{"title":"Admission control based on OFDMA channel transformations","authors":"J. Gross","doi":"10.1109/WOWMOM.2009.5282465","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282465","url":null,"abstract":"It is well known that channel-dependent OFDMA resource assignment algorithms provide a significant performance improvement compared to static (i.e. channelunaware) approaches. Such dynamic algorithms constantly adapt resource assignments to current channel states according to some objective function. Due to these dynamics, it is difficult to predict the resulting performance for such schemes given a certain scenario (characterized by the number of terminals in the cell and their average channel gains). Hence, previous work on admission control for OFDMA systems neglects the performance improvement from channel-dependent resource assignments and bases analysis on the average channel gains instead. In this paper we provide for the first time an analytical framework for admission control in OFDMA systems applying channel-dependent resource assignments. The framework is based on fundamental transformations of the channel gains caused by the channel-dependent assignment algorithms. We provide closed-form expressions for these transformations and derive from them probability functions for the rate achieved per terminal and frame. These functions can then be used for admission control as demonstrated in this paper for Voice-over-IP streams in IEEE 802.16e systems.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115236844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Sudhaakar, Ameya Sanzgiri, M. Demirbas, C. Qiao
{"title":"A plant-and-play wireless sensor network system for gate monitoring","authors":"R. Sudhaakar, Ameya Sanzgiri, M. Demirbas, C. Qiao","doi":"10.1109/WOWMOM.2009.5282488","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282488","url":null,"abstract":"We present a practical plant-and-play wireless sensor network system for entry-exit monitoring. Our system is easily configurable and robust, making it feasible to be deployed in a wide range of entry-exit monitoring applications. At the core of our system lies a novel MAC protocol that is self-synchronizing. Notably, our MAC protocol allows the nodes to maintain a very low duty cycle (the radios are in sleep mode 100% of the time in the absence of detections), while also enabling quick synchronization of the nodes (when needed) for a consistent classification of entry or exit events. We have deployed this system for monitoring a faculty parking lot at our university and integrated it with an SMS notification system to provide information on the availability of parking spots on demand. We present the parking lot occupancy trends obtained through this deployment and discuss some of the reliability issues encountered.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A lightweight localization architecture and application for opportunistic networks","authors":"Michela Papandrea, S. Vanini, S. Giordano","doi":"10.1109/WOWMOM.2009.5282438","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282438","url":null,"abstract":"Mobile communication is increasingly becoming part of everyday life. Haggle (www.haggleproject.org) is an innovative project that exploits human mobility for creating an invisible social network to enable communication in the presence of intermittent network connectivity. Mobile devices equipped with network interfaces, may in fact (temporarily) be out of range of the Internet infrastructure, and thereby unable to access Internet services. However, these devices may often be in range of other networked devices, or pass by an area where some type of connectivity is available (e.g. WiFi hotspots) and may be able to perform useful networking transactions involving local exchanges of data, exploiting, in this way, the opportunistic communication. One of the mechanisms for realizing the opportunistic communication is by taking advantage of context information (such as location) for correlating on-line social and physical networks. This, together with the need for information regarding devices locations and the ‘pervasive’ presence of wireless networks in indoor environments, suggested us to implement a lightweight application able to localize mobile devices, exploiting opportunistic networking.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126932627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient wireless communication protocol for secured transmission of content-sensitive multimedia data","authors":"J. Light, O. K. Ikejiani","doi":"10.1109/WOWMOM.2009.5282394","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282394","url":null,"abstract":"Availability of content-sensitive multimedia data by wireless, anytime anywhere poses many challenges. These systems have to cope up with the security, connectivity, packet loss, signal-strength and channel issues of a wireless connection without compromising the privacy and trust issues of the sensitive data. In this paper a wireless communication protocol is presented which manages end-to-end transmission of content-sensitive multimedia data using a TCP/IP connection. The system proposed here introduces additional security mechanism to existing SSL using echo-tunneling, data segregation and separate communication scheme for privacy and security safeguards. XML minimization is introduced to improve the speed of delivery.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129904655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimizing energy consumption by power-efficient radio configuration in fixed broadband wireless networks","authors":"D. Coudert, Napoleão Nepomuceno, H. Rivano","doi":"10.1109/WOWMOM.2009.5282434","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282434","url":null,"abstract":"In this paper, we investigate on minimizing the energy consumption of a fixed broadband wireless network through a joint optimization of data routing and radio configuration. Every link holds a set of power-efficient configurations, each of them associating a capacity with its energy cost. The optimization problem involves deciding the network's configuration and flows that minimize the total energy consumption. An exact mathematical formulation of the problem is presented. It relies on a minimum cost multicommodity flow with step increasing cost functions. We then propose a piecewise linear convex function that provides a good approximation of the energy consumption on the links, and present a relaxation of the previous formulation that exploits the convexity of the cost functions. This yields lower bounds on the energy consumption, and finally a heuristic algorithm based on the fractional optimum is employed to produce feasible solutions. Our models are validated through extensive experiments.