G. Kormetzas, J. Alonso-Zarate, L. Alonso, C. Verikoukis
{"title":"Performance Analysis of IEEE 802.11 Ad Hoc Networks with Cooperative ARQ in the Presence of Hidden and Exposed Terminals","authors":"G. Kormetzas, J. Alonso-Zarate, L. Alonso, C. Verikoukis","doi":"10.1109/glocom.2009.5425387","DOIUrl":"https://doi.org/10.1109/glocom.2009.5425387","url":null,"abstract":"We present in this paper the analysis of an IEEE 802.11 network in the presence of hidden and exposed terminals when a Cooperative ARQ (C-ARQ) scheme is executed at the MAC layer. When spontaneous helpers transmit to assist in a failed transmission, the area exposed to the original transmission increases in comparison to non-cooperative ARQ schemes. In this paper we quantify this effect and we evaluate the relevance of designing efficient protocols to combat the exposed terminal problem.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115117250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Boyd, J. Michael Frye, M. Pursley, Thomas C. Royster IV
{"title":"Receiver Statistics for Spectrum Monitoring While Communicating","authors":"S. Boyd, J. Michael Frye, M. Pursley, Thomas C. Royster IV","doi":"10.1109/GLOCOM.2009.5425215","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425215","url":null,"abstract":"In many dynamic spectrum access networks, it is necessary for secondary users to monitor the frequency band in which they are communicating so that they can determine if the primary user has begun transmission. Traditional sensing methods require the transmitters of the secondary users to be silent while spectrum monitoring is performed. Statistics that are derived easily in a communications receiver have the potential to permit a level of spectrum monitoring while the receiver is demodulating and decoding a packet, so that it is not necessary to silence the secondary transmitters. The proposed techniques for spectrum monitoring can supplement existing methods and reduce the amount of time that secondary users must refrain from communicating.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115123982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Selected Packet Dispatching Schemes for the CBC Switches","authors":"J. Kleban, S. Piotrowski","doi":"10.1109/GLOCOM.2009.5426083","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5426083","url":null,"abstract":"The CBC stands for the Central-stage Buffered Clos-network. This kind of switching fabric was proposed and theoretically evaluated by F. Wang and M. Hamdi. In this paper new packet dispatching schemes for the CBC switches are proposed and evaluated. We study three such schemes, called RGNA (Request -- Grant with No Association), RGAM (Request - Grant with Associated output Modules), and RGAP (Request - Grant with Associated output Ports). Our research is aimed at finding an answer to the question: what kind of packet dispatching scheme should be used in the CBC switch to achieve very good performance in terms of throughput, cell delay and central buffers size. The uniform and nonuniform traffic distribution patterns are used to evaluate the performance of the CBC switch. Using computer simulation we try to fill an important gap between the theory and practical implementation of interesting switch architecture.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115311947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of Capacity and Energy Saving of VoIP over IEEE 802.11 WLANs by a Dynamic Sleep Strategy","authors":"Chenyuan Zhu, Hui Yu, Xinbing Wang, Hsiao-Hwa Chen","doi":"10.1109/GLOCOM.2009.5425518","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425518","url":null,"abstract":"Capacity and power consumption are two main bottlenecks in the wide deployment of Voice-over-IP (VoIP) over IEEE 802.11 wireless LAN, when mobile terminals are used, the impact on the Voice-over-IP (VoIP) by power consumption becomes more critical. In this paper, we analyze the capacity of VoIP traffic in 802.11 WLAN and do the relevant simulations with and without sleep strategy. We find that capacity decreases when the network adopts sleep strategy. After a detailed analysis by p-persistent model of the IEEE 802.11 protocol, we provide a dynamic sleep strategy, namely Collision Detective Dynamic Sleep Strategy (CDDSS) to improve both the capacity and energy saving rate of the VoIP over 802.11 WLANs. In our CDDSS, mobile station (MS) adjusts sleep interval and packetization interval adaptively according to the average collision probability pc of the network. Our simulation results show that CDDSS cannot only improve the capacity of VoIP in 802.11 WLANs, but also reduce considerable energy consumption.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmission Strategies and Sum Rate Maximization in Multi-User TDD Systems","authors":"U. Salim, D. Slock","doi":"10.1109/GLOCOM.2009.5425744","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425744","url":null,"abstract":"In a system comprising of a multiple antenna enabled base station (BS) and multiple single antenna users, very high data rates can be obtained if BS transmits to multiple users simultaneously. This simultaneous transmission to multiple users over the same bandwidth is realizable only if BS knows the forward channels linking its transmit antennas to these users. \u0000 \u0000We study a time-division duplexed (TDD) broadcast channel with initial assumption of channel information neither at the BS nor at the users' side. We propose two simple transmission strategies, one where users feedback independent of their channel realizations (earlier proposed in [1]) and the other where users feedback based upon their channel realizations. We derive a lower bound of the sum rate which reflects the rate loss compared to a system with perfect channel knowledge and the corresponding approximate sum rate expressions are developed for both schemes. These expressions capture the benefits of channel feedback, multi-user diversity and inter-user interference cancellation, and the cost of exchange of information required, and hence can be optimized for the sum rate maximization.