2014 IFIP Wireless Days (WD)最新文献

筛选
英文 中文
Interference-aware Game-based Channel Assignment algorithm for MR-MC WMNs 基于干扰感知博弈的MR-MC wmn信道分配算法
2014 IFIP Wireless Days (WD) Pub Date : 2014-11-12 DOI: 10.1109/WD.2014.7020816
Amira Bezzina, M. Ayari, R. Langar, G. Pujolle, L. Saïdane
{"title":"Interference-aware Game-based Channel Assignment algorithm for MR-MC WMNs","authors":"Amira Bezzina, M. Ayari, R. Langar, G. Pujolle, L. Saïdane","doi":"10.1109/WD.2014.7020816","DOIUrl":"https://doi.org/10.1109/WD.2014.7020816","url":null,"abstract":"One of the main challenges of multi-radio multi-channel wireless mesh networks (MR-MC WMNs) is how to efficiently avail from the radio resources available in the network. The level of interference experienced by the mesh nodes rises when the network becomes more connected and the number of radios per node increases. To mitigate interference experienced by the wireless mesh nodes while taking advantage from the multi-channel network aspect, we propose a novel Interference-aware Game based Channel Assignment algorithm, named IGCA. We prove through simulations that our proposed algorithm contributes in alleviating the node interference degree, fairly allocates interfaces to network non-overlapping channels and increases simultaneous transmissions in the network. An improvement up to 50% of both interference degree and simultaneous connections is particularly observed in comparison with a prominent existing approach - the Near-optimal Partially Overlapping Channel Assignment algorithm.","PeriodicalId":311349,"journal":{"name":"2014 IFIP Wireless Days (WD)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133212550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Access Point discovery in 802.11 networks 802.11网络中的接入点发现
2014 IFIP Wireless Days (WD) Pub Date : 2014-11-12 DOI: 10.1109/WD.2014.7020817
A. Arcia-Moret, Laudin Molina, N. Montavont, G. Castignani, Alberto Blanc
{"title":"Access Point discovery in 802.11 networks","authors":"A. Arcia-Moret, Laudin Molina, N. Montavont, G. Castignani, Alberto Blanc","doi":"10.1109/WD.2014.7020817","DOIUrl":"https://doi.org/10.1109/WD.2014.7020817","url":null,"abstract":"This paper analyzes the scanning process in IEEE 802.11 networks in an urban setting characterized by a high Access Point (AP) density. Most of these APs belong to a community network, known as a collection of APs announcing the same network name (Service Set Identifier or SSID). The owner of an AP can optionally configure the community network of his/her AP, resulting in an irregular topology for each community network as there is no central planning authority. We investigate the relationship between the time spent in each channel while scanning for available APs and the number of AP actually detected. In particular we show that, in order to discover all available APs at a given location, we need to combine the results of multiple scans. Based on this result we argue that the efficiency of the scanning process could be greatly improved by using a database shared by all the users of a community network, containing the available APs at different locations.","PeriodicalId":311349,"journal":{"name":"2014 IFIP Wireless Days (WD)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Software-defined vehicular backhaul 软件定义的车载回程
2014 IFIP Wireless Days (WD) Pub Date : 2014-11-12 DOI: 10.1109/WD.2014.7020813
Benjamin Baron, P. Spathis, H. Rivano, M. Amorim, Y. Viniotis, J. Clarke
{"title":"Software-defined vehicular backhaul","authors":"Benjamin Baron, P. Spathis, H. Rivano, M. Amorim, Y. Viniotis, J. Clarke","doi":"10.1109/WD.2014.7020813","DOIUrl":"https://doi.org/10.1109/WD.2014.7020813","url":null,"abstract":"The network of roads and highways is a promising candidate to help network operators offload their infrastructure and cope with the ever-growing amount of data exchanged on the Internet. By piggybacking data onto vehicles, roads can be turned into a large-capacity transmission system when considering the increasing number of journeys involving vehicles. The data to be transferred is opportunistically loaded on or off the vehicles at specific locations referred to as offloading