2009 IEEE Wireless Communications and Networking Conference最新文献

筛选
英文 中文
Spatial Interference Cancellation Algorithm 空间干扰消除算法
2009 IEEE Wireless Communications and Networking Conference Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917972
Rizwan Ghaffar, R. Knopp
{"title":"Spatial Interference Cancellation Algorithm","authors":"Rizwan Ghaffar, R. Knopp","doi":"10.1109/WCNC.2009.4917972","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917972","url":null,"abstract":"Future wireless communication systems characterized by tight frequency reuse, adaptive modulation and coding schemes and diversified data services will be interference limited by interfering signals of diverse rates and strengths. We propose in this paper a low complexity algorithm for spatial interference cancellation in the presence of one strong interferer. This algorithm is based on an earlier proposed low complexity max log MAP detector. It encompasses two strategies for interference cancellation which have been termed as partial interference cancellation (PIC) and absolute interference cancellation (AIC). Their corresponding selection in the receiver is dictated by the relative strength and the rate of interfering stream. In the scenario of interfering stream being relatively weak or of higher rate as compared to the desired stream, the mobile station (MS) resorts to PIC while when the interfering stream is relatively stronger or is of lower rate, the MS switches to AIC. Finally we analyze the performance of proposed algorithm by simulations.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123888686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Analysis of Transparent Mode IEEE 802.16j System Performance with Varying Numbers of Relays and Associated Transmit Power 不同中继数和相关发射功率下透明模式IEEE 802.16j系统性能分析
2009 IEEE Wireless Communications and Networking Conference Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917596
Vasken Genc, S. Murphy, John Murphy
{"title":"Analysis of Transparent Mode IEEE 802.16j System Performance with Varying Numbers of Relays and Associated Transmit Power","authors":"Vasken Genc, S. Murphy, John Murphy","doi":"10.1109/WCNC.2009.4917596","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917596","url":null,"abstract":"In this paper, the system capacity of IEEE 802.16j systems operating in transparent mode is investigated under varying numbers of relays and associated transmit power. The study is based on an extended variant of an analytical model defined in previous work and used to determine the throughput gain that can be achieved under a max-min fairness constraint. The study finds that significant overall throughput gains can be achieved over 802.16e systems: 125% and 55% gain with and without spatial reuse, respectively. However, the overall throughput gain drops as the transmit power at the relays (RSs) decreases despite the fact that a greater number of concurrent transmissions can be achieved due to less interference among the RSs' transmissions. Decreasing the transmit power at the RSs eventually leads to a significant reduction of the achievable throughput gain even though a large number of RSs are deployed in scenarios with or without spatial reuse.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125292002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Novel Distributed Interference Mitigation Technique using Power Planning 一种基于功率规划的分布式干扰抑制技术
2009 IEEE Wireless Communications and Networking Conference Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917522
V. Corvino, D. Gesbert, R. Verdone
{"title":"A Novel Distributed Interference Mitigation Technique using Power Planning","authors":"V. Corvino, D. Gesbert, R. Verdone","doi":"10.1109/WCNC.2009.4917522","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917522","url":null,"abstract":"This paper introduces a new method for distributed interference mitigation in full spectral-reuse OFDMA cellular networks. This considers the use of pre-defined frequency-domain power profiles helping make the interference more predictable across the subcarriers. We propose a method for computing the power profiles so as to maximize the capacity of the system in case of maximum throughput scheduling, and a simple linear model implemented also in presence of a fairness-oriented scheduler. We prove that our idea of power planning gives substantial improvements in terms of outage capacity in case of fairness-oriented scheduling. The advantage of our method over previously proposed approaches for interference mitigation based on power control is that our algorithm is fully distributed and does not require any exchange of signaling between the different cells.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122634275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Modelling of Heterogeneous Wireless Networks under Batch Arrival Traffic with Communication Locality 具有通信位置性的批量到达流量下的异构无线网络建模
