Hyungsik Ju, Seokwon Lee, D. Hong, Ki-Young Han, Jaeho Jeon
{"title":"Non-handover Based Mobility Management in Hierarchically Structured Cellular Networks","authors":"Hyungsik Ju, Seokwon Lee, D. Hong, Ki-Young Han, Jaeho Jeon","doi":"10.1109/CNSR.2010.17","DOIUrl":"https://doi.org/10.1109/CNSR.2010.17","url":null,"abstract":"Abstract—Hierarchical cell structure (HCS) is considered as a possible solution to support users in shadowing area or hot zone area. In HCS systems, both co-channel interference and mobility management are the most important problems. In this paper, we propose a new mobility management method that efficiently preserves the data rate of the mobile user passing small overlaid cell area. In the proposed method, handover is not used when the mobile user passes the overlaid cell area. Therefore, it is not affected by ping-pong and handover overhead. Instead, specific channel utilization is used to prevent co-channel interference and to guarantee quality of service in common channel. We show the procedure of the proposed mobility management method, and channel utilization in this method. We also evaluate the rate regions where the proposed method can support higher data rate than handover based method. System level simulation based on IEEE 802.16m system shows that the proposed method is more efficient in HCS system than handover-based method.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124948223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Ababneh, S. Selvadurai, J. Hassan, N. Boukhatem
{"title":"Topology Control for Wireless Sensor Networks with Irregular and Dynamic Radio Coverage","authors":"N. Ababneh, S. Selvadurai, J. Hassan, N. Boukhatem","doi":"10.1109/CNSR.2010.39","DOIUrl":"https://doi.org/10.1109/CNSR.2010.39","url":null,"abstract":"A critical issue in wireless sensor networks isrepresented by the limited availability of energy withinsensor nodes. An effective approach for energy conservationis scheduling sleep intervals for extraneous nodes, while theremaining nodes stay active to provide continuous service.Most previous solutions assumed a perfect radio conditionwith a static, circular coverage. However, in real situations,radio signals are very dynamic and irregular in theircoverage. This is especially true for wireless sensornetworks, which usually employ low quality radio modulesto reduce the cost. Assuming no location information isavailable, we approach the problem in this paper from twoaspects: space and time. We present a topology controlalgorithm, termed OTC, for sensor networks withconsideration of radio irregularity and dynamic radiocoverage. It uses two-hop neighborhood information to selecta subset of nodes to be active among all nodes in theneighborhood. Each node in the network selects its own setof active neighbors from among its one-hop neighbors. Thisset is determined such that it covers all two-hop nodes. OTCis evaluated against a well-known algorithm from theliterature, namely Span through realistic simulations usingTOSSIM. The results show that under dense deploymentand irregular and dynamic radio coverage, our algorithmoutperforms Span.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121552375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongguang Zhang, Hang Nguyen, N. Crespi, Shanmugalingam Sivasothy, T. Le, D. Zeghlache, Hui Wang
{"title":"A Metadata-Based Approach for Multimedia Service Mashup in IMS","authors":"Hongguang Zhang, Hang Nguyen, N. Crespi, Shanmugalingam Sivasothy, T. Le, D. Zeghlache, Hui Wang","doi":"10.1109/CNSR.2010.30","DOIUrl":"https://doi.org/10.1109/CNSR.2010.30","url":null,"abstract":"This paper addresses the important issues related to content delivery and service aggregation. We present a metadata-based approach for content and service combined delivery through IP Multimedia Subsystem (IMS). In our approach, the CAM4Home metadata model is adopted to enable a novel way of content provisioning by aggregating semantic-coherent content and service. Multimedia contents and related services are described as Collaborative Aggregated Multimedia (CAM) objects and aggregated into a CAM bundle for collaborative delivery. To apply this network-independent metadata model into the IMS architecture, we introduce a new entity named Multimedia Service Management (MSM) that is responsible for metadata processing and decision making. An example of multimedia broadcasting is given to demonstrate the proposed approach. Finally, we validate the novel approach through a prototyping system.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131358805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BER Performance of Convolutionally Encoded MIMO-CDMA Employing Permutation Spreading and Soft Decision Decoding","authors":"A. Mirzaee, C. D’amours","doi":"10.1109/CNSR.2010.54","DOIUrl":"https://doi.org/10.1109/CNSR.2010.54","url":null,"abstract":"In this paper we propose a soft output detector for theMIMO-CDMA systems with permutation spreading. Insuch systems, the spreading waveforms of each transmitantennas are dependent on the data to be transmitted. Inthe proposed system, information bits are convolutionallyencoded prior to being used in a MIMO-CDMA systemwith permutation spreading. Reliability of the detectedbits in the receiver is calculated in the form of LLRs andthen used as the input of a soft input Viterbi decoder. Theperformance of the proposed system is compared toconventional coded MIMO-CDMA systems.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116596629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WISH-RIBS: Broadcast Scheduling and Opportunistic Failure Recovery in Wireless Networks","authors":"B. Malhotra, I. Nikolaidis, M. Nascimento","doi":"10.1109/CNSR.2010.25","DOIUrl":"https://doi.org/10.1109/CNSR.2010.25","url":null,"abstract":"Broadcasting is an elementary problem in wireless networks in general, and energy-efficient solutions are important to resource-limited wireless sensor networks. This paper presents two contributions: (1) an (off-line) algorithm to produce an efficient wireless broadcast schedule, and (2) an (on-line) opportunistic recovery strategy from link failures that might occur during the execution of the broadcast protocol. In simulations we find that the proposed scheduling algorithm outperforms state-of-the-art solutions and that the link failure recovery strategy offers improved broadcast resilience across all studied scheduling strategies.