{"title":"Fair traffic scheduling for WiMAX systems","authors":"A. Bestetti, G. Giambene, Snezana Hadzic-Puzovic","doi":"10.1109/ISWCS.2009.5285334","DOIUrl":"https://doi.org/10.1109/ISWCS.2009.5285334","url":null,"abstract":"This paper deals with the comparison in terms of goodput and fairness of different scheduling options for fixed WiMAX networks. An analytical approach has been adopted to determine the average system capacity for different scheduling options, thus highlighting that scheduling schemes have an important impact in WiMAX network planning. We have then compared via simulations different uplink scheduling options for the best effort (contention-based) traffic class with FTP traffic flows, such as: RR, token bucket-based, and M-LWDF. We have shown that M-LWDF can achieve a good trade-off between aggregated goodput maximization and a fair service provision.","PeriodicalId":344018,"journal":{"name":"2009 6th International Symposium on Wireless Communication Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129797273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attractive pricing mechanism for connection sharing and coverage extension of wireless networks","authors":"P. Pace, Mariangela Mole, G. Aloi","doi":"10.1109/ISWCS.2009.5285304","DOIUrl":"https://doi.org/10.1109/ISWCS.2009.5285304","url":null,"abstract":"This paper proposes an attractive and efficient pricing mechanism in order to provide incentives for private wireless nodes to collaborate each others with the aim of offering an Internet public access service. Thanks to the proposed strategy, a natural extension of the wireless coverage area can be realized by the users which decide to share their resources in order to reduce their connection fee. The mechanism takes into account the users' utility function and it has the aim of reaching the overall network efficiency using pricing as a way not only to share transmission resources but to control and prevent the network congestion as well. The obtained results show the goodness of the proposed strategy in terms of profits obtained by the nodes who decided to share their resources and overall network utility due to an high clients' satisfaction degree.","PeriodicalId":344018,"journal":{"name":"2009 6th International Symposium on Wireless Communication Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128272027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure and efficient authentication protocol for passive RFID tags","authors":"C. Kolias, V. Kolias, G. Kambourakis","doi":"10.1109/ISWCS.2009.5285367","DOIUrl":"https://doi.org/10.1109/ISWCS.2009.5285367","url":null,"abstract":"At the onset of the ubiquitous computing era, systems need to respond to a variety of challenges, in order to capitalize on the benefits of pervasiveness. One of the pivotal enablers of pervasive computing is the RFID technology which can be successfully applied in numerous applications. However, the interaction of such applications with sensitive personal data renders the need for assuring confidentiality a sine qua non. The native limitations in computing resources, i.e., computational power, memory etc, that characterize nearly all classes of RFID tags make the development of custom-tailored RFID security protocols a troublesome yet challenging task. In this paper we propose a mutual authentication protocol for low cost RFID tags and readers. We also demonstrate that our scheme is more efficient in terms of resource utilization on the backend server, and under identical conditions, more secure when compared with existing congruent protocols.","PeriodicalId":344018,"journal":{"name":"2009 6th International Symposium on Wireless Communication Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122538941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint channel decoding with feedback power control in sensor networks with correlated sources","authors":"A. Abrardo, G. Ferrari, M. Martalò, F. Perna","doi":"10.1109/ISWCS.2009.5285234","DOIUrl":"https://doi.org/10.1109/ISWCS.2009.5285234","url":null,"abstract":"In this paper, we derive feedback power control strategies for block-faded multiple access schemes with correlated sources. In particular, upon the derivation of the feasible signal-to-noise ratio (SNR) region for the considered multiple access schemes, i.e., the multidimensional SNR region where error-free communications are, in principle, possible, two feedback power control strategies are proposed: (i) a “classical” feedback power control strategy, which aims at “equalizing” the SNRs at the AP over all communication links, and (ii) an “optimal” feedback power control strategy, which tries to make the network operational point fall in the feasible SNR region at the lowest energy consumption. These strategies will be referred to as balanced SNR and unbalanced SNR, respectively. While they require unlimited power control range at the sources (the sensors), we then propose “practical” implementations by limiting the power control range. We evalute the benefits brought by the use of the proposed feedback power control strategies considering joint channel decoding (JCD) schemes, where the sensors use channel coding and a proper iterative decoding algorithm is considered at the AP. The analysis is carried out considering the use of low-density parity-check (LDPC) codes and a serially concatenated convolutional code (SCCC).","PeriodicalId":344018,"journal":{"name":"2009 6th International Symposium on Wireless Communication Systems","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123135275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A probability based vertical handover approach to prevent ping-pong effect","authors":"G. Tamea, A. Vegni, T. Inzerilli, R. Cusani","doi":"10.1109/ISWCS.2009.5285308","DOIUrl":"https://doi.org/10.1109/ISWCS.2009.5285308","url":null,"abstract":"Vertical handover is a new trend for heterogeneous next generation networks, in order to assure ubiquitous and seamless connectivity to mobile users. This paper presents a novel vertical handover algorithm based on a probabilistic approach for decision strategy. The proposed technique deals with the assessment of a Wrong Decision Probability (WDP), which assures a trade-off between network performance maximization and mitigation of the ping-pong effect. The WDP is evaluated using network parameters, such as instantaneous estimated goodput. Analytical and simulation sections are presented in order to validate the VHO assessment. Basically, a simulated network scenario has been considered, where a mobile device moves at low speed. Specifically, simulated results have been evaluated for typical wireless access technologies (i.e. with small and medium transmission ranges). Results depict the effectiveness of the proposed vertical handover algorithm in terms of maximization of cumulative received bits, and minimization of unwanted and unnecessary vertical handovers.","PeriodicalId":344018,"journal":{"name":"2009 6th International Symposium on Wireless