International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks最新文献

筛选
英文 中文
Radio channel characterization of a metal bridge segment at 868MHz and 2.4GHz 868MHz和2.4GHz金属桥段的无线电信道特性
R. Djapic, Y. Toh, J. Oostveen
{"title":"Radio channel characterization of a metal bridge segment at 868MHz and 2.4GHz","authors":"R. Djapic, Y. Toh, J. Oostveen","doi":"10.1145/2512840.2512863","DOIUrl":"https://doi.org/10.1145/2512840.2512863","url":null,"abstract":"Accurate radio channel modeling is essential for simulation and performance prediction of wireless sensor networks (WSNs). This paper presents results of radio channel measurements performed in a difficult propagation environment. In particular, signal path loss is measured in case transmit and receive antennas are placed directly on a metal bridge segment. Line of sight (LOS) and non line of sight (NLOS) scenarios are evaluated at 868MHz SRD and 2.4 GHz ISM bands. The purpose of these channel measurements and modeling is to facilitate the design, evaluation and simulation process of WSNs for integrity monitoring of metal rich structures such as bridges, viaducts or industrial assets.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131240664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and simulation of agent-based complex systems and application to natural disasters 基于agent的复杂系统建模与仿真及其在自然灾害中的应用
Karam Mustapha, H. Mcheick, Sehl Mellouli
{"title":"Modeling and simulation of agent-based complex systems and application to natural disasters","authors":"Karam Mustapha, H. Mcheick, Sehl Mellouli","doi":"10.1145/2512840.2512851","DOIUrl":"https://doi.org/10.1145/2512840.2512851","url":null,"abstract":"A number of modeling and simulation tools have been developed in the domain of Natural Disasters. In these situations, several research teams may make an intervention and that have to coordinate their activities in order to save the maximum number of lives. To this end, they have to define an organizational structure and adopt management policies to improve their performance. The organizational structure and the policies are important elements that have to be taken into account to simulate a real emergency activity. To facilitate the design of these simulations, an agent-based methodological framework for complex system (Supply Chain, Disaster Natural) is proposed. The main contribution of the framework is that it will reflect the organizational structure and policies within the simulation, and which involves the integration truly dynamic dimension of this organization. Also, we validate the proposed work on a case study more precisely on the fire building.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128402699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive multihop scheduling for IEEE 802.11s multiradio cognitive wireless mesh networks IEEE 802.11s多无线电认知无线网状网络的自适应多跳调度
C. Roy, Jean-Charles Grégoire, Z. Dziong
{"title":"Adaptive multihop scheduling for IEEE 802.11s multiradio cognitive wireless mesh networks","authors":"C. Roy, Jean-Charles Grégoire, Z. Dziong","doi":"10.1145/2512840.2512866","DOIUrl":"https://doi.org/10.1145/2512840.2512866","url":null,"abstract":"Wireless mesh networks (WMN) are efficient and low cost solutions for the deployment of broadband access in various environments. To support real-time applications such as multimedia and emergency services throughout the network, WMNs must provide appropriate quality of service (QoS). While the capacity and the bandwidth availability of single radio WMNs may severely limit QoS for such traffic, multiradio cognitive WMNs (CWMN) can overcome these restrictions and provide better QoS mechanisms. This paper describes a scheduling algorithm with an integrated backpressure mechanism for CWMN. This algorithm ensures that the available bandwidth is properly shared considering the type of traffic to forward, the distance of the clients from the portal and the fluctuating conditions of the links. The performance of our new scheduling algorithm is evaluated in a simulated environment. We show that, while increasing throughput, our algorithm not only achieves nearly perfect fairness, but can also prevent bandwidth wastage.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AEERP: AUV aided energy efficient routing protocol for underwater acoustic sensor network AEERP:水下航行器辅助的水声传感器网络节能路由协议
Awais Ahmad, Abdul Wahid, Dongkyun Kim
{"title":"AEERP: AUV aided energy efficient routing protocol for underwater acoustic sensor network","authors":"Awais Ahmad, Abdul Wahid, Dongkyun Kim","doi":"10.1145/2512840.2512848","DOIUrl":"https://doi.org/10.1145/2512840.2512848","url":null,"abstract":"Multi-hop communication in Underwater Acoustic Sensor Network (UASN) brings new challenges in reliable data transmission. Recent work shows that data collection from underwater sensor nodes using Autonomous Underwater Vehicle (AUV) minimizes multi-hop data transmission, improving energy efficiency in UASN. However, due to continuous movements, AUV has limited communication time to collect data from sensor nodes in UASN. We therefore propose a novel underwater routing protocol, namely AEERP (AUV aided Energy Efficient Routing Protocol). In AEERP, an AUV collects data from gateway nodes. Among all the nodes, selected nodes play the role of gateway node for communication with AUV. Gateway nodes are selected based on RSSI values of the hello packet received from AUV. In addition, after consuming energy up to a certain threshold by a gateway node, another high energy node is selected as a gateway node. This adaptive selection of gateway node balances energy consumption increasing network lifetime. Mathematical analysis and NS-2 simulation show that AEERP performs better than Travel Salesperson Problem (TSP) in terms of energy cost and data delivery ratio.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Performance evaluation of handoff algorithms applied in vehicular 60GHz radio-over-fiber networks 车载60GHz无线光纤网络切换算法性能评价
