Carmen de la O. Millán, T. B. Sørensen, Niels Michael Mikkelsen
{"title":"A study on the radio coverage in underground stations of the new copenhagen metro system","authors":"Carmen de la O. Millán, T. B. Sørensen, Niels Michael Mikkelsen","doi":"10.1145/2512840.2512854","DOIUrl":"https://doi.org/10.1145/2512840.2512854","url":null,"abstract":"In connection with the extension of the Copenhagen Metro system, architects and wireless operators met early in the design phase to plan the radio coverage inside the public areas of the metro transport system. Based on common best practice, an initial design for the antenna installations, and hence radio coverage, was proposed for a distributed antenna system in each of two distinctly different types of underground stations. In this paper, we describe the considerations for the design, and specifically the modelling and analysis of the underground stations by way of a commercial ray-tracing tool. Radio coverage results are given for different designs, including different number and types of antennas, their configuration and placement, as well as the dependency on frequency and construction materials and presence of trains on the station platforms. In a practical case like this, compromises between stakeholders impact to the design and in some cases rule out options with better, more uniform, radio coverage. Also, given the constraints of the problem, common best practice leads to a conservative design. It shows a good margin for uncertainties and unaccounted propagation phenomena by an analytical comparison.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122293477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining associated sensor patterns for data stream of wireless sensor networks","authors":"M. Rashid, I. Gondal, J. Kamruzzaman","doi":"10.1145/2512840.2512853","DOIUrl":"https://doi.org/10.1145/2512840.2512853","url":null,"abstract":"WSNs generate a large amount of data in the form of data stream; and mining these streams to extract useful knowledge is a highly challenging task. Existing works proposed in literature use sensor association rules measured in terms of occurrence frequency of patterns. However, these rules often generate a huge number of rules, most of which are non-informative or fail to reflect the true correlation among data objects. Additionally mining associated sensor patterns from sensor stream data, which is vital for real-time applications, has not been addressed yet in literature. In this paper, we address these problems and propose a new type of sensor behavioral pattern called associated sensor patterns which capture simultaneously association-like co-occurrence as well as substantial temporal correlations implied by such co-occurrences in sensor data. We propose a novel tree structure, called associated sensor pattern stream tree (ASPS-tree) and a new technique, called associated sensor pattern mining of data stream (ASPMS), using sliding window-based associated sensor pattern mining for WSNs. By capturing the useful knowledge of the data stream into an ASPS-tree, our ASPMS algorithm can mine associated sensor patterns in the current window with frequent pattern (FP)-growth like pattern-growth method. Extensive experimental analyses show that our technique is very efficient in discovering associated sensor patterns over sensor data stream.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132122920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Akram, Tim Esemann, Torsten Teubler, H. Hellbrück
{"title":"A reusable and extendable testbed for implementation and evaluation of cooperative sensing","authors":"T. Akram, Tim Esemann, Torsten Teubler, H. Hellbrück","doi":"10.1145/2512840.2512847","DOIUrl":"https://doi.org/10.1145/2512840.2512847","url":null,"abstract":"Cooperative sensing has been identified as a potential improvement for cognitive radios to perceive their radio environment. In the past, algorithms have been developed by analysis and simulations exclusively. With cheaper hardware experimental platforms have been used for evaluation purpose recently. Simulations lack realistic propagation models for radio transmission but are reproducible compared to experimental evaluation done by hand. The effects of reduced detection probability and false alarms are not realistic in these simulations. In this paper, we suggest a reusable and extendable automated testbed software and instructions for deployment of own testbeds. Primary users as well as secondary users with cooperating cognitive radios can be flexibly deployed in the testbed within seconds. The advantage is that a series of even long lasting measurements including automatic logging of results can be easily repeated. Results can be assessed on the fly during the ongoing evaluation by accessing debug output remotely. The testbed supports stationary, portable, and in the future mobile radio devices for flexible scenarios as well as monitoring devices for debugging. The testbed and the radio devices are validated by deploying primary and secondary user in a small scenario whose outcome was analyzed beforehand. The results are as predicted and show the usefulness of this approach.