{"title":"Multiuser Effective Capacity analysis for Queue Length Based Rate Maximum wireless scheduling","authors":"Zhengyong Feng, Guang-jun Wen, Chang Wen Chen","doi":"10.1109/ICCChina.2012.6356922","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356922","url":null,"abstract":"Recently the Effective Capacity of multi-user wireless scheduling has been analyzed based on large deviation principle. The users' queue length distribution bound of wireless scheduling algorithm such as round robin and rate maximum was discussed based on Effective Capacity analysis. But for Queue Length Based (QLB) Rate Maximum scheduling algorithm, the analysis result is only limited to system bound performance and not for each user's bound performance. In this paper we consider each user's amount of input traffic and channel statistical characteristics and introduce a new Effective Capacity analysis model for QLB scheduling algorithm. The queue length distribution bound of the QLB scheduling algorithm for each user is then predicted by the proposed analysis model. Based on the predicted queue length distribution bound, we can set different queue length threshold, that is, delay constraint (queue length can be translated to delay) for each user to obtain different queue length violation (or delay constraint violation or queue overflow) probability. Then the effect of each user's amount of input traffic to their queue length (or delay constraint) violation probability in multiuser environment is analyzed. The proposed analysis model and the estimation results have been verified by numerical simulations.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134086356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A centrally-controlled intelligent protection switching scheme for WDM-PONs","authors":"Min Zhu, W. Zhong, S. Xiao","doi":"10.1109/ICCChina.2012.6356887","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356887","url":null,"abstract":"Several protection schemes have been proposed for wavelength division multiplexed passive optical networks (WDM-PONs). However these schemes only work under the assumption that all the optical network units (ONUs) and the optical light terminal (OLT) continuously transmit optical signals. In practice, some ONUs may be in sleep mode to save power consumption or may be shut down whenever users are offline. Under such scenarios, the existing schemes would not work. To deal with more practical operation scenarios, we propose a centrally controlled intelligent protection switching scheme for survivable WDM-PONs. It provides 1:1 downstream protection and 1+1 upstream protection capabilities. A novel logic decision unit in conjunction with a power monitoring unit is implemented in the OLT to enable the intelligent protection switching in more practical operation scenarios. Moreover, by monitoring the optical power of each channel on both working and protection paths, our proposed protection scheme can tell the connection status of every fiber path, thus facilitating a faster failure recovery. The scheme feasibility is experimentally verified with 10 Gbit/s downstream and 1.25 Gbit/s upstream transmissions.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134366852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical performance evaluation of data dissemination mechanisms for spot applications","authors":"A. E. Fawal, J. Boudec, A. Aziz","doi":"10.1109/ICCChina.2012.6356977","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356977","url":null,"abstract":"We evaluate, by measurements on a real testbed, the performance of networking services required for spot applications. We call a “spot application” an application for smartphones (such as “Ad-hoc Flash Sales”) that disseminates information in a local neighborhood through hop-by-hop wireless forwarding. The dissemination environment is challenging. It is open-ended, and highly dynamic with very limiting resource constraints. We define five success criteria that are required by a spot application to ensure a sustainable dissemination. They cover issues such as adaptability, resource conserving and co-existence with TCP applications. We evaluate a package of mechanisms and we identify how those, through their interaction, can altogether meet these criteria. This package includes flow control, forwarding factor control and buffer management. Our measurements are carried out on a realistic testbed composed of 50 wireless devices. Our metrics include spread, application rate, forwarding factor and delay. Some findings are: blind mechanisms can interact among each other to meet the success criteria; aging entails intolerable processing complexity for smartphones; and TTL-based buffer management performs poorly with large buffer size.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134390646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of express forwarding schemes in wireless mesh networks","authors":"Jiazhen Zhou, K. Mitchell, R. Hu, Y. Qian","doi":"10.1109/ICCChina.2012.6356872","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356872","url":null,"abstract":"In wireless mesh networks that are built using IEEE 802.11 techniques, there are significant problems in maintaining fairness and low delay to provide QoS for long-hop flows. To address these issues, express forwarding has been proposed. However, existing studies of express forwarding are simulation based, and the main benefits that have been demonstrated are limited to shortened delay for long-hop flows. In contrast, we present an analytical model in this paper that considers the possible interruptions of the express forwarding mechanism. Based on this model, we evaluate the fairness and efficiency of express forwarding with different queue management schemes. The evaluation shows the benefits of express forwarding in terms of removing spatial bias, obtaining higher end-to-end throughput, and achieving more efficient use of resources.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128936896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combined bulk and per-tone relay selection in cooperative OFDM systems","authors":"Yixin Li, Wenjin Wang, F. Zheng","doi":"10.1109/ICCChina.2012.6356932","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356932","url":null,"abstract":"In this paper, we propose a combined bulk and per-tone transmission scheme for distributed cooperative decode-and-forward OFDM system. A subset L out of N available relay nodes is first chosen and then per-tone selection is performed within the subset. An approximated expression for the outage probability of proposed scheme is given. Monte Carlo simulations validate our analysis and show the performance compared with existing schemes. The proposed scheme outperforms the bulk based relay selection scheme, with a modicum of complexity compared with per-tone based relay selection scheme.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131172067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fadhil Firyaguna, Ana Carolina O. Christofaro, Everton A. L. Andrade, T. S. Bonfim, Marcelo M. Carvalho