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134433495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RF Sensing in the TV White Space","authors":"G. Chouinard","doi":"10.1109/CNSR.2010.34","DOIUrl":"https://doi.org/10.1109/CNSR.2010.34","url":null,"abstract":"New wireless systems expected to provide access to broadband networks are being considered for operation in the unused channels of the VHF and UHF TV bands. These new systems will have to avoid interference to TV broadcast operation and one way to achieve this will be by sensing the presence of broadcast operation in the area and change their operating frequency accordingly. This article deals with the feasibility of RF sensing considering the signal levels that need to be detected to protect broadcast operation in the TV bands. It is found that the sensitivity requirement to detect broadcast operation is much more demanding than in other RF sensing applications. An assessment of the level of difficulty of sensing broadcast signals, both TV and wireless microphone signals, is presented along with methods to ease the situation through collaborative sensing, use of wireless microphone beacons or access to incumbent databases.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121835752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Middleware Framework for Disconnection Tolerant Mobile Application Services","authors":"Sangwhan Cha, W. Du, Bernd J. Kurz","doi":"10.1109/CNSR.2010.14","DOIUrl":"https://doi.org/10.1109/CNSR.2010.14","url":null,"abstract":"Mobile services are prone to failures caused by the disruption of an active wireless access network connection due to the user’s movement to other networks or signal blocking (shadowing). Thus, proper mechanisms for disconnection tolerant mobile application services are needed. In this paper, we propose a middleware framework that transparently performs required functionality for users in order to provide continuous mobile services in case of network disruption. Such middleware framework provides an effective disconnection tolerant mobile application service.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122024410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Energy-Efficient Broadcast Protocol in MANETs: Design and Evaluation","authors":"Xiaoying Zhang, T. Kunz, Li Li, O. Yang","doi":"10.1109/CNSR.2010.32","DOIUrl":"https://doi.org/10.1109/CNSR.2010.32","url":null,"abstract":"Energy efficiency is a critical issue in mobile ad hoc networks (MANETs) for increasing the lifetime of the individual nodes as well as the overall network. In this paper, we propose a new energy-efficient broadcast protocol called EBOLSR, which adapts the energy-efficient OLSR (EOLSR) protocol to the broadcasting domain. In order to maximize the broadcasting network lifetime, we take neighboring nodes’ residual energy into consideration when selecting multipoint relay (MPR) nodes. We evaluate the performance of EBOLSR by using NS2 and compare it with three other broadcast protocols, Classical Flooding, Simplified Multicast Forwarding (SMF), and the Coding-based Broadcast (CodeBCast) protocol. Simulation results show that EBOLSR results in less energy consumption and longer network lifetime than Classical Flooding. We also explain why EBOLSR does not outperform SMF or CodeBCast in terms of energy consumption and network lifetime.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132309452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Using a Dynamic Shortest Path Algorithm in OLSRv2","authors":"U. Herberg","doi":"10.1109/CNSR.2010.12","DOIUrl":"https://doi.org/10.1109/CNSR.2010.12","url":null,"abstract":"MANET routing protocols are designed to scale up to thousands of routers with frequent changes of the topology. In preference, MANET routing protocols should also support constrained low-power devices. One of the bottlenecks of scalability in link-state routing protocols is the performance of the shortest path algorithm (e.g. Dijkstra). In this paper, we investigate the in-node performance of OLSRv2 and, in particular, study the benefits of using a dynamic shortest path (DSP) algorithm for this routing protocol. A DSP algorithm is an algorithm that adds or removes edges in the routing tree incrementally and calculates shortest paths, also incrementally. The performance in OLSRv2 with classic Dijkstra vs. DSP is evaluated, by comparing the CPU time for calculating paths in a large emulated network. Additionally, it is demonstrated that frequent topology changes due to mobility in MANETs lead to frequent routing table recalculations with only few routes updated each time. This property of MANETs makes the use of a DSP in OLSRv2 appropriate.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130933712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Testing of IEEE801.15.4/ZigBee Sensor Networks in Confined Area","authors":"A. Chehri, H. Mouftah, P. Fortier, H. Aniss","doi":"10.1109/CNSR.2010.62","DOIUrl":"https://doi.org/10.1109/CNSR.2010.62","url":null,"abstract":"The IEEE 802.15.4/ZigBee standard is considered as a potential candidate for wireless sensor and actuators networks. Several commercial platforms with IEEE 802.15.4/ZigBee support have been made available in the last few years, and an increasing number of operating systems specifically designed for sensor and actuator networks are evolving. Underground mining is considered to be one of most hazardous industrial activity. The industrial automation applications in the mining galleries can benefit from the recent technological advances. In fact, many approaches to reduce costs and improve performance have been examined. The main objective of this paper is the implementation and evaluation of wireless sensor networks for environmental data measurements in a real underground mine. Therefore, the nodes were evaluated in real operating conditions.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116083831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}