{"title":"Multiuser MIMO-OFDMA with Different QoS Using a Prioritized Channel Adaptive Technique","authors":"K. Hassan, G. Sidhu, W. Henkel","doi":"10.1109/ICCW.2009.5208104","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208104","url":null,"abstract":"In this paper, an orthogonal multiple access scheme is considered for different users with different quality of ser- vice (QoS) requirements. Therefore, the users are multiplexed using orthogonal frequency division multiple access (OFDMA) transmission. A multiple-input multiple-output (MIMO) antenna system is considered between the base-station (BS) and the existing mobile sets (MSs). In order to realize different QoS, the transmission bit-rates and powers are adapted to the various channel conditions with different margin separations. In here, we proposed two different subcarrier sorting schemes in order to exploit the multiuser diversity and to enhance the performance in case of channel uncertainties. Accordingly, our simulations examine the performance of the downlink (broadcast) channel adaptation for different channel conditions assuming a single cell scenario. Index Terms—MIMO, OFDMA, adaptive modulation, power allocation, limited feedback, QoS, multiuser diversity","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125530529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Efficient Multiaccess Dissemination Networks","authors":"K. Pentikousis","doi":"10.1109/ICCW.2009.5208016","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208016","url":null,"abstract":"Previous efforts to improve energy efficiency focused on different network architecture components, aiming in particular at increasing the operational time of battery-powered devices. This paper argues that patching elements of the current Internet architectural paradigm are not sufficient for achieving major savings in the overall network energy consumption. After reviewing the main characteristics of current Internet use, including the proliferation of broadband wireless and mobile networks and the overwhelming role of dissemination traffic, this paper examines their impact on energy consumption and studies alternative WMAN scenarios. Simulation results indicate that adopting a multiaccess information-centric approach, can halve the overall access network energy consumption and deliver the same level of functionality to a larger number of Internet devices.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132979618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. K. Goo, J. Irvine, Ivan Andonovic, A. Tomlinson
{"title":"Preserving Privacy in Assistive Technologies","authors":"S. K. Goo, J. Irvine, Ivan Andonovic, A. Tomlinson","doi":"10.1109/ICCW.2009.5208079","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208079","url":null,"abstract":"Assistive technologies enable individuals to perform a function that might be difficult or they otherwise are unable to do. However, the provision of context-awareness interfaces and accessible information everywhere bring with them the potential for data violations, with concomitant privacy issues such as spying and exploitation. Privacy preservation can thus constrain deployment. The aim of this paper is to promote user sensitiveness in privacy policy and tackle malicious data extraction and selling, with the focus on assistive technologies for a diverse mix of services for use in applications ranging from healthcare to smart shopping.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125011403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of IEEE 802.15.4 Non-Beacon Mode Where Downlink Data Packets Are Transmitted by Piggyback Method","authors":"J. Park, T. O. Kim, K. J. Kim, B. D. Choi","doi":"10.1109/ICCW.2009.5208114","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208114","url":null,"abstract":"We analyze the MAC performance of the IEEE 802.15.4 non-beacon mode where both uplink and downlink traffic flows are executed simultaneously and downlink data packets are transmitted by piggyback method. To build the mathematical model of the stochastic behavior of a device with both uplink and downlink traffic flows, we combine the Markov chain model for the uplink transmission in T.O. Kim et al (2006) and one for the downlink transmission in T.O. Kim et al (2006), so that performance measures (e.g., uplink packet delay and downlink packet delay) are influenced each other. We obtain performance measures such as throughput, packet delay, packet loss probability and average energy consumption per one slot of a device. Numerical results and simulation results show that the piggyback method can reduce the packet delay, packet loss probability and energy consumption compared with those of backoff method.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115500433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster-Based Ranging for Accurate Localization in Wireless Sensor Neworks","authors":"Simone Sergi, F. Pancaldi, G. Vitetta","doi":"10.1109/ICCW.2009.5207987","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5207987","url":null,"abstract":"In this paper a novel ranging technique based on received signal strength (RSS) and suitable to indoor scenarios is illustrated. The proposed technique improves the quality of RSS- based estimation of an anchor-target distance processing multiple power measurements associated with the signals radiated by a cluster of nodes surrounding the target. Specific algorithms for the generation of a cluster and for the acquisition of power measurements are described. Simulation results show that, when used in indoor positioning systems, the proposed ranging technique is substantially more accurate than non cooperative strategies. In addition it allows to concentrate significant processing tasks in a limited number of fixed anchors, so reducing maintenance costs and making possible to adopt cheap and simple portable wireless nodes.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115616147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Q. Wang, D. Jiang, J. Jin, G. Liu, Z. Yan, D. Yang
