2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops最新文献

筛选
英文 中文
Admission control based on OFDMA channel transformations 基于OFDMA信道变换的准入控制
J. Gross
{"title":"Admission control based on OFDMA channel transformations","authors":"J. Gross","doi":"10.1109/WOWMOM.2009.5282465","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282465","url":null,"abstract":"It is well known that channel-dependent OFDMA resource assignment algorithms provide a significant performance improvement compared to static (i.e. channelunaware) approaches. Such dynamic algorithms constantly adapt resource assignments to current channel states according to some objective function. Due to these dynamics, it is difficult to predict the resulting performance for such schemes given a certain scenario (characterized by the number of terminals in the cell and their average channel gains). Hence, previous work on admission control for OFDMA systems neglects the performance improvement from channel-dependent resource assignments and bases analysis on the average channel gains instead. In this paper we provide for the first time an analytical framework for admission control in OFDMA systems applying channel-dependent resource assignments. The framework is based on fundamental transformations of the channel gains caused by the channel-dependent assignment algorithms. We provide closed-form expressions for these transformations and derive from them probability functions for the rate achieved per terminal and frame. These functions can then be used for admission control as demonstrated in this paper for Voice-over-IP streams in IEEE 802.16e systems.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115236844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A plant-and-play wireless sensor network system for gate monitoring 一种用于大门监控的无线传感器网络系统
R. Sudhaakar, Ameya Sanzgiri, M. Demirbas, C. Qiao
{"title":"A plant-and-play wireless sensor network system for gate monitoring","authors":"R. Sudhaakar, Ameya Sanzgiri, M. Demirbas, C. Qiao","doi":"10.1109/WOWMOM.2009.5282488","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282488","url":null,"abstract":"We present a practical plant-and-play wireless sensor network system for entry-exit monitoring. Our system is easily configurable and robust, making it feasible to be deployed in a wide range of entry-exit monitoring applications. At the core of our system lies a novel MAC protocol that is self-synchronizing. Notably, our MAC protocol allows the nodes to maintain a very low duty cycle (the radios are in sleep mode 100% of the time in the absence of detections), while also enabling quick synchronization of the nodes (when needed) for a consistent classification of entry or exit events. We have deployed this system for monitoring a faculty parking lot at our university and integrated it with an SMS notification system to provide information on the availability of parking spots on demand. We present the parking lot occupancy trends obtained through this deployment and discuss some of the reliability issues encountered.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A lightweight localization architecture and application for opportunistic networks 机会网络的轻量级定位体系结构和应用
Michela Papandrea, S. Vanini, S. Giordano
{"title":"A lightweight localization architecture and application for opportunistic networks","authors":"Michela Papandrea, S. Vanini, S. Giordano","doi":"10.1109/WOWMOM.2009.5282438","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282438","url":null,"abstract":"Mobile communication is increasingly becoming part of everyday life. Haggle (www.haggleproject.org) is an innovative project that exploits human mobility for creating an invisible social network to enable communication in the presence of intermittent network connectivity. Mobile devices equipped with network interfaces, may in fact (temporarily) be out of range of the Internet infrastructure, and thereby unable to access Internet services. However, these devices may often be in range of other networked devices, or pass by an area where some type of connectivity is available (e.g. WiFi hotspots) and may be able to perform useful networking transactions involving local exchanges of data, exploiting, in this way, the opportunistic communication. One of the mechanisms for realizing the opportunistic communication is by taking advantage of context information (such as location) for correlating on-line social and physical networks. This, together with the need for information regarding devices locations and the ‘pervasive’ presence of wireless networks in indoor environments, suggested us to implement a lightweight application able to localize mobile devices, exploiting opportunistic networking.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126932627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An efficient wireless communication protocol for secured transmission of content-sensitive multimedia data 一种有效的无线通信协议,用于安全传输内容敏感的多媒体数据
J. Light, O. K. Ikejiani
{"title":"An efficient wireless communication protocol for secured transmission of content-sensitive multimedia data","authors":"J. Light, O. K. Ikejiani","doi":"10.1109/WOWMOM.2009.5282394","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282394","url":null,"abstract":"Availability of content-sensitive multimedia data by wireless, anytime anywhere poses many challenges. These systems have to cope up with the security, connectivity, packet loss, signal-strength and channel issues of a wireless connection without compromising the privacy and trust issues of the sensitive data. In this paper a wireless communication protocol is presented which manages end-to-end transmission of content-sensitive multimedia data using a TCP/IP connection. The system proposed here introduces additional security mechanism to existing SSL using echo-tunneling, data segregation and separate communication scheme for privacy and security safeguards. XML minimization is introduced to improve the speed of delivery.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129904655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Minimizing energy consumption by power-efficient radio configuration in fixed broadband wireless networks 在固定宽带无线网络中,通过高效节能的无线电配置,最大限度地减少能源消耗
D. Coudert, Napoleão Nepomuceno, H. Rivano
