International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks最新文献

筛选
英文 中文
Realtime traffic scheduling for missed deadlines minimization in point-to-multipoint OFDMA systems 点对多点OFDMA系统中遗漏时间最小化的实时流量调度
D. Ermini, M. Bonuccelli
{"title":"Realtime traffic scheduling for missed deadlines minimization in point-to-multipoint OFDMA systems","authors":"D. Ermini, M. Bonuccelli","doi":"10.1145/1868612.1868619","DOIUrl":"https://doi.org/10.1145/1868612.1868619","url":null,"abstract":"This paper considers the problem of scheduling realtime traffic in OFDMA systems. We present two heuristics with the objective of meeting as much deadlines as possible, or equivalently, minimizing the number of missed deadlines. The proposed heuristics decide on the allocation priority, taking into account several known parameters about the users and their service requests, such as the available carriers data rates for each user, the traffic amount and deadlines requirements of each service request. These available parameters are combined together by our heuristics for deciding a priority order by which to schedule the service requests. Specifically, we compare two realtime traffic allocation mechanisms: \"per-time slot\" scheme and \"per-deadline\" one. We evaluate our proposed heuristics performance, by means of simulations, computing the deadlines miss ratio (DMR), the percentage of users which miss more than 5% of deadlines (UMR) and the maximum missed deadlines percentage for the user who missed most (MMD).","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122686926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluating the performance boundaries of WI-FI, WiMAX and UMTS using the network simulator (ns-2) 使用网络模拟器(ns-2)评估WI-FI、WiMAX和UMTS的性能边界
J. Márquez-Barja, C. Calafate, Juan-Carlos Cano, P. Manzoni
{"title":"Evaluating the performance boundaries of WI-FI, WiMAX and UMTS using the network simulator (ns-2)","authors":"J. Márquez-Barja, C. Calafate, Juan-Carlos Cano, P. Manzoni","doi":"10.1145/1868612.1868618","DOIUrl":"https://doi.org/10.1145/1868612.1868618","url":null,"abstract":"Currently, the different wireless technologies available allow users to access the Internet under the \"always on\" paradigm. Therefore, switching from one wireless technology to another, a process known as vertical handover, is often required. It is very important for vertical handover agents to know the performance of each candidate wireless network in order to switch into a network that fulfills the applications' requirements. In this work we present a performance evaluation of the main wireless technologies currently in use by mobile devices: Wi-Fi, WiMAX and UMTS. In our set of experiments we tested various schemes with different parameters for each technology, including modulation and channel bandwidth. Using the Network Simulator ns-2, we evaluate the performance of each network technology under different network congestion conditions. Results show that each technology offers different data rates, depending on the selected parameters. Moreover, we found that bandwidth availability status becomes of utmost importance for successful vertical handover.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121846884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Opportunistic decoding of unequal erasure protected partially-decodable scalable source 不相等擦除保护的部分可解码可扩展源的机会解码
Jie Xu, G. Tu, Yu Jiang
{"title":"Opportunistic decoding of unequal erasure protected partially-decodable scalable source","authors":"Jie Xu, G. Tu, Yu Jiang","doi":"10.1145/1641913.1641922","DOIUrl":"https://doi.org/10.1145/1641913.1641922","url":null,"abstract":"To provide unequal erasure protection to scalable codes, a general framework has been proposed in [1] and it has become the foundation of following research in this literature. In this paper, we make opportunistic utilization of received packets under the same framework. Specifically, we extract those non-decodable original symbols in received packets by taking advantage of the joint coding structure. By regulating the scalable codes to partially-decodable scalable codes, these original symbols can be used to improve the quality of reconstructed source. Further more, we formulate the opportunistic unequal erasure protection and analyze the relationship between optimal unequal erasure protection (OP) and opportunistic optimal unequal erasure protection (OOP). Based on the analysis result, a simple algorithm is proposed to find the optimal protection which maximizes the expected quality of reconstructed source. Finally, experiment results are presented which verify the improvement of opportunistic utilization over traditional unequal erasure protection.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"26 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-client video streaming over wirelessMAN-OFDMA 多客户端视频流通过无线- ofdma
Vitor Bernardo, K. Pentikousis, Jarno Pinola, E. Piri, M. Curado