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of EpiChord under high churn","authors":"F. Chowdhury, M. Kolberg","doi":"10.1145/2512840.2512845","DOIUrl":"https://doi.org/10.1145/2512840.2512845","url":null,"abstract":"Churn has a great effect on the performance of structured Peer-to-Peer (P2P) overlays -- specifically in mobile environments, where overlays have to deal with frequent join and leave events of nodes. In this paper, we evaluate the performance of EpiChord under high churn. EpiChord is a structured P2P overlay based on Chord, which uses a Distributed Hash Table (DHT) and removes the O(logN)-state-per-node restriction imposed by the majority of other DHT topologies. This is done by using a reactive routing state maintenance strategy that repays network maintenance costs into lookup queries, resulting in a significantly better lookup performance with comparable maintenance costs to traditional multi-hop DHTs. While comparative studies of overlay algorithms for wired networks have been reported, no such evaluation has been carried out of the suitability of the EpiChord overlay for mobile networks. This paper evaluates the performance and efficiency of EpiChord, taking into account the churn conditions as seen in mobile networks. The evaluation is conducted using the OverSim simulation framework. The simulation results suggest that it is feasible for mobile peers to take part in the overlay indicated by the observed results for success ratio and bandwidth consumption. We further show that a large degree of parallelism in the lookups is not substantially improving the performance, rather a parallelism degree of 3 is sufficient to make EpiChord resilient under different varied levels of churn.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134549047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radio channel characterization of a metal bridge segment at 868MHz and 2.4GHz","authors":"R. Djapic, Y. Toh, J. Oostveen","doi":"10.1145/2512840.2512863","DOIUrl":"https://doi.org/10.1145/2512840.2512863","url":null,"abstract":"Accurate radio channel modeling is essential for simulation and performance prediction of wireless sensor networks (WSNs). This paper presents results of radio channel measurements performed in a difficult propagation environment. In particular, signal path loss is measured in case transmit and receive antennas are placed directly on a metal bridge segment. Line of sight (LOS) and non line of sight (NLOS) scenarios are evaluated at 868MHz SRD and 2.4 GHz ISM bands. The purpose of these channel measurements and modeling is to facilitate the design, evaluation and simulation process of WSNs for integrity monitoring of metal rich structures such as bridges, viaducts or industrial assets.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131240664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guillaume Artero Gallardo, G. Jakllari, Lucile Canourgues, A. Beylot
{"title":"On estimating the end-to-end bandwidth in multi-transceiver multi-hop cognitive radio networks","authors":"Guillaume Artero Gallardo, G. Jakllari, Lucile Canourgues, A. Beylot","doi":"10.1145/2512840.2512856","DOIUrl":"https://doi.org/10.1145/2512840.2512856","url":null,"abstract":"Cognitive radios promise to revolutionize the performance of wireless networks in general and multi-hop wireless networks in particular by making efficient use of the portion of the licensed spectrum left un-utilized. Realizing this promise, however, requires revisiting many of the current network architectures and protocols, which is the subject of a very active research effort. In this work, we focus on Quality of Service routing and more specifically, admission control. We consider a multi-hop cognitive radio network where every node is equipped with multiple transceivers. Because the research and development of a widely accepted MAC protocol for these networks is still ongoing, we assume a bare-bones TDMA protocol at the link layer. We show that, for the network considered, the problem of finding the maximum end-to-end bandwidth of a given path is NP-Complete. Given this result, we consider a relaxed version of the problem wherein the slot allocations are carried out at each node by selecting at random the required number of slots among those available. For this case, we provide a linear time algorithm for computing the average residual end-to-end bandwidth. We perform an extensive numerical analysis that demonstrates its accuracy and enabling value for performing admission control.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133643297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of distributed and self-organized physical cell identity assignment schemes for LTE-advanced systems","authors":"Ali Diab, A. Mitschele-Thiel","doi":"10.1145/2512840.2512852","DOIUrl":"https://doi.org/10.1145/2512840.2512852","url":null,"abstract":"A major challenge pertinent to Long Term Evolution (LTE) systems is the development of self-organized PCI assignment solutions. This paper focuses on this challenge and proposes a new distributed and self-organized solution named Stable Graph Coloring (SGC) scheme. The proposal introduces a temporal PCIs sub-range for newly switched on eNBs, minimizes the impact of Neighbor Cell relations (NCRs) inaccuracy and re-uses PCIs as most as possible. It is evaluated compared to 3 known distributed approaches, namely the Graph Coloring (GC) approach, the LTE standard proposal and the Nokia-Siemens (NS) approach, by means of simulative studies. The studies investigate the impact of network size and the capabilities of stabilizing LTE systems. Our results show that the SGC scheme is slightly outperformed by the NS approach when considering the average number of PCIs conflicts. For the PCIs utilization ratio, the SGC approach is considerably better than the NS scheme. The most important result our proposal realizes is the capability to converge to a steady state while carefully utilizing the PCIs (less than 70% for high densities). Networks with such densities lose their stability when employing the LTE standard proposal and the NS approach.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128046861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo Fu, D. Staehle, Gerald Kunzmann, E. Steinbach, W. Kellerer