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"58-60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116258229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive radio resource management using optimal stopping theory","authors":"M. Poulakis, S. Vassaki, S. Hadjiefthymiades","doi":"10.1109/WOWMOM.2009.5282456","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282456","url":null,"abstract":"In this paper, we focus on proactive radio resource management schemes that retain the quality of the individual connections by pre-reserving the needed resources in a cellular network. We propose a new scheme, which improves older proactive solutions. Typically, in such solutions an improvement in call dropping probability negatively impacts new call blocking probability. We improve this framework by careful, fine-grained time scheduling of the proactive resource management. We adopt optimal stopping theory for our solution. Our findings are quite promising for the broader framework of proactive resource management and mobile computing.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121532524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Serrano, A. D. Oliva, C. Bernardos, I. Soto, A. Banchs, A. Azcorra
{"title":"A CARMEN mesh experience: deployment and results","authors":"P. Serrano, A. D. Oliva, C. Bernardos, I. Soto, A. Banchs, A. Azcorra","doi":"10.1109/WOWMOM.2009.5282418","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282418","url":null,"abstract":"When there is no wired connectivity, wireless mesh networks (WMNs) can provide Internet access with lower cost and greater flexibility than traditional approaches. This has motivated the design of new protocols and algorithms for WMNs, and recently the deployment of experimental prototypes. In this paper we add to these previous works with the performance evaluation of a first CARMEN deployment, with the following distinguishing features: i) it is an indoor deployment, ii) it is used by real users to connect to the Internet, and iii) it is built using off-the-shelf hardware. The results show that mesh technology can provide users with a satisfactory Internet experience, and motives further research along this line.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A prevention approach to scrambling attacks in WiMAX networks","authors":"Po-Wen Chi, C. Lei","doi":"10.1109/WOWMOM.2009.5282482","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282482","url":null,"abstract":"WiMAX is a telecommunication technology. It is based on IEEE802.16 family and provides the network service with large coverage, high data rate and mobility. Since IEEE802.16 series are connection-based wireless technologies, WiMAX is exposed to a special kind of DoS attacks which can target a specific victim connection without influencing the others. This paper will introduce this scrambling attack in WiMAX networks in detail and will provide a prevention approach.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125846267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A queuing modeling approach for Load-Aware Route Selection in heterogeneous mesh networks","authors":"R. Bruno, M. Conti, A. Pinizzotto","doi":"10.1109/WOWMOM.2009.5282474","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282474","url":null,"abstract":"Wireless mesh networks are primarily used to provide Internet access by sharing the Internet connections of a limited number of gateways. If traffic is routed in the mesh without considering load distribution, unevenly network congestion may arise and some gateways may rapidly get overloaded, which causes a significant reduction of the network capacity. To address this issue, in this paper we firstly develop a queuing network model that accurately predicts the residual capacity of paths in heterogeneous mesh networks, and precisely identify network bottlenecks. By taking advantage of this model, we design a novel Load-Aware Route Selection algorithm, named LARS, which improves the network capacity. This objective is obtained by allowing each mesh node to distribute the traffic load among multiple gateways in order to ensure evenly utilization of Internet connections. Simulation results show that LARS significantly outperforms shortest path routing using contentionaware link costs, achieving throughput improvements of up to 210% in the considered network scenarios.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122286260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent network synchronization for energy saving in low duty cycle MAC protocols","authors":"Pranesh Sthapit, Jae-Young Pyun","doi":"10.1109/WOWMOM.2009.5282476","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282476","url":null,"abstract":"Several MAC protocols such as S-MAC, T-MAC, DSMAC, and TEEM have exploited scheduled sleep/listen cycles to conserve energy in sensor networks. These protocols use periodic SYNC packet in their SYNC period to follow the same schedule with their neighbors. We have found that these protocols use around 40% of their listen period for SYNC period. In an average, unused SYNC periods consume more than 20% of the total energy consumption. In this paper, we analyze the periodic nature of SYNC packet and develop a new algorithm, named as intelligent network synchronization (INS), which exploits the periodic nature of SYNC packet to reduce energy consumption. The proposed INS makes nodes bypass their own SYNC period by monitoring sleep/listen cycles of their each neighbor. We evaluate INS through both mathematical analysis and simulation. These results show the achievement of up to 25% of energy saving.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}