N. Tselikas, E. Kosmatos, A. Boucouvalas
{"title":"Performance evaluation of handoff algorithms applied in vehicular 60GHz radio-over-fiber networks","authors":"N. Tselikas, E. Kosmatos, A. Boucouvalas","doi":"10.1145/2512840.2512862","DOIUrl":"https://doi.org/10.1145/2512840.2512862","url":null,"abstract":"We present the handoff techniques required to support mobile end-users in 60GHz Radio-over-Fiber (RoF) networks. We analyze the dominant handoff algorithms proposed for 60GHz RoF networks in outdoor environments, by emphasizing to the corresponding handoff algorithms that can be applied in high speed vehicular communications, i.e. Moving Cell (MC), Moving Extended Cell (MEC) and Virtual Cellular Zone (VCZ), respectively. We finally present the results of the corresponding simulation scenarios we performed, in order to demonstrate and evaluate the performance of the handoff algorithms and confirm that, at least some of them could be safely applied in high-speed vehicular RoF architectures, even for challenging services such as High-Definition TV and Ultra High-Definition TV.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134019008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On estimating the end-to-end bandwidth in multi-transceiver multi-hop cognitive radio networks 多收发多跳认知无线网络的端到端带宽估计
Guillaume Artero Gallardo, G. Jakllari, Lucile Canourgues, A. Beylot
{"title":"On estimating the end-to-end bandwidth in multi-transceiver multi-hop cognitive radio networks","authors":"Guillaume Artero Gallardo, G. Jakllari, Lucile Canourgues, A. Beylot","doi":"10.1145/2512840.2512856","DOIUrl":"https://doi.org/10.1145/2512840.2512856","url":null,"abstract":"Cognitive radios promise to revolutionize the performance of wireless networks in general and multi-hop wireless networks in particular by making efficient use of the portion of the licensed spectrum left un-utilized. Realizing this promise, however, requires revisiting many of the current network architectures and protocols, which is the subject of a very active research effort. In this work, we focus on Quality of Service routing and more specifically, admission control. We consider a multi-hop cognitive radio network where every node is equipped with multiple transceivers. Because the research and development of a widely accepted MAC protocol for these networks is still ongoing, we assume a bare-bones TDMA protocol at the link layer. We show that, for the network considered, the problem of finding the maximum end-to-end bandwidth of a given path is NP-Complete. Given this result, we consider a relaxed version of the problem wherein the slot allocations are carried out at each node by selecting at random the required number of slots among those available. For this case, we provide a linear time algorithm for computing the average residual end-to-end bandwidth. We perform an extensive numerical analysis that demonstrates its accuracy and enabling value for performing admission control.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133643297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of distributed and self-organized physical cell identity assignment schemes for LTE-advanced systems lte先进系统分布式自组织物理小区身份分配方案的开发
Ali Diab, A. Mitschele-Thiel
{"title":"Development of distributed and self-organized physical cell identity assignment schemes for LTE-advanced systems","authors":"Ali Diab, A. Mitschele-Thiel","doi":"10.1145/2512840.2512852","DOIUrl":"https://doi.org/10.1145/2512840.2512852","url":null,"abstract":"A major challenge pertinent to Long Term Evolution (LTE) systems is the development of self-organized PCI assignment solutions. This paper focuses on this challenge and proposes a new distributed and self-organized solution named Stable Graph Coloring (SGC) scheme. The proposal introduces a temporal PCIs sub-range for newly switched on eNBs, minimizes the impact of Neighbor Cell relations (NCRs) inaccuracy and re-uses PCIs as most as possible. It is evaluated compared to 3 known distributed approaches, namely the Graph Coloring (GC) approach, the LTE standard proposal and the Nokia-Siemens (NS) approach, by means of simulative studies. The studies investigate the impact of network size and the capabilities of stabilizing LTE systems. Our results show that the SGC scheme is slightly outperformed by the NS approach when considering the average number of PCIs conflicts. For the PCIs utilization ratio, the SGC approach is considerably better than the NS scheme. The most important result our proposal realizes is the capability to converge to a steady state while carefully utilizing the PCIs (less than 70% for high densities). Networks with such densities lose their stability when employing the LTE standard proposal and the NS approach.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128046861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
