference power sum with log-normal components in ad-hoc and sensor networks 自组网和传感器网络中对数正态分量的干扰功率和
R. Hekmat, P. Mieghem
{"title":"Interference power sum with log-normal components in ad-hoc and sensor networks","authors":"R. Hekmat, P. Mieghem","doi":"10.1109/WIOPT.2005.23","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.23","url":null,"abstract":"The log-normal shadowing radio model has frequently been used to model radio propagation conditions. There exist accurate calculation methods for estimation of interference power sum statistics in fixed-topology wireless networks based on this radio model. Here we publish essential additions to these estimation methods to expand their use to sensor networks and ad-hoc networks with changing topology. To our best knowledge this has not been done before. Taking into account radio propagation conditions, density of nodes, size of the network, traffic load per node and MAC protocol characteristics, we present a calculation method for the estimation of interference power sum statistics in wireless ad-hoc and sensor networks. The accuracy of the calculation method is verified by simulations. We highlight the influence of MAC protocols on interference and show that an increase in network size or in node density does not necessarily lead into higher interference values. Our results can be deployed to estimate the network capacity.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129362168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A simulation tool to evaluate radio resource management algorithms for enhanced UMTS 用于评估增强型UMTS无线电资源管理算法的仿真工具
V. Vassiliou, J. Antoniou, G. Hadjipollas, A. Pitsillides
{"title":"A simulation tool to evaluate radio resource management algorithms for enhanced UMTS","authors":"V. Vassiliou, J. Antoniou, G. Hadjipollas, A. Pitsillides","doi":"10.1109/WIOPT.2005.8","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.8","url":null,"abstract":"This paper presents a new system level simulator that has been developed to evaluate radio resource management (RRM) techniques in UMTS (Universal Mobile Telecommunication Systems) and enhanced-UMTS networks. The simulator includes new implementations for the user equipment, node B, radio network controller nodes and can evaluate parameters associated with UMTS or enhanced-UMTS performance, related to the introduction of RRM functions. The RRM functions implemented deal with admission control, packet scheduling, handover control, load control, and power control. The evaluation of RRM mechanisms is supported by the provision of appropriate radio propagation, traffic generation, and mobility models.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124214328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A game-theoretic analysis on the conditions of cooperation in a wireless ad hoc network 无线自组织网络合作条件的博弈论分析
S. Bandyopadhyay, Subhajyoti Bandyopadhyay
{"title":"A game-theoretic analysis on the conditions of cooperation in a wireless ad hoc network","authors":"S. Bandyopadhyay, Subhajyoti Bandyopadhyay","doi":"10.1109/WIOPT.2005.1","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.1","url":null,"abstract":"To enable proper functioning of wireless ad hoc networks, all nodes in the network are expected to cooperate in forwarding each other's packet. But relaying other nodes' packets involves spending energy without getting any immediate revenue. Hence, due to the constraints on available energy the nodes usually have in such networks, from an individual node's point of view, the best response is always not to cooperate. We model this problem as a repeated game and show analytically that given a suitable punishment mechanism, individual nodes can be deterred from their selfish behavior, and cooperation can emerge as the best response. We also show that generosity by other nodes cannot be part of a credible deterrent mechanism.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122467524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Modeling and analysis of opportunistic routing in low traffic scenarios 低流量场景下机会路由的建模与分析
R. Shah, S. Wiethölter, A. Wolisz, J. Rabaey
{"title":"Modeling and analysis of opportunistic routing in low traffic scenarios","authors":"R. Shah, S. Wiethölter, A. Wolisz, J. Rabaey","doi":"10.1109/WIOPT.2005.30","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.30","url":null,"abstract":"Opportunistic routing protocols have been proposed as efficient methods to exploit the high node densities in sensor networks to mitigate the effect of varying channel conditions and non-availability of nodes that power down periodically. They work by integrating the network and data link layers so that they can take a joint decision as to the next hop forwarding node based on its availability and suitability as a forwarder. This cross-layer integration makes it harder to optimize the protocol due to the dependencies among the different components of the protocol stack. In this paper, we provide a framework to model opportunistic routing that breaks up the functionality into three separate components and simplifies analysis. The framework is used to model two variants of opportunistic routing and is shown to match well with simulation results. In addition, using the model for performance analysis yields important guidelines for the future design of such protocols.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125303586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Secure comparison of encrypted data in wireless sensor networks 无线传感器网络中加密数据的安全比较
Mithun P. Acharya, J. Girão, D. Westhoff
{"title":"Secure comparison of encrypted data in wireless sensor networks","authors":"Mithun P. Acharya, J. Girão, D. Westhoff","doi":"10.1109/WIOPT.2005.44","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.44","url":null,"abstract":"End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party wireless sensor network implementations to become meaningful and profitable. For wireless sensor networks, we demonstrated in our previous work that privacy homomorphisms, when used for this purpose, offer two striking advantages apart from end-to-end concealment of data and ability to operate on ciphertexts: flexibility by keyless aggregation and conservation and balancing of aggregator backbone energy. We offered proof of concept by applying a certain privacy homomorphism for sensor network applications that rely on the addition operation. But a large class of aggregator functions like median computation or finding maximum/minimum rely exclusively on comparison operations. Unfortunately, as shown by Rivest, et al., any privacy homomorphism is insecure even against ciphertext that only attacks if they support comparison operations. In this paper we show that a particular order preserving encryption scheme achieves the above mentioned energy benefits and flexibility when used to support comparison operations over encrypted texts for wireless sensor networks, while also managing to hide the plaintext distribution and being secure against ciphertext only attacks. The scheme is shown to have reasonable memory and computation overhead when applied for wireless sensor networks.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134191833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
An interactive transparent protocol for connection oriented mobility $performance analysis with voice traffic 一个交互式透明协议,用于面向连接的移动性能分析与语音流量
R. Zaghal, S. Davu, J. Khan
{"title":"An interactive transparent protocol for connection oriented mobility $performance analysis with voice traffic","authors":"R. Zaghal, S. Davu, J. Khan","doi":"10.1109/WIOPT.2005.9","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.9","url":null,"abstract":"Loss-free handoff in mobile networks is an extensive research area. Mobile IP (MIP) provided a solution to enable a mobile node to roam from one location to another while maintaining its network level connectivity. However, handoff latencies and longer triangular routing paths in MIP can severely degrade communication performance and in particular cripple connection oriented protocols like TCP. In this paper we propose an alternate approach for robust mobility. The scheme is based on the principle of 'interactive transparent networking' where all networking layers remain lightweight but are engineered for interactivity. This would allow principle intelligent actions to be performed at the application layer. With protocol interactivity we demonstrate a novel scheme that switches IP address in the TCP/IP stack on both end-points and perform loss-free rapid handoff. The scheme offers not only loss-free handoff, but also offers several fundamental system advantages; (i) it does not impose any changes on original network protocols or their dynamics, and (ii) it fully adheres to the end-to-end principle and do not require intermediary nodes as in MIP. We have achieved a real implementation of the scheme on FreeBSD and tested the real system over Internet with voice traffic. We show that this scheme can dramatically reduce handoff latency and improve TCP performance by offering shorter routes with loss-free handoffs and smooth, low-jitter voice stream.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126699350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信