2009 IEEE Wireless Communications and Networking Conference Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917810
Yulei Wu, G. Min, Guojun Wang, Jianmin Jiang
{"title":"Modelling of Heterogeneous Wireless Networks under Batch Arrival Traffic with Communication Locality","authors":"Yulei Wu, G. Min, Guojun Wang, Jianmin Jiang","doi":"10.1109/WCNC.2009.4917810","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917810","url":null,"abstract":"Wireless Mesh Networks (WMNs) have been proposed to provide rapid deployment and easy reconfiguration of wireless broadband communications. WMNs can interoperate with WiMAX, Wi-Fi, sensor, or cellular networks in the hybrid working environments to relay packets robustly among these heterogeneous networks and significantly extend the coverage of individual wireless access networks. Many recent studies have shown that the packet arrival process in wireless networks exhibits the batch arrival nature and the communication locality has an important impact on the network capacity. With the aim of obtaining an effective performance evaluation tool of wireless networks, this paper proposes an analytical model for heterogeneous wireless networks integrated by WMNs in the presence of batch arrival traffic with communication locality. The validity of the analytical model is demonstrated through extensive comparison between analytical and simulation results.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bandwidth Efficient Key Distribution for Secure Multicast in Dynamic Wireless Mesh Networks 动态无线Mesh网络中安全组播的带宽高效密钥分配
2009 IEEE Wireless Communications and Networking Conference Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917606
Seungjae Shin, Junbeom Hur, Hanjin Lee, H. Yoon
{"title":"Bandwidth Efficient Key Distribution for Secure Multicast in Dynamic Wireless Mesh Networks","authors":"Seungjae Shin, Junbeom Hur, Hanjin Lee, H. Yoon","doi":"10.1109/WCNC.2009.4917606","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917606","url":null,"abstract":"In the near future, various multicast based services will be provided over wireless mesh networks. For secure multicast services, various tree based group key management schemes have been introduced until now. Traditional tree based approaches mainly focus on reducing the number of rekeying messages transmitted by the key distribution center. However, they do not consider the network bandwidth used for transmitting each rekeying message.We propose a bandwidth efficient key tree management scheme for dynamic wireless mesh networks where membership changes occur frequently. Simulation results show that our scheme effectively reduces the bandwidth consumption used for rekeying compared to existing key tree schemes.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131762495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Power Efficiency Maximization in Cognitive Radio Networks 认知无线网络的功率效率最大化
2009 IEEE Wireless Communications and Networking Conference Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917912
D. J. Kadhim, Shimin Gong, Wenfang Xia, Wei Liu, W. Cheng
{"title":"Power Efficiency Maximization in Cognitive Radio Networks","authors":"D. J. Kadhim, Shimin Gong, Wenfang Xia, Wei Liu, W. Cheng","doi":"10.1109/WCNC.2009.4917912","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917912","url":null,"abstract":"Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the existence of optimal combination of parameters such that the power efficiency is maximized. Then we reformulate the objective function to incorporate the throughput. According to different constraints or degree of significance, we may put proper weight to each term so that we could obtain more preferable combination of parameters. Computer simulations have given the optimal solution curve for different weights. We can draw the conclusion that if we put more emphasis on power efficiency, the transmit power is a more critical parameter, however if throughput is more important, the effect of sensing time is significant.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116528359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
The Economy of Redundancy in Wireless Multi-Hop Networks 无线多跳网络中冗余的经济性
2009 IEEE Wireless Communications and Networking Conference Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917983
G. Egeland, P. Engelstad
{"title":"The Economy of Redundancy in Wireless Multi-Hop Networks","authors":"G. Egeland, P. Engelstad","doi":"10.1109/WCNC.2009.4917983","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917983","url":null,"abstract":"Due to frequent link failures in multi-hop wireless networks, redundancy can be an important feature. For example, when planning the structure of a backhaul mesh network for public access, it is common to introduce redundant nodes in the mesh network. These are called redundant, because they do not increase the network capacity under normal operation, due to the shortest-path metric of the routing protocol. Instead, their sole purpose is to increase the network reliability by providing failover links when a link in the shortest-path fails. This paper shows how to estimate the optimal number of redundant nodes for a given topology. In order to do so, a method to calculate the additional network reliability that results from introducing a redundant node to a given topology is also proposed.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127573733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Implementation of Audio Conferencing Testbed based on Wi-Fi MANET 基于Wi-Fi MANET的音频会议试验台的设计与实现