{"title":"QoE-aware priority marking and traffic management for H.264/SVC-based mobile video delivery","authors":"Bo Fu, D. Staehle, Gerald Kunzmann, E. Steinbach, W. Kellerer","doi":"10.1145/2512840.2512865","DOIUrl":"https://doi.org/10.1145/2512840.2512865","url":null,"abstract":"Mobile network operators experience a rapid increase of traffic in their networks that is mainly driven by the growing popularity of mobile video applications. They partly compensate this traffic increase by improved transmission technology and network densification. Supporting videos at high quality during peak traffic, however, does not scale economically. Instead, means are required for the operator to adapt the bitrate of the videos to the current network situation. Scalable Video Coding (SVC) provides a convenient way to adapt the bitrates of video streams in the network by dropping bit stream layers. From resource utilization point of view, the limitation of SVC is that the layer structure does not allow an operator to compare the importance of two layers of different videos with respect to their contribution to the user-perceived video quality. In existing solutions, the limitation is resolved by implementing sophisticated optimization algorithms at network bottlenecks for optimal rate adaptation among multiple videos.\u0000 We take a different approach to eliminate the overhead of signaling and implementations introduced by the optimizations at bottlenecks while targeting at the same optimization goal. We propose a QoE-aware priority marking algorithm for SVC-based video streaming. In our approach, SVC layers are mapped to a finite number of priorities which are marked in video packets to be transmitted with video streams. This mapping takes into account the data rate and the quality contribution of a layer among layers of a group of videos. At network bottlenecks, rate adaptation simply follows the pre-determined priorities without further optimization needed. Our results show that the QoE-aware priority marking algorithm indeed overcomes the limitations of existing SVC packet marking and has the potential to achieve a QoE-optimal resource utilization in wireless access networks.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129787301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network layer soft handoff for IP mobility","authors":"Ditchaphong Phoomikiattisak, S. Bhatti","doi":"10.1145/2512840.2512843","DOIUrl":"https://doi.org/10.1145/2512840.2512843","url":null,"abstract":"We present an empirical evaluation of network-layer soft handoff for IP mobility. Such functionality is not currently available for Mobile IP. Our new approach, based on the Identifier Locator Network Protocol (ILNP), requires no additional network entities, such as proxies, and it does not require modification of any routing protocols. Only the communicating hosts need to have their end-system protocol stacks updated so it is incrementally deployable. In our performance evaluation, we find that soft handoff minimises packet loss, with the observed packet loss during handoff being no worse than the natural loss of the end-to-end path.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121815098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilience and security of opportunistic communications for emergency evacuation","authors":"Gökçe Görbil, E. Gelenbe","doi":"10.1145/2387191.2387208","DOIUrl":"https://doi.org/10.1145/2387191.2387208","url":null,"abstract":"We describe an autonomous emergency support system (ESS) based on opportunistic communications (oppcomms) to support navigation and evacuation of civilians in built environments. In our proposed system, civilians are equipped with low-cost human wearable devices that employ oppcomms to exchange packets at close range of a few meters with limited or no infrastructure. This paper investigates the resilience and performance of oppcomms in the presence of network attacks. We assume that a portion of nodes in the network have been compromised and misbehave, which adversely affects communications and evacuation. We evaluate the effect of three types of node misbehaviour and propose a defense mechanism against the most serious among these. The defense mechanism combines identity-based cryptography with collaborative malicious packet detection and blacklisting of detected attackers. Results from simulation experiments conducted on a specialized emergency simulator show the impact of misbehaviour on evacuation and communication performance and the improvement offered by the defense mechanism.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123923627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}