QoE-aware priority marking and traffic management for H.264/SVC-based mobile video delivery 基于H.264/ svc的移动视频传输的qos感知优先级标记和流量管理
Bo Fu, D. Staehle, Gerald Kunzmann, E. Steinbach, W. Kellerer
{"title":"QoE-aware priority marking and traffic management for H.264/SVC-based mobile video delivery","authors":"Bo Fu, D. Staehle, Gerald Kunzmann, E. Steinbach, W. Kellerer","doi":"10.1145/2512840.2512865","DOIUrl":"https://doi.org/10.1145/2512840.2512865","url":null,"abstract":"Mobile network operators experience a rapid increase of traffic in their networks that is mainly driven by the growing popularity of mobile video applications. They partly compensate this traffic increase by improved transmission technology and network densification. Supporting videos at high quality during peak traffic, however, does not scale economically. Instead, means are required for the operator to adapt the bitrate of the videos to the current network situation. Scalable Video Coding (SVC) provides a convenient way to adapt the bitrates of video streams in the network by dropping bit stream layers. From resource utilization point of view, the limitation of SVC is that the layer structure does not allow an operator to compare the importance of two layers of different videos with respect to their contribution to the user-perceived video quality. In existing solutions, the limitation is resolved by implementing sophisticated optimization algorithms at network bottlenecks for optimal rate adaptation among multiple videos.\u0000 We take a different approach to eliminate the overhead of signaling and implementations introduced by the optimizations at bottlenecks while targeting at the same optimization goal. We propose a QoE-aware priority marking algorithm for SVC-based video streaming. In our approach, SVC layers are mapped to a finite number of priorities which are marked in video packets to be transmitted with video streams. This mapping takes into account the data rate and the quality contribution of a layer among layers of a group of videos. At network bottlenecks, rate adaptation simply follows the pre-determined priorities without further optimization needed. Our results show that the QoE-aware priority marking algorithm indeed overcomes the limitations of existing SVC packet marking and has the potential to achieve a QoE-optimal resource utilization in wireless access networks.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129787301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Network layer soft handoff for IP mobility 网络层软切换IP移动性
Ditchaphong Phoomikiattisak, S. Bhatti
{"title":"Network layer soft handoff for IP mobility","authors":"Ditchaphong Phoomikiattisak, S. Bhatti","doi":"10.1145/2512840.2512843","DOIUrl":"https://doi.org/10.1145/2512840.2512843","url":null,"abstract":"We present an empirical evaluation of network-layer soft handoff for IP mobility. Such functionality is not currently available for Mobile IP. Our new approach, based on the Identifier Locator Network Protocol (ILNP), requires no additional network entities, such as proxies, and it does not require modification of any routing protocols. Only the communicating hosts need to have their end-system protocol stacks updated so it is incrementally deployable. In our performance evaluation, we find that soft handoff minimises packet loss, with the observed packet loss during handoff being no worse than the natural loss of the end-to-end path.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121815098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Resilience and security of opportunistic communications for emergency evacuation 紧急疏散的机会通信的复原力和安全性
Gökçe Görbil, E. Gelenbe
{"title":"Resilience and security of opportunistic communications for emergency evacuation","authors":"Gökçe Görbil, E. Gelenbe","doi":"10.1145/2387191.2387208","DOIUrl":"https://doi.org/10.1145/2387191.2387208","url":null,"abstract":"We describe an autonomous emergency support system (ESS) based on opportunistic communications (oppcomms) to support navigation and evacuation of civilians in built environments. In our proposed system, civilians are equipped with low-cost human wearable devices that employ oppcomms to exchange packets at close range of a few meters with limited or no infrastructure. This paper investigates the resilience and performance of oppcomms in the presence of network attacks. We assume that a portion of nodes in the network have been compromised and misbehave, which adversely affects communications and evacuation. We evaluate the effect of three types of node misbehaviour and propose a defense mechanism against the most serious among these. The defense mechanism combines identity-based cryptography with collaborative malicious packet detection and blacklisting of detected attackers. Results from simulation experiments conducted on a specialized emergency simulator show the impact of misbehaviour on evacuation and communication performance and the improvement offered by the defense mechanism.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123923627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信