2009 IEEE Wireless Communications and Networking Conference Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917666
Wei Wang, B. Soong, Y. Chan
{"title":"Design and Implementation of Audio Conferencing Testbed based on Wi-Fi MANET","authors":"Wei Wang, B. Soong, Y. Chan","doi":"10.1109/WCNC.2009.4917666","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917666","url":null,"abstract":"Based on the technology of Mobile Ad-hoc Network (MANET), we design and implement an Audio Conferencing Testbed (ACT) that is used for a group of people to set up virtual audio conferencing room to complete certain mission in places where network infrastructure is unavailable. ACT is built on popular Windows operating system with off-the-shelf IEEE802.11 (a.k.a. Wi-Fi) adapters as the enabling technology. Little assumption is made during the development process in order to minimize the gap between a laboratory testbed and a fully-operational system. Some notable features of ACT include: 1) it makes use of distributed TDMA scheme to provide \"circuit-switched\" type of Quality-of-Service (QoS) guarantee for audio traffic; 2) its broadcast tree building algorithm is able to minimize the latency of message dissemination to the whole network; 3) the protocol running in ACT is able to predict radio link break due to mobility so that service interruption is reduced; 4) and relative position information is available at each node in the network. Our work is focused on the system aspect, and a series of experiments are conducted in real environment to verify the system design and evaluate its performance.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127625491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Integrating SIP-Based Network Mobility into IP Multimedia Subsystem 将基于sip协议的网络移动集成到IP多媒体子系统中
2009 IEEE Wireless Communications and Networking Conference Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917758
Wei-Kuo Chiang, An-Nie Ren, Ya-Chen Chung
{"title":"Integrating SIP-Based Network Mobility into IP Multimedia Subsystem","authors":"Wei-Kuo Chiang, An-Nie Ren, Ya-Chen Chung","doi":"10.1109/WCNC.2009.4917758","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917758","url":null,"abstract":"The combination of SIP-NEMO and IMS brings benefits of power saving, low complexity and few handoff to both end users and service providers. In this article we investigate the integration of SIP-NEMO in the IMS, and propose two interworking architectures: loosely coupled and tightly coupled. We also present three basic scenarios: registration, session establishment and optimized handoff with context transfer in the two architectures, respectively. The loosely coupled architecture maintains the original characteristics of SIP-NEMO and IMS. Control signals for the call setup are passed through the interrogating network in the IMS. The tightly coupled architecture utilizes the network agent of SIP-NEMO as a back-to-back user agent to integrate SIP-NEMO into IMS with minor modification of the IMS network and provides the security offered by IMS. The discussions on deployment and security issues show that the proposed approaches achieve the integration with minimal changes to the existing standards.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127999643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Contentious Feedback in Cellular Systems 蜂窝系统中有争议的反馈
2009 IEEE Wireless Communications and Networking Conference Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917637
A. Reznik, E. Zeira
{"title":"Contentious Feedback in Cellular Systems","authors":"A. Reznik, E. Zeira","doi":"10.1109/WCNC.2009.4917637","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917637","url":null,"abstract":"We consider the problem of counting mobile stations based on feedback they provide. For this problem we propose an anonymous contentious feedback mechanism which permits efficient counting and relate the resulting estimation problem to a well know combinatorial problem of \"coupon collection.\" Using this relationship, we analyze the estimation problem in an idealized setting. We find the ML estimator and demonstrate that it is inappropriate in this setting. We then propose an estimator which is shown to achieve good performance over a large range of parameters.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133234888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信