{"title":"Multi-client video streaming over wirelessMAN-OFDMA","authors":"Vitor Bernardo, K. Pentikousis, Jarno Pinola, E. Piri, M. Curado","doi":"10.1145/1641913.1641920","DOIUrl":"https://doi.org/10.1145/1641913.1641920","url":null,"abstract":"Wireless Interoperability for Microwave Access (WiMAX) is a prime contender in the Broadband Wireless Access (BWA) market due to its next generation network architecture, low patent portfolio load considerations, support for Quality of Service (QoS), and last but not least, high capacities. Although until recently there has been a lot of interest in the mobility support of the technology, with the recent push for the Third Generation Partnership Project's (3GPP) Long Term Evolution (LTE), vendors are advancing WiMAX (in particular with the Wireless Metropolitan Area Network - Orthogonal Frequency Division Multiple Access (WirelessMAN-OFDMA) air interface specified by the IEEE 802.16 working group) as a fixed broadband replacement. For this market segment, Audio/Video (A/V) delivery is expected to be a key service offering. In this paper, we perform a detailed empirical evaluation using a state-of-the-art WiMAX testbed with multiple video flows directed at several Customer Premises Equipment (CPE) devices simultaneously. We employ the Evalvid framework and develop a methodology for its use in multi-client evaluations. We report our results for Variable Bit Rate (VBR) and Constant Bit Rate (CBR) video streams and draw conclusions.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134118647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Channel assignment algorithms: a comparison of graph based heuristics 通道分配算法:基于图的启发式的比较
Husnain Mansoor Ali, A. Busson, V. Vèque
{"title":"Channel assignment algorithms: a comparison of graph based heuristics","authors":"Husnain Mansoor Ali, A. Busson, V. Vèque","doi":"10.1145/1641913.1641931","DOIUrl":"https://doi.org/10.1145/1641913.1641931","url":null,"abstract":"This paper gives the comparison of different channel assignment heuristics proposed in the literature and introduces a new algorithm named MCAIR. Specifically, it compares, static, multi-radio multi-channel algorithms which are graph theory based and where a priori traffic characteristics are unknown. It also proposes new metrics other than overall interference which guide in better evaluating the assignment.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122035164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Analyzing the behavior of acoustic link models in underwater wireless sensor networks 水下无线传感器网络中声链路模型的行为分析
Jesús Llor, Esteban Torres, Pedro Pablo Garrido Abenza, Manuel P. Malumbres
{"title":"Analyzing the behavior of acoustic link models in underwater wireless sensor networks","authors":"Jesús Llor, Esteban Torres, Pedro Pablo Garrido Abenza, Manuel P. Malumbres","doi":"10.1145/1641913.1641915","DOIUrl":"https://doi.org/10.1145/1641913.1641915","url":null,"abstract":"In the last years, wireless sensor networks have been proposed for their deployment in underwater environments where a lot of applications like aquiculture, pollution monitoring and offshore exploration would benefit from this technology. Despite having a very similar functionality, Underwater Wireless Sensor Networks (UWSNs) exhibit several architectural differences with respect to the terrestrial ones, which are mainly due to the transmission medium characteristics (sea water) and the signal employed to transmit data (acoustic ultrasound signals). So, the design of appropriate network architecture for UWSNs is seriously hardened by the specific characteristics of the communication system. In this work we analyze several acoustic channel models for their use in underwater wireless sensor network architectures. For that purpose, we have implemented them by using the OPNET Modeler tool in order to perform an evaluation of their behavior under different network scenarios. Finally, some conclusions are drawn showing the impact on UWSN performance of different elements of channel model and particular specific environment conditions","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125833031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Assessing the feasibility of a VANET driver warning system 评估VANET驾驶员警告系统的可行性
F. Martinez, Juan-Carlos Cano, C. Calafate, P. Manzoni, J. M. Barrios
{"title":"Assessing the feasibility of a VANET driver warning system","authors":"F. Martinez, Juan-Carlos Cano, C. Calafate, P. Manzoni, J. M. Barrios","doi":"10.1145/1641913.1641919","DOIUrl":"https://doi.org/10.1145/1641913.1641919","url":null,"abstract":"In this work we evaluate the feasibility of a VANET Warning System in which damaged vehicles send vehicle safety messages with high reliability and low delay.\u0000 We performed a sensitivity study to evaluate the impact of varying some parameters in the proposed system. We varied the number of damaged vehicles, the total number of vehicles, as well as the priority and periodicity of the messages sent to study the impact on the time required to propagate the warning messages, the number of blind vehicles (i.e., vehicles that do not receive these packets) and the number of packets received per vehicle, in order to study the viability of our system.\u0000 We show that the warning notification time is lower when vehicle density increases and the percentage of blind vehicles highly depends on this factor. Finally, the results demonstrated that, to obtain the lowest possible warning notification time in our system, the best solution is that messages have different priorities depending on their characteristics.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129366443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Delay analysis for symmetric nodes in mobile ad hoc networks 移动自组网中对称节点的时延分析