spots. Two of the main challenges of such a system are how to assign the road paths matching the data transfer requirements and how much data to allocate to each flow of vehicles. We propose a centralized SDN-like architecture consisting of a central controller acting as a service broker and the offloading spots as SDN agents. The controller computes the road paths that accommodate the data transfer requirements and installs the corresponding forwarding states at each offloading spot along those paths. We describe our SDN-controlled offloading system and evaluate its performance using road traffic counts from France. Our numerical results show that the controller can achieve efficient and fair allocation of multiple data transfers between major cities of France. Each transfer successfully delivers over 10 PB of data within a week when considering that 10% of vehicles on the road are equipped with 1TB of storage.","PeriodicalId":311349,"journal":{"name":"2014 IFIP Wireless Days (WD)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131740886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A new opportunistic routing scheme in low duty-cycle WSNs for monitoring infrequent events 一种新的低占空比无线传感器网络中的机会路由方案
2014 IFIP Wireless Days (WD) Pub Date : 2014-11-12 DOI: 10.1109/WD.2014.7020836
Mohamed-Haykel Zayani, N. Aitsaadi, P. Mühlethaler
{"title":"A new opportunistic routing scheme in low duty-cycle WSNs for monitoring infrequent events","authors":"Mohamed-Haykel Zayani, N. Aitsaadi, P. Mühlethaler","doi":"10.1109/WD.2014.7020836","DOIUrl":"https://doi.org/10.1109/WD.2014.7020836","url":null,"abstract":"In this paper, we address opportunistic routing in low-duty cycle wireless sensor networks. Such a design must take an opportunistic approach in order to cope with the unpredictable appearance of wireless links. In fact, topology-based routing approaches are ineffective in this context. Our main objective is to maximize the network lifespan while guaranteeing i) the routing of packets to the sink and ii) acceptable end-to-end delays. We propose a new geographical opportunistic cross-layer scheme based on an asynchronous sender-oriented MAC protocol. The proposal sets the priority of selecting the next hop, among all potential candidates, according to its closeness to the sink. The next hop is elected through a selection process based on signalling bursts. The performance evaluation of our proposal is carried out both by an analytical model and simulations. The approach is evaluated in terms of i) probability of packet delivery to the sink, ii) number of hops per path and iii) end-to-end packet delay from the source to the sink.","PeriodicalId":311349,"journal":{"name":"2014 IFIP Wireless Days (WD)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129169535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy-efficient architecture for wearable sensor networks 可穿戴传感器网络的节能架构
2014 IFIP Wireless Days (WD) Pub Date : 2014-11-12 DOI: 10.1109/WD.2014.7020803
Tifenn Rault, A. Bouabdallah, Y. Challal, Frédéric Marin
{"title":"Energy-efficient architecture for wearable sensor networks","authors":"Tifenn Rault, A. Bouabdallah, Y. Challal, Frédéric Marin","doi":"10.1109/WD.2014.7020803","DOIUrl":"https://doi.org/10.1109/WD.2014.7020803","url":null,"abstract":"Human activity recognition from on-body sensor networks is a challenging task for many healthcare applications because it offers continuous monitoring capability. However, these systems still face a major energy issue that prevent their wide adoption. Indeed, in healthcare applications, continuous sampling and communication tasks quickly deplete sensors' battery reserves, and frequent battery replacement are not convenient. Therefore, there is a need to develop energy-efficient solutions for long-term monitoring applications in order to foster the acceptance of these technologies by the patients. In this paper, we present a new energy-efficient architecture for health monitoring where sensors send the sensed data mainly via the user mobile phone, but they have the possibility to send data to access points when they are available in the user environment. The objective of this strategy