{"title":"Application of BBU+RRU Based Comp System to LTE-Advanced","authors":"Q. Wang, D. Jiang, J. Jin, G. Liu, Z. Yan, D. Yang","doi":"10.1109/ICCW.2009.5208027","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208027","url":null,"abstract":"LTE-Advanced system which based on orthogonal frequency division multiplexing (OFDM) can eliminate intra-cell interference but still can not mitigate inter-cell interference (ICI). Coordinated Multi-Point transmission/reception (CoMP) is one of the candidate techniques for LTE-Advanced systems to increase the cell average and cell edge user throughput in the both uplink and downlink. Although CoMP naturally increases system complexity, it has potentially significant capacity and coverage benefits, making it worth a more detailed consideration. In this paper, we present our initial views on the application of BBU+RRU based CoMP system to LTE-Advanced. Furthermore, simulation results for uplink show that the CoMP joint processing can bring significant gains to both the average sector throughput and the 5% of user throughput.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127098464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TORI: User Provided Future Networking Testbeds","authors":"M. Stiemerling, M. Brunner, S. Kiesel, X. Fu","doi":"10.1109/ICCW.2009.5207969","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5207969","url":null,"abstract":"The usage of testbeds is considered a key tool for exploring the development of new protocols and network architectures in the area of network research. Testbeds, together with simulations, are the basic tool set of network researchers to drive research, but often it is impossible to get feedback from real deployments and their respective data traffic. Today's major testbed facilities, e.g., VINI and PlanetLab, aim at emulating the behavior of large-scale networks, but they are still several orders of magnitude smaller than the deployed operational network infrastructure. We argue that it is time to extend network research beyond theoretical and testbed approaches towards a dynamic, peer-to-peer based testbed environment, similar to the approach taken by seti@home and BOINC. We aim at expanding the total number of participating nodes in an experiment and at experimenting on existing operational infrastructure with its entirely uncontrollable environment. Our vision presented in this paper, the Testbed on Real Infrastructure (TORI), includes regular end hosts (peers) in an experiment by deploying and executing the experimental software on these peers and to form an overlay network upon them. The main difference of our TORI approach compared to others is installing new technologies and testing them with the operational infrastructure.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"185 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124924930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu-Chen Jou, P. Black, Qiang Wu, R. Attar, Wanlun Zhao, Bharat Ahuja, Junsheng Han
{"title":"cdma2000 1x Rev. E Forward Link Voice Capacity","authors":"Yu-Chen Jou, P. Black, Qiang Wu, R. Attar, Wanlun Zhao, Bharat Ahuja, Junsheng Han","doi":"10.1109/ICCW.2009.5208105","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208105","url":null,"abstract":"The forward link capacity of a cdma2000 lx system is power limited. Therefore, average data rate (ADR), link efficiency, and receiver signal-to-noise ratio (SNR) are the key factors for capacity improvement. In this paper, we introduce the new features of the forward fundamental channel (F-FCH) with radio configuration (RC) 11 for 1x Revision E that is being standardized at the Third Generation Partnership Project 2 (3GPP2) and advanced receivers for mobile stations (MS), targeted at these key factors. Simulations show that the new RC together with interference cancellation and a new voice codec more than doubles the forward link capacity of existing 1x systems, and more than triples the capacity with dual receive antennas. The capacity gain is achieved without any increase in voice latency or any degradation in voice quality.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Architectural Style for Complex Healthcare Scenarios","authors":"L. Griffin, C. Foley, E. de Leastar","doi":"10.1109/ICCW.2009.5208092","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208092","url":null,"abstract":"In classic software engineering, a successful software architecture arises from functional and non-functional requirements analysis, modeling, design elaboration and implementation phases, incorporating key trade-offs and constraints. This paper proposes an alternative approach, informed by deep insights gained from understanding successfully deployed architectural styles in two key domains: highly scalable, resilient Web applications; and robust presence and messaging systems. We propose that the challenges and complexities within the healthcare domain can be successfully addressed with this approach. Specifically, the REST architectural style with its focus on resource oriented architecture, and the Jabber protocol set and its associated messaging and presence infrastructure. These two approaches have been successfully implemented on a global scale, have been bound to legacy information systems, and have demonstrated an ability to evolve to match the most complex organizations. The approaches are complimentary, but not without contradictions. This paper discusses these contradictions and lays out a set of challenges that, if successfully addressed, can yield a flexible, powerful and resilient architecture within a highly challenging domain.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116091080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Vishnevsky, A. Dudin, V. Klimenok, O. Semenova, S. Shpilev
{"title":"Approximate Analysis for M/G/1-Polling System with Adaptive Polling Mechanism","authors":"V. Vishnevsky, A. Dudin, V. Klimenok, O. Semenova, S. Shpilev","doi":"10.1109/ICCW.2009.5208095","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208095","url":null,"abstract":"We investigate a polling model for a radio-cell of the broadband wireless IEEE 802.11 DCF network. A radio-cell is assumed to work in the \"data collection\" regime. It is modelled by the polling system with N queues and a single server polling the queues in a cyclic adaptive order. Under adaptive scheme, the server (base station) skips (does not visit) the queues (subscriber stations) which were empty at their polling moments at the previous cycle that allows cutting expenses. In the paper, we present an iteration procedure to calculate the mean waiting time in queues and provide numerical examples to compare theoretical results and ones obtained from simulation.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116110665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}