{"title":"Throughput performance of V-BLAST-enabled wireless ad hoc networks","authors":"Fadhil Firyaguna, Ana Carolina O. Christofaro, Everton A. L. Andrade, T. S. Bonfim, Marcelo M. Carvalho","doi":"10.1109/ICCChina.2012.6356971","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356971","url":null,"abstract":"This paper studies the throughput performance of wireless ad hoc networks when nodes are equipped with the Vertical Bell Labs Layered Space-Time (V-BLAST) system. To accomplish this task, we present an implementation of V-BLAST in the ns-3 network simulator that is based on the original work of Loyka and Gagnon, who have developed analytical expressions for the average bit error rate of V-BLAST. Such an implementation consists of simple modifications to the IEEE 802.11b that include not only aspects related to SINR and BER computation, but also how clear channel assessment is performed and how the four-way handshake mechanism is set for V-BLAST transmissions. We investigate the average network throughput for random topologies not fully connected under different antenna configurations. Simulation results show that, depending on the antenna configuration, significant quasi-linear network throughput gains can be achieved, especially if the diversity gains of V-BLAST are also exploited.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133491454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Fan, L. Zhao, Xuemin Shen, Hui Li, Yintang Yang
{"title":"Smart-blocking file storage method in cloud computing","authors":"K. Fan, L. Zhao, Xuemin Shen, Hui Li, Yintang Yang","doi":"10.1109/ICCChina.2012.6356951","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356951","url":null,"abstract":"Cloud storage is one of the underlying services in cloud computing. However, there are some critical issues in file storage which should be resolved urgently, such as the blocking file storage. In order to solve the shortages of hot file storage and parallel computing support issues in fixed-blocking storage, we propose a smart-blocking file storage method in this paper. By setting up 6 grouping factors, the method can determine whether the file should be blocked or not automatically depending on the size of the file and the client bandwidth. The proposed method can block the file into similar size sub-blocks as large as possible when the file is judged to be blocked. Normally the size of the last sub-block is smaller than other similar sub-blocks. But the gap maintains within the size of the next smaller grouping factor. The Metadata server can address the hot files when the file is blocked. In addition, the proposed method also defines the file uniformity and the system uniformity to quantitatively describe the uniformity of sub-blocks in the file and in the whole system. Analysis and simulation demonstrate the proposed method has better system uniformity in file storage, the node load balance caused by hot file, and a large number of file fragments reduction.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115571078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noncoherent coded space-time modulation for a large number of transmit antennas","authors":"Yen-ming Chen, Yeong-Luh Ueng, Hau-Jung Shiau, Dung-Rung Hsieh, Jen-Yuan Hsu, Pangan Ting","doi":"10.1109/ICCChina.2012.6356905","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356905","url":null,"abstract":"Recently, a turbo-coded noncoherent space-time modulation scheme, which is aimed at providing both a high data transmission rate and a low receiving complexity, was proposed for noncoherent block fading channels. However, in cases where a large number of transmit antennas exist, the turbo code does not match well with the noncoherent space-time modulation scheme, and results in performance degradation. In this paper, we first investigate a coded noncoherent space-time modulation scheme using an irregular low-density parity-check (LDPC) code. We also design a turbo-coded noncoherent space-time modulation scheme based on the codeword-interleaving strategy. The coded symbols mapped from adjacent codewords are interleaved into the same signal vectors, and the soft information from adjacent codewords are allowed to be exchanged at the receiver. When comparing to the conventional turbo-coded scheme, both proposed schemes achieve a significant improvement in BER performance.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124590713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Zheng, Jiangyuan Li, Kai‐Kit Wong, A. Petropulu, B. Ottersten
{"title":"Using simple relays to improve physical-layer security","authors":"G. Zheng, Jiangyuan Li, Kai‐Kit Wong, A. Petropulu, B. Ottersten","doi":"10.1109/ICCChina.2012.6356902","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356902","url":null,"abstract":"This paper studies different uses of two cooperating relays to improve the secrecy rate of a wiretap channel. These two relays are assumed to perform only simple functions: either amplify-and-forward (AF) or jamming. Complex functions such as decode-and-forward (DF) are not considered. We study three modes of cooperation: i) cooperative jamming (CJ), ii) AF-aided beamforming and iii) mixed AF-aided beamforming and CJ, all with individual relay power constraints. While i) is known in the literature, our efforts are spent on ii) and iii). In particular, for iii), we assume that the jamming signals in two communication stages are correlated, giving rise to improved performances. We also propose a heuristic approach for selecting the appropriate cooperating mode. Simulation results illustrate the performance gain of each scheme under different channel conditions and the effectiveness of the proposed mode selection method.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation and analysis of bundle protocol in cislunar communications","authors":"D. Zhou, Mingchuan Yang, Qing Guo","doi":"10.1109/ICCChina.2012.6356945","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356945","url":null,"abstract":"The bundle protocol (BP) is developed to solve the new problems in deep space exploration. To date, little work has been done in evaluating the performance of BP applied to an interplanetary Internet involving frequent link disruptions. This paper builds a PC-based Deep Space Communication Test-bed. It consists of three parts, the space link simulator, the high-speed Ethernet switch and the Linux-based personal computers. Compared with the simulation in OPNET, NS2 and other simulation software, the experimental results from the Test-bed will be closer to the real environment. The paper presents an experimental evaluation of BP over a typical three-node interplanetary structure involving frequent link disruptions. The performances were analyzed to compare the throughput of BP with custody transfer and BP without custody transfer under the various scenarios. The results show that BP without custody performs better than BP with custody in a cislunar environment.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124079846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}