Taesoo Jun, C. Julien
{"title":"Delay analysis for symmetric nodes in mobile ad hoc networks","authors":"Taesoo Jun, C. Julien","doi":"10.1145/1641913.1641940","DOIUrl":"https://doi.org/10.1145/1641913.1641940","url":null,"abstract":"Different deployments of mobile ad hoc networks (MANETs) can have widely varying characteristics that greatly impact the behavior of different routing protocols created for these networks. Before applications can be deployed in such environments, it is important for developers to understand the potential quantitative behavior of the protocols that support their applications. Analytical models exist to describe the behavior of MANETs, but they are restricted to simplistic statistical models that represent either node mobility or link connectivity individually without considering the interplay of the two and other important aspects of MANETs. Our previous work has begun developing an integrated analytical framework which considers the impact the physical environment, network characteristics, protocols' behaviors, and the applications' communication patterns have on performance. In this paper, we focus specifically on analytical model to account for the subtleties of message queueing in MANETs. Our analysis explains a delay of a data packet in a mobile node under homogeneous conditions in a node mobility and traffic. This resulting model is expressed with parameters which are obtainable from systems, application designers and a operating environment. We describe our system and derive the delay model. We validate our analytical result through network simulation and discuss potential limitations of the model and future works.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115838911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhanced VON-AODV based on delayed rebroadcast scheme 基于延迟重播方案的增强VON-AODV
Y. Khamayseh, Ghadeer Obeidat, Asmahan Abu Alhassan
{"title":"Enhanced VON-AODV based on delayed rebroadcast scheme","authors":"Y. Khamayseh, Ghadeer Obeidat, Asmahan Abu Alhassan","doi":"10.1145/1641913.1641924","DOIUrl":"https://doi.org/10.1145/1641913.1641924","url":null,"abstract":"Routing in MANET is a challenging problem. Several protocols have been proposed to deal with various aspects of this problem. In this paper, we propose a new enhanced routing protocol that is based on delayed rebroadcast scheme. The proposed protocol extends the ideas of both AODV and VON schemes. Tha main goal of the proposed scheme is to build a stable route based on the hop-based AODV, velocity of nodes and traffic status of the nodes. The performance of the proposed protocol is evaluated using simulation.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134505729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adaptive scheduling of wireless video sensor nodes for surveillance applications 用于监控应用的无线视频传感器节点自适应调度
A. Makhoul, Rachid Saadi, C. Pham
{"title":"Adaptive scheduling of wireless video sensor nodes for surveillance applications","authors":"A. Makhoul, Rachid Saadi, C. Pham","doi":"10.1145/1641913.1641921","DOIUrl":"https://doi.org/10.1145/1641913.1641921","url":null,"abstract":"Traditional vision systems for surveillance applications are built essentially from distributed high resolution video cameras and powerful processing units which communicate in general with central servers via a high bandwidth network. Using autonomous and small wireless video sensor nodes can add a much higher level of flexibility, therefore extending the range of surveillance applications that could be considered and, more interestingly, can support dynamic deployment scenario. With such resource-constrained devices power conservation is an important issue but one must also ensure that the application's objectives are met. In this paper, we address the problem of adaptive scheduling of sensor node's activity to extend the network lifetime while fulfilling a critical surveillance application needs. We first present a distributed algorithm that ensures both coverage of the deployment area and network connectivity by providing multiple cover sets to manage Field of View redundancies. Then, we propose a multiple levels activity model that uses behavior functions modeled by modified Bezier curves to define application classes and allow for adaptive scheduling. Simulation results are presented to validate the performance of the proposed approach.","PeriodicalId":311005,"journal":{"name":"International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133634827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信