Communication Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126491458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Load Adaptive subcarrier and bit allocation algorithm for non-real time services in an OFDMA system","authors":"H. Fattah, H. Alnuweiri","doi":"10.1109/ISWCS.2009.5285312","DOIUrl":"https://doi.org/10.1109/ISWCS.2009.5285312","url":null,"abstract":"Orthogonal Frequency Division Multiple Access (OFDMA) is an efficient access technique that allocates different subcarriers to multiple users where each subcarrier is loaded with a number of bits belonging to that user. Allocating subcarriers and bits to multiple users has been the focus of many algorithms that attempt to maximize the throughput or minimize the total transmit power used. Non-real time applications such as web browsing are dominant applications in most of the emerging wireless networks. A key performance measure of such applications is the average packet delay provided by the network. In this paper, we propose a novel Load Adaptive (LA) algorithm for non-real time services that allocates the subcarriers and bits to each user according to its individual load and the available transmit power so as to minimize the overall average packet delay for all users. The algorithm takes into account queueing theory and the quality of service requirement of each user. Numerical results show that the overall average packet delay of the proposed algorithm is significantly reduced compared to other algorithms.","PeriodicalId":344018,"journal":{"name":"2009 6th International Symposium on Wireless Communication Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the effective adaptive modulation polices for Non-orthogonal Multicarrier systems","authors":"Adrian Kliks, H. Bogucka, I. Stupia","doi":"10.1109/ISWCS.2009.5285269","DOIUrl":"https://doi.org/10.1109/ISWCS.2009.5285269","url":null,"abstract":"In this paper new Bit and Power Loading (BPL) algorithm is presented, which is suitable for application in Non-orthogonal Multicarier (NOMC) Systems. Its main idea bases on the J. Campello's approach, originally designed for orthogonal multicarrier systems, like Orthogonal Frequency Division Multiplexing (OFDM). In the proposed solution, the NOMC-specific features are considered, i.e. two-dimensional processing and the presence of self-interference phenomenon on the transmitter side. The proposed modifications and improvements cause significant reduction of computation complexity, while ensuring high performance, and make the proposed algorithm well-suited for practical implementation. Such conclusions are confirmed by the presented simulation results.","PeriodicalId":344018,"journal":{"name":"2009 6th International Symposium on Wireless Communication Systems","volume":"5 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120894623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alberto Nascimento, A. Gameiro, Jonathan Rodriguez
{"title":"A joint utilility-token bucket Packet Scheduling algorithm for IEEE 802.16e WiMAX networks","authors":"Alberto Nascimento, A. Gameiro, Jonathan Rodriguez","doi":"10.1109/ISWCS.2009.5285313","DOIUrl":"https://doi.org/10.1109/ISWCS.2009.5285313","url":null,"abstract":"A new Packet Scheduler whose architecture is based on the cross-layer paradigm is proposed for the IEEE 802.16e standard of Mobile WiMAX networks. The scheduler combines functionalities derived from the use of the utility function concept from economics, for the satisfaction of the maximum packet delay from real time service flows, and the token bucket principle for the support of minimum throughput requirements from non-real time service flows. Commonly used packet schedulers in the literature are used in the performance evaluation of the proposed scheduler, by means of System Level Simulations under a realistic network layout, conducted on a proprietary C++ platform, fully compatible with the IEEE802.16e standard. Performance is evaluated by means of the percentage of satisfied users for a given range of the system load (amount of active users in the system).","PeriodicalId":344018,"journal":{"name":"2009 6th International Symposium on Wireless Communication Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121693522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective spectral efficiency for adaptive QAM with diversity and pilot assisted channel estimation","authors":"L. Toni, A. Conti, F. Zabini, O. Andrisano","doi":"10.1109/ISWCS.2009.5285252","DOIUrl":"https://doi.org/10.1109/ISWCS.2009.5285252","url":null,"abstract":"This paper investigates the effects of non-ideal channel state information in adaptive M-ary quadrature amplitude modulation systems with subset diversity. The slow adaptive modulation (SAM) technique, which adapts the modulation parameters to slow channel variations, is considered. With respects to fixed scheme modulation systems, SAM achieves a good gain in terms of spectral efficiency (SE) and outage probability and, compared to fast adaptive modulation, reduces the system complexity by lowering the feedback rate. Resources dedicated to channel estimation affect both the system performance, in terms of error and outage probability, and the effective SE for which a proper definition is needed. Here, we evaluate the performance of SAM technique when pilot-assisted channel estimation errors are considered. Taking into account the number of pilot symbols transmitted, an effective SE is obtained to address the tradeoff between channel estimation quality and SE.","PeriodicalId":344018,"journal":{"name":"2009 6th International Symposium on Wireless Communication Systems","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121767064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic on-body channel and its ARQ error control","authors":"B. Zhen, T. Aoyagi, R. Kohno","doi":"10.1109/ISWCS.2009.5285233","DOIUrl":"https://doi.org/10.1109/ISWCS.2009.5285233","url":null,"abstract":"On-body communication channels are of increasing interest as more and more wireless devices are wearable in medical, military and personal communication applications. Based on our previous study, this paper investigates reasons for time-varying fading of on-body channel and its ARQ error control. We used commercial software POSER7 to generate distance and direction mismatch between on-body antennas during actions and analyzed dynamic path loss based on a measured on-body antenna radiation pattern. The middle and long term fading are attributed to intended movements which can be controlled, and the dominant short term fading is attributed to the mismatch of antenna direction resulting from unintentional movements which cannot be controlled. Backoff strategy for ARQ retransmission to over the dynamic on-body fading is then analyzed on considering QoS criteria and power consumption criteria.","PeriodicalId":344018,"journal":{"name":"2009 6th International Symposium on Wireless Communication Systems","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114245341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}