{"title":"Minimizing energy consumption by power-efficient radio configuration in fixed broadband wireless networks","authors":"D. Coudert, Napoleão Nepomuceno, H. Rivano","doi":"10.1109/WOWMOM.2009.5282434","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282434","url":null,"abstract":"In this paper, we investigate on minimizing the energy consumption of a fixed broadband wireless network through a joint optimization of data routing and radio configuration. Every link holds a set of power-efficient configurations, each of them associating a capacity with its energy cost. The optimization problem involves deciding the network's configuration and flows that minimize the total energy consumption. An exact mathematical formulation of the problem is presented. It relies on a minimum cost multicommodity flow with step increasing cost functions. We then propose a piecewise linear convex function that provides a good approximation of the energy consumption on the links, and present a relaxation of the previous formulation that exploits the convexity of the cost functions. This yields lower bounds on the energy consumption, and finally a heuristic algorithm based on the fractional optimum is employed to produce feasible solutions. Our models are validated through extensive experiments.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"58-60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116258229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proactive radio resource management using optimal stopping theory 基于最优停止理论的主动无线电资源管理
M. Poulakis, S. Vassaki, S. Hadjiefthymiades
{"title":"Proactive radio resource management using optimal stopping theory","authors":"M. Poulakis, S. Vassaki, S. Hadjiefthymiades","doi":"10.1109/WOWMOM.2009.5282456","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282456","url":null,"abstract":"In this paper, we focus on proactive radio resource management schemes that retain the quality of the individual connections by pre-reserving the needed resources in a cellular network. We propose a new scheme, which improves older proactive solutions. Typically, in such solutions an improvement in call dropping probability negatively impacts new call blocking probability. We improve this framework by careful, fine-grained time scheduling of the proactive resource management. We adopt optimal stopping theory for our solution. Our findings are quite promising for the broader framework of proactive resource management and mobile computing.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121532524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A CARMEN mesh experience: deployment and results CARMEN网格体验:部署和结果
P. Serrano, A. D. Oliva, C. Bernardos, I. Soto, A. Banchs, A. Azcorra
{"title":"A CARMEN mesh experience: deployment and results","authors":"P. Serrano, A. D. Oliva, C. Bernardos, I. Soto, A. Banchs, A. Azcorra","doi":"10.1109/WOWMOM.2009.5282418","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282418","url":null,"abstract":"When there is no wired connectivity, wireless mesh networks (WMNs) can provide Internet access with lower cost and greater flexibility than traditional approaches. This has motivated the design of new protocols and algorithms for WMNs, and recently the deployment of experimental prototypes. In this paper we add to these previous works with the performance evaluation of a first CARMEN deployment, with the following distinguishing features: i) it is an indoor deployment, ii) it is used by real users to connect to the Internet, and iii) it is built using off-the-shelf hardware. The results show that mesh technology can provide users with a satisfactory Internet experience, and motives further research along this line.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A prevention approach to scrambling attacks in WiMAX networks WiMAX网络中干扰攻击的预防方法
Po-Wen Chi, C. Lei
{"title":"A prevention approach to scrambling attacks in WiMAX networks","authors":"Po-Wen Chi, C. Lei","doi":"10.1109/WOWMOM.2009.5282482","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282482","url":null,"abstract":"WiMAX is a telecommunication technology. It is based on IEEE802.16 family and provides the network service with large coverage, high data rate and mobility. Since IEEE802.16 series are connection-based wireless technologies, WiMAX is exposed to a special kind of DoS attacks which can target a specific victim connection without influencing the others. This paper will introduce this scrambling attack in WiMAX networks in detail and will provide a prevention approach.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125846267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A queuing modeling approach for Load-Aware Route Selection in heterogeneous mesh networks 异构网状网络中负载感知路由选择的排队建模方法
R. Bruno, M. Conti, A. Pinizzotto
{"title":"A queuing modeling approach for Load-Aware Route Selection in heterogeneous mesh networks","authors":"R. Bruno, M. Conti, A. Pinizzotto","doi":"10.1109/WOWMOM.2009.5282474","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282474","url":null,"abstract":"Wireless mesh networks are primarily used to provide Internet access by sharing the Internet connections of a limited number of gateways. If traffic is routed in the mesh without considering load distribution, unevenly network congestion may arise and some gateways may rapidly get overloaded, which causes a significant reduction of the network capacity. To address this issue, in this paper we firstly develop a queuing network model that accurately predicts the residual capacity of paths in heterogeneous mesh networks, and precisely identify network bottlenecks. By taking advantage of this model, we design a novel Load-Aware Route Selection algorithm, named LARS, which improves the network capacity. This objective is obtained by allowing each mesh node to distribute the traffic load among multiple gateways in order to ensure evenly utilization of Internet connections. Simulation results show that LARS significantly outperforms shortest path routing using contentionaware link costs, achieving throughput improvements of up to 210% in the considered network scenarios.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122286260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Intelligent network synchronization for energy saving in low duty cycle MAC protocols 低占空比MAC协议下的节能智能网络同步
Pranesh Sthapit, Jae-Young Pyun
{"title":"Intelligent network synchronization for energy saving in low duty cycle MAC protocols","authors":"Pranesh Sthapit, Jae-Young Pyun","doi":"10.1109/WOWMOM.2009.5282476","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282476","url":null,"abstract":"Several MAC protocols such as S-MAC, T-MAC, DSMAC, and TEEM have exploited scheduled sleep/listen cycles to conserve energy in sensor networks. These protocols use periodic SYNC packet in their SYNC period to follow the same schedule with their neighbors. We have found that these protocols use around 40% of their listen period for SYNC period. In an average, unused SYNC periods consume more than 20% of the total energy consumption. In this paper, we analyze the periodic nature of SYNC packet and develop a new algorithm, named as intelligent network synchronization (INS), which exploits the periodic nature of SYNC packet to reduce energy consumption. The proposed INS makes nodes bypass their own SYNC period by monitoring sleep/listen cycles of their each neighbor. We evaluate INS through both mathematical analysis and simulation. These results show the achievement of up to 25% of energy saving.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信