is to relieve a unique base station from receiving all the data, and it enables sensor nodes to select the best communication technology in terms of energy consumption. Contrary to existing approaches, our solution allows to optimize the lifetime of both the sensor and the base station. The simulation results show that the proposed approach effectively improves the energy efficiency of the system compared to traditional architectures where wearable sensors can only communicate with the user mobile phone.","PeriodicalId":311349,"journal":{"name":"2014 IFIP Wireless Days (WD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129529979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A reward-based routing protocol to reduce the EMF exposure over wireless mesh networks 一种基于奖励的路由协议,以减少无线网状网络上的EMF暴露
2014 IFIP Wireless Days (WD) Pub Date : 2014-11-01 DOI: 10.1109/WD.2014.7020834
Voichita Iancu, L. Díez, L. R. D. Lope, E. Slusanschi, Ramón Agüero
{"title":"A reward-based routing protocol to reduce the EMF exposure over wireless mesh networks","authors":"Voichita Iancu, L. Díez, L. R. D. Lope, E. Slusanschi, Ramón Agüero","doi":"10.1109/WD.2014.7020834","DOIUrl":"https://doi.org/10.1109/WD.2014.7020834","url":null,"abstract":"This paper presents Reward Based Routing Protocol (RBRP), a novel routing protocol for wireless mesh networks, that aims at reducing and fairly distributing the Electromagnetic Field (EMF) Exposure caused by wireless transmissions. The basis of this protocol is a reward-based scheme in which intermediate nodes forward packets and receive a reward proportional to the degree of exposure they generate. By means of a simulation campaign over the NS-3 framework, we assess that RBRP clearly outperforms a legacy approach in terms of exposure, while it does not show a worse behaviour, when considering other figures of merit.","PeriodicalId":311349,"journal":{"name":"2014 IFIP Wireless Days (WD)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced opportunistic random linear source/network coding with cross-layer techniques over wireless mesh networks 在无线网状网络上使用跨层技术增强机会随机线性源/网络编码
2014 IFIP Wireless Days (WD) Pub Date : 2014-11-01 DOI: 10.1109/WD.2014.7020842
David Gómez, Pablo Garrido, Eduardo Rodríguez, Ramón Agüero, L. Muñoz
{"title":"Enhanced opportunistic random linear source/network coding with cross-layer techniques over wireless mesh networks","authors":"David Gómez, Pablo Garrido, Eduardo Rodríguez, Ramón Agüero, L. Muñoz","doi":"10.1109/WD.2014.7020842","DOIUrl":"https://doi.org/10.1109/WD.2014.7020842","url":null,"abstract":"In this paper we thoroughly study, by means of simulation, the combination of source and network random linear coding to provide reliable communications over wireless mesh networks. We assume that intermediate nodes code the packets they have previously stored before forwarding them. We also analyze the possibilities that are brought about by opportunistic listening and forwarding, combining them with the use of cross-layer information. We study the performance of the proposed scheme by means of an extensive simulation campaign carried out over the ns-3 platform; the results show that the coding functionality at the intermediate nodes leads to additional performance enhancements. In addition, they also demonstrate the potential benefits of integrating cross-layer techniques.","PeriodicalId":311349,"journal":{"name":"2014 IFIP Wireless Days (WD)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123521290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance issues with routing in multi-channel multi-interface IEEE 802.11s networks 多通道多接口IEEE 802.11s网络中路由的性能问题
2014 IFIP Wireless Days (WD) Pub Date : 2014-11-01 DOI: 10.1109/WD.2014.7020810
Renato Caminha Juaçaba-Neto, R. Andrade, R. Braga, Fabrice Théoleyre, C. Oliveira
