Xia Wang, Geoffrey Y. Li, Hongjie Hu, L. Qin, A. Soong
{"title":"IBI Cancellation Based on Limited Channel Feedback for OFDM Systems over Channels with Large Delay Spreads","authors":"Xia Wang, Geoffrey Y. Li, Hongjie Hu, L. Qin, A. Soong","doi":"10.1109/GLOCOM.2009.5426165","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5426165","url":null,"abstract":"While cyclic prefix (CP) is no larger than the delay span of wireless channels in an orthogonal frequency division multiplexing (OFDM) system, inter-block interference (IBI) and inter-carrier interference (ICI) will occur and the performance of the system will be deteriorated. If OFDM is designed with long enough CP, the efficiency of OFDM modulation is significantly reduced. To effectively mitigate interference over channel with large delay spreads, pre-processing approaches at transmitters based on full channel state information (CSI) have been proposed. However, feeding full CSI back will occupy significant bandwidth and is impractical sometimes. Therefore, pre-processing optimization exploiting limited CSI feedback is investigated in this paper. An pre-processing optimization approaches for IBI and ICI mitigation has been developed and tested. Computer simulation result shows that the proposed optimization algorithm can effectively cancel IBI and ICI over channels with large delay spreads and significantly improve the performance for OFDM systems.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimum/Sub-Optimum Detection for Multi-Branch Cooperative Diversity Networks with Limited CSI","authors":"Peng Liu, Il Kim","doi":"10.1109/GLOCOM.2009.5425456","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425456","url":null,"abstract":"We study the optimum maximum-likelihood (ML) detection and sub-optimum detection with limited channel state information (CSI) for a multi-branch dual-hop cooperative diversity network which consists of a source, multiple relays, and a destination without a direct source-destination path. With the limited CSI, the signalling overhead at each relay is reduced by 50%. We first derive the optimum ML detection with the limited CSI, which involves numerical integral evaluations. To reduce the computational complexity, we then propose a closed-form suboptimum detection rule. It is demonstrated that the proposed sub-optimum detection rule performs almost identically to the optimum ML detection when the non-Gaussianity in the added noise component dominates.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125184003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radio-Aware Scheduler for WiMAX Systems Based on Time-Utility Function and Game Theory","authors":"R. Garroppo, S. Giordano, D. Iacono","doi":"10.1109/GLOCOM.2009.5425581","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425581","url":null,"abstract":"The paper presents a scheduling algorithm for WiMAX systems, which exploits Time-Utility Functions (TUFs) and game theory. The scheduling decision is performed by means of two steps: the intra-class scheduling step and the interclass scheduling step. In the first one, each user exploits TUFs to choice the packets to transmit according to QoS requirements. In the second one, the scheduler exploits the game theory to select a specific game solution that provides more or less fairness among the users that have to be served. The available physical network resources (i.e. slots) are taken into account as a constraint to the scheduling decision. The proposed scheduling algorithm follows a cross-layer approach that takes into account application requirements by means of TUFs and physical Channel State Information (CSI) of each user. Several game solutions are compared by means of simulation results in terms of user fairness, user throughput, packet delay and packet expiration rate. The TUFs introduction is also evaluated comparing the different applications performance.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123195112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Block Diagonalization in the MIMO Broadcast Channel with Delayed CSIT","authors":"Jun Zhang, J. Andrews, R. Heath","doi":"10.1109/GLOCOM.2009.5426132","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5426132","url":null,"abstract":"This paper investigates the impact of delayed channel state information at the transmitter (CSIT) on the MIMO broadcast channel with block diagonalization (BD) precoding. First, an upper bound for the achievable throughput is provided, which shows that BD is more robust to imperfect CSIT than zeroforcing precoding as it has fewer inter-user interfering streams. Due to residual inter-user interference, the throughput of BD still saturates at high SNR, which motivates switching between single-user and multi-user precoding. An accurate closed-form approximation is derived for the achievable throughput of the BD system, which provides guidance on the preferred transmission technique for a given scenario.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123511836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamed Mohsenian Rad, V. Shah-Mansouri, V. Wong, R. Schober
{"title":"Randomized Multi-Channel Interrogation Algorithm for Large-Scale RFID Systems","authors":"Hamed Mohsenian Rad, V. Shah-Mansouri, V. Wong, R. Schober","doi":"10.1109/GLOCOM.2009.5425452","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425452","url":null,"abstract":"A radio frequency identification (RFID) system consists of a set of readers and several objects, equipped with small computer chips, called tags. In a dense RFID system, where several readers are placed together to improve the read rate and correctness, readers and tags can frequently experience packet collision. A common approach to avoid collision is to use a distinct frequency channel for interrogation for each reader. Various multi-channel anti-collision protocols have been proposed for RFID readers. However, due to their heuristic nature, most algorithms may not fully utilize the achievable system performance. In this paper, we develop an optimization-based distributed randomized multi-channel interrogation algorithm, called FDFA, for large-scale RFID systems. For this purpose, we develop elaborate models for reader-to-tag and reader-to-reader collision problems. FDFA algorithm is guaranteed to find a local optimum of a max-min fair resource allocation problem to balance the processing load among readers. Simulation results show that FDFA has a significantly better performance than the existing heuristic algorithms in terms of the number of successful interrogations. It also better utilizes the frequency spectrum.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123672568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Papaleo, R. Firrincieli, G. Corazza, A. Vanelli-Coralli