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115390882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Event Reporting on Continuous Monitoring Wireless Sensor Networks","authors":"M. E. Rivero-Angeles, N. Bouabdallah","doi":"10.1109/GLOCOM.2009.5425296","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425296","url":null,"abstract":"Wireless Sensor Networks (WSNs) can be typically used to achieve Continuous Monitoring (CM) or Event-Detection inside the supervised area. In CM applications each sensor node transmits periodically its sensed data to the sink node while in Event-Detection Driven (EDD) applications, once an event occurs, it is reported to the sink node by the sensors within the event area. Applications using both continuous monitoring and event driven reporting can also be considered. \u0000 \u0000In this paper, we investigate such hybrid WSNs. Specifically, we propose to reduce the energy consumption by grouping the nodes that sense an event into a separate cluster. By doing so, as it is shown in this paper, the efficiency of the data compression scheme is indeed improved. This event-aware clustering scheme is compared to the case where the event data is transmitted through already established clusters. Finally, the case where sensor nodes only transmit information whenever they sense relevant data is introduced in order to achieve further energy savings.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115419107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Performance Gains of VoIP Aggregation and ROHC over a WirelessMAN-OFDMA Air Interface","authors":"Jarno Pinola, E. Piri, K. Pentikousis","doi":"10.1109/GLOCOM.2009.5425317","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425317","url":null,"abstract":"A growing number of mobile WiMAX deployments are in progress world-wide and the technology is anticipated to play a key role in next generation mobile broadband wireless networks. However, although the theoretical potential of WiMAX technologies is already well established, independent, publicly released, thorough evaluations of WiMAX network performance in the real world are yet to become available. In this study, we consider synthetic Voice over IP (VoIP) performance over the WirelessMAN-OFDMA air interface of a state of the art mobile WiMAX testbed operating at the 3.5 GHz frequency band and quantify the benefits of employing VoIP aggregation and Robust Header Compression (ROHC). Although VoIP aggregation and ROHC have been proposed and thoroughly evaluated through simulation and modeling, this is the first study to present empirical results from employing them over the Wireless MANOFDMA air interface of a real-world WiMAX system. Our results indicate that the combined use of VoIP aggregation and ROHC can increase the number of flows sustained without loss by approximately a factor of three.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115695562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Irregular Sensing Range Detection Model for Coverage Based Protocols in Wireless Sensor Networks","authors":"Xin Fei, A. Boukerche, R. B. Araujo","doi":"10.1109/GLOCOM.2009.5425640","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425640","url":null,"abstract":"In order to optimize the performance of wireless sensor networks, based on the boolean sensing model (BSM) many coverage preserving protocols have been proposed; however, BSM model is too idealistic to be maintained in many applications. Sensing range could be changed by environment factors such as the obstacle and weather condition. BSM based protocols can not achieve their design goals because of the errors of coverage measurement. In this paper, we proposed our irregular sensing range detection model (RDM) which solves the range detection problem through estimating the sensing range by a revised α-shape algorithm. A RDM based distributed algorithm for measuring the area coverage is proposed. Its complexity are analyzed and compared to the centralized α-shape based area coverage algorithm. A set of simulation experiments is carried out to evaluate the performance of our algorithm in terms of coverage accuracy, coverage error and complexity. The result shows that the boolean sensing model will lead to errors when obstacles are injected into environment; however, our range detection model can detect the changes of environments and help protocols adapt to it.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115731226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Class of MDS Erasure Codes Based on Graphs","authors":"N. Puttarak, Phisan Kaewprapha, B. Ng, T. Li","doi":"10.1109/GLOCOM.2009.5426134","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5426134","url":null,"abstract":"Maximum distance separable (MDS) array codes are XOR-based optimal erasure codes that are particularly suitable for use in disk arrays. This paper develops an innovative method to build MDS array codes from an elegant class of nested graphs, termed complete-graph-of-rings (CGR). We discuss a systematic and concrete way to transfer these graphs to array codes, unveil an interesting relation between the proposed map and the renowned perfect 1-factorization, and show that the proposed CGR codes subsume B-codes as their \"contracted\" codes. These new codes, termed CGR codes, and their dual codes are simple to describe, and require minimal encoding and decoding complexity.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123097079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kaveh Moezzi, K. Jalaleddini, A. Aghdam, M. Alasti, V. Tarokh
{"title":"An Adaptive Rate Assignment Strategy for CDMA2000 IS-856 Subject to RAB Delay","authors":"Kaveh Moezzi, K. Jalaleddini, A. Aghdam, M. Alasti, V. Tarokh","doi":"10.1109/GLOCOM.2009.5426040","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5426040","url":null,"abstract":"In this paper, the problem of resource allocation in IS-856 uplink in the presence of time-delay is studied. A set of nonlinear adaptive controllers are designed to stabilize the wireless network and use the system resources efficiently. The controllers obtained are then modified properly to retain network stability and performance in the presence of time-delay. Simulation results are presented to show the effectiveness of the proposed approach.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124409905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}