{"title":"Performance issues with routing in multi-channel multi-interface IEEE 802.11s networks","authors":"Renato Caminha Juaçaba-Neto, R. Andrade, R. Braga, Fabrice Théoleyre, C. Oliveira","doi":"10.1109/WD.2014.7020810","DOIUrl":"https://doi.org/10.1109/WD.2014.7020810","url":null,"abstract":"Wireless Mesh Networks have the potential to serve as an all-wireless backbone. They represent a key building block of the new Internet of Things to collect all the traffic. However, IEEE 802.11 performs very poorly in multi-hop topologies leading to unfairness and a poor throughput. Thus, the standard IEEE 802.11s proposes to re-use the IEEE 802.11 medium access in a mesh multi-hop topology while using a routing protocol to create routes at the layer 2. IEEE 802.11s may exploit multi-channel multi-interface wireless routers to increase the through-put. In particular, the routing protocol must select carefully the forwarders to limit inter- and intra-flow interference. In this paper, we propose to fully characterize the performance of IEEE 802.11s when using multi-interface nodes, and to isolate some key performance issues. We also propose some key mechanisms that must be implemented to solve these pathological cases and to improve the throughput.","PeriodicalId":311349,"journal":{"name":"2014 IFIP Wireless Days (WD)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129974182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A ns-3 based simulator of TCP/IP Wireless Underground Networks 基于ns-3的TCP/IP无线地下网络模拟器
2014 IFIP Wireless Days (WD) Pub Date : 2014-11-01 DOI: 10.1109/WD.2014.7020809
Sérgio Conceição, Filipe Ribeiro, R. Campos, M. Ricardo
{"title":"A ns-3 based simulator of TCP/IP Wireless Underground Networks","authors":"Sérgio Conceição, Filipe Ribeiro, R. Campos, M. Ricardo","doi":"10.1109/WD.2014.7020809","DOIUrl":"https://doi.org/10.1109/WD.2014.7020809","url":null,"abstract":"Wireless Underground Networks (WUNs) include communications links between buried nodes and between buried and aboveground nodes. WUNs have many applications, such as border surveillance, agriculture monitoring, and infrastructure monitoring. Recent studies have shown that they are feasible and have deployment advantages over wired networks. Yet, so far WUNs evaluations have been done using testbeds only, and a tool enabling simulations on TCP/IP WUNs is lacking. We propose a simulator of TCP/IP wireless underground networks based on ns-3. The simulator was validated against experimental results for 433 MHz and 2.4 GHz frequency bands. The results show its accuracy for most of the communications scenarios.","PeriodicalId":311349,"journal":{"name":"2014 IFIP Wireless Days (WD)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117303128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cooperative implicit feedback generation in interfering heterogeneous LTE networks 干扰异构LTE网络中的协同隐式反馈生成
2014 IFIP Wireless Days (WD) Pub Date : 2014-11-01 DOI: 10.1109/WD.2014.7020800
Stanislaus Iwelski, Erfan Majeed, Z. Bai, G. Bruck, P. Jung
{"title":"Cooperative implicit feedback generation in interfering heterogeneous LTE networks","authors":"Stanislaus Iwelski, Erfan Majeed, Z. Bai, G. Bruck, P. Jung","doi":"10.1109/WD.2014.7020800","DOIUrl":"https://doi.org/10.1109/WD.2014.7020800","url":null,"abstract":"Next generation long term evolution (LTE) systems evolve towards small cell transmission to enable the tremendous data growth. However, emerging interference is the dominant limiting factor achieving higher network capacities. In this paper we focus on cooperative implicit feedback generation in interfering heterogeneous networks (HetNets) to assist the cell edge user equipment (UE) suffering from dominant co-channel inter-cell interference. As a hand-over might be refused and conventional precoding matrix index (PMI) selection schemes limit reliable downlink (DL) transmission, the co-scheduled UEs delegate the PMI selection to that victim UE, trimming the codebook. We provide a practical implementation for the cooperative PMI selection, keeping computational complexity and feedback overhead low. With numerical results at the link level we show that the suggested cooperative PMI selection algorithm mitigates co-channel inter-cell interference and as a result enables reliable DL transmission at the victim UE.","PeriodicalId":311349,"journal":{"name":"2014 IFIP Wireless Days (WD)","volume":"35 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132692527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信