{"title":"Packet Coding Performance with Correlated Fading and Shadowing","authors":"M. Papaleo, R. Firrincieli, G. Corazza, A. Vanelli-Coralli","doi":"10.1109/GLOCOM.2009.5425780","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425780","url":null,"abstract":"Providing low-latency high-quality data services to mobile terminals has become a mandatory requirement for all mobile broadband standards. Therefore, effective countermeasures against mobile channel impairments, like small- and large-scale fading, are of the utmost importance whenever traditional physical layer channel codes do not provide sufficient resilience or request too much hardware resources. Among the possible countermeasures, the paper investigates the application of packet layer coding, which basically consists in applying forward error control techniques at upper layer (UL-FEC). In the paper the UL-FEC decoder performance analytical model already developed by authors is generalized and extended to include nonperiodic shadowing and small-scale fading. Analytical results are then validated through numerical simulation considering a real application scenario.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123752726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew","authors":"Christian McArthur, Mina Guirguis","doi":"10.1109/GLOCOM.2009.5425977","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425977","url":null,"abstract":"In prefix hijacking, an Autonomous System (AS) advertises routes for prefixes that are owned by another AS, and ends up hijacking traffic that is intended to the owner. While misconfigurations and/or misunderstandings of policies are the likely reasons behind the majority of those incidents, malicious incidents have also been reported. Recent works have focused on malicious scenarios that aim to maximize the amount of hijacked traffic from all ASes, without considering scenarios where the attacker is aiming to avoid detection. In this paper, we expose a new class of prefix hijacking that is stealthy in nature. The idea is to craft path(s) - of tunable lengths - that deceive only a small subset of ASes. By finely tuning the degree to which ASes are effected, the attacker can handle the hijacked traffic while the victimized AS would not observe a major reduction in its incoming traffic that would raise an alarm. We give upper bounds on the impact of those attacks via simulations on real BGP Internet announcements obtained from Route-Views. We discuss shortcomings in current proposed defense mechanisms against attackers which can falsify traceroute replies. We also present a defense mechanism against stealthy prefix hijacking attacks.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123757558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Beamforming in Multiuser Multi-Relay Networks with Guaranteed QoS","authors":"D. Nguyen, Ha H. Nguyen, Tung T. Pham","doi":"10.1109/GLOCOM.2009.5425247","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425247","url":null,"abstract":"This paper considers optimal distributed beamforming designs in a multi-relay network with multiple sources and multiple destinations. It is assumed that all source-destination pairs operate in orthogonal channels to avoid inter-user interference at the destinations. The distributed beamforming designs are carried out to minimize the sum relay power with guaranteed quality of service (QoS) in terms of signal-to-noise-ratio (SNR) at the destinations. Considered are optimization problems with and without per-relay power constraints. Although the two optimization problems can be readily transformed into convex second-order conic programs (SOCPs), the paper proposes simple and fast iterative algorithms to efficiently solve them.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125559736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Window Spectrum Sensing of Unsynchronized OFDM Signal at Very Low SNR","authors":"Cong Wang, Xianbin Wang, Hao Li, P. Ho","doi":"10.1109/GLOCOM.2009.5425957","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425957","url":null,"abstract":"Reliable spectrum sensing in low signal-to-noise ratio (SNR) condition is one of the major technical challenges in cognitive radio network. In this paper, we propose a robust spectrum sensing algorithm for unsynchronized low SNR OFDM signal by mitigating the impacts of time and frequency offsets with multiple processing time window and sliding frequency correlator, respectively. In addition, considering that the noise's statistics are unknown to the devices and varying over time, our proposed algorithm is based on a ratio threshold and hence it is not sensitive to the noise power level. Our theoretical and simulation results show that this algorithm works effectively at very low SNR, while being insensitive to time and frequency offsets, and requires no information of the noise's statistics.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114911518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Lucerna, M. Tornatore, B. Mukherjee, A. Pattavina
{"title":"Dynamic Routing of Connections with Known Duration in WDM Networks","authors":"Diego Lucerna, M. Tornatore, B. Mukherjee, A. Pattavina","doi":"10.1109/GLOCOM.2009.5425391","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425391","url":null,"abstract":"Recently, new solutions for automatized management in optical networks promise to allow customers to specify on-demand the terms of the Service Level Agreement (SLA) to be guaranteed by the service provider. In this paper we show that is possible to design a highly efficient load balancing algorithm, called RABBIT, for the dynamic provisioning of connections exploiting the knowledge, among the other Service Level Specifications (SLS), of the connections duration. The core idea of RABBIT consists in routing connections based on the transient probability of future-link congestion, that can be estimated with higher precision when the knowledge of connections durations is given. So, we introduce a time-dependent link-weight assignment that evaluates future link congestions probability based on the transient analysis of the Markovian model of the link, making it computationally feasible by means of an effective approximation technique. By means of an extensive set of simulative experiments, we compare our approach to other traditional holding-time agnostic, yet efficient, dynamic routing algorithms. We consider different performance metrics, among which the Blocking Probability (BP), in a wavelength-convertible WDM mesh network scenario. For a typical US nationwide network, RABBIT obtains savings on BP of up to 20% for practical scenarios.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115043465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}