{"title":"Continuous Contention-Assisted Transmission MAC Protocol for Wireless Ad-Hoc Network","authors":"Dinh Chi Hieu, S. Shimamoto","doi":"10.1109/GLOCOM.2009.5426021","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5426021","url":null,"abstract":"In this paper we introduce a new MAC protocol called Continuous Contention-Assisted Transmission (CAT) for wireless Ad-hoc network. This proposed protocol is based on Carrier sense multiple access with collision avoidance (CSMA/CA) but we have modified the ACK packet and re-designed mobile stations behavior so that they could continuously transmit data without contention. Our proposed algorithm tries to keep collision in the network as low as possible by allowing wireless stations to form a sequence of transmission among stations that have data to send. Analytical results are compared with simulations. The analysis model is quite accurate in predicting network throughput.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114600799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Repeater Placement for Assisting Long-Range LOS MIMO Links","authors":"B. Walkenhorst, M. A. Ingram","doi":"10.1109/GLOCOM.2009.5425397","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425397","url":null,"abstract":"A wireless MIMO link is considered in a LOS configuration with multiple SISO wireless repeaters assisting. A theoretical analysis is presented in which repeater positions are considered and sufficient conditions proposed and evaluated for maximizing the MIMO multiplexing gain. The assisting repeaters would be useful when space constraints, for example, on a building top, would prohibit the wide element spacings needed by a MIMO terminal to reach full capacity over a long range LOS link. Sufficient conditions include, among other things, mutual orthogonality of steering vectors from one MIMO terminal pointing toward the opposite terminal and toward each of the repeaters. Once n - 1 such repeaters have been properly placed, where n represents the smaller dimension of the channel matrix, the matrix becomes full rank and the multiplexing gain is maximized.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122188241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-Based Opportunistic Channel Access in Dynamic Spectrum Access Networks","authors":"Manuj Sharma, A. Sahoo, K. Nayak","doi":"10.1109/GLOCOM.2009.5425907","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425907","url":null,"abstract":"We propose a model-based channel access mechanism for cognitive radio-enabled secondary network, which opportunistically uses the channel of an unslotted primary network when the channel is sensed idle. We have considered IEEE 802.11 WLAN as a de facto primary network operating in ISM band. Our study focuses on a single WLAN channel that is used by WLAN clients and a WLAN server for a mix of Email, FTP, and HTTP-based web browsing applications. We model the occupancy of the channel by primary WLAN nodes as an alternating renewal process. The secondary node uses the model to estimate residual idle time duration after the channel is sensed idle, and opportunistically transmits frames in that duration. Our simulation results show that the performance of secondary network is sensitive to the channel sensing duration and that high secondary throughput can be achieved without affecting the primary network significantly by choosing appropriate value of channel sensing duration.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129497438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fast Reroute Scheme for IP Multicast","authors":"A. Tam, Kang Xi, H. Jonathan Chao","doi":"10.1109/GLOCOM.2009.5426171","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5426171","url":null,"abstract":"We propose a fast reroute scheme for the single link failure protection of IP multicast network. A multicast network connects nodes as a spanning tree, which is vulnerable to link failures. Our scheme uses ring topologies to ensure a backup path always exists to any single link failure and only a few nodes in the neighborhood of the failed link have to react to the failure. Compare to other solutions, we have four advantages: (1) The multicast tree can be arbitrary. (2) There is only a minimal disruption and there would be no packet loss. (3) Failure protection is available to a wider set of network topologies. (4) Only a small number of multicast nodes are involved and the number of spare links used are also small.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129600554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shengqian Han, Chenyang Yang, M. Bengtsson, A. Pérez-Neira
{"title":"Channel Norm-Based User Scheduler in Coordinated Multi-Point Systems","authors":"Shengqian Han, Chenyang Yang, M. Bengtsson, A. Pérez-Neira","doi":"10.1109/GLOCOM.2009.5425711","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425711","url":null,"abstract":"In this paper, we address the problem of user scheduling in downlink coordinated multi-point transmission (CoMP) systems, where multiple users are selected and then served with zero forcing beamformer simultaneously by several cooperative base stations (BSs). To reduce the enormous overhead led by obtaining full channel state information at the transmitter, a low-feedback user scheduling method called channel norm-based user scheduler (NUS), is proposed by exploiting the asymmetric channel feature of CoMP systems. Simulation results show that the channel norm provides sufficient information for user scheduling when each BS has one antenna, where the performance gap between the NUS and the greedy user selection (GUS) is negligible with respect to both the cell average throughput and the cell edge throughput. When each BS has multiple antennas, NUS is inferior to GUS, but still significantly outperforms the uncoordinated systems.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128389907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intercarrier Interference Immune Single Carrier OFDM via Magnitude Shift Keying Modulation","authors":"Xue Li, Ruolin Zhou, V. Chakravarthy, Zhiqiang Wu","doi":"10.1109/GLOCOM.2009.5425853","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425853","url":null,"abstract":"SC-OFDM (single carrier orthogonal frequency division multiplexing) has demonstrated excellent performance in multipath fading channels with very low peak to average power ratio (PAPR). Similar to other multi-carrier transmission technologies such as MC-CDMA and OFDM, SC-OFDM also suffers significant performance degradation to inter-carrier interference (ICI) when there is a frequency offset between the transmitter and receiver or in a high mobility environment. In this paper, we analyze the effect of ICI on SC-OFDM system and propose a novel modulation scheme called Magnitude Shift Keying (MSK) for SC-OFDM system. The MSK modulation provides SC-OFDM system immunity to ICI and significantly outperforms SC-OFDM system and OFDM system with Phase Shift Keying (PSK) modulations in severe ICI environment. Simulation results over AWGN channel and multi-path fading channels with different ICI confirm the effectiveness of the proposed system.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating Self-Interference Among IEEE 802.22 Networks: A Game Theoretic Perspective","authors":"Swastik Brahma, M. Chatterjee","doi":"10.1109/GLOCOM.2009.5425282","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425282","url":null,"abstract":"In this paper, we use game theory to mitigate self-interference among cognitive radio based IEEE 802.22 networks such that these networks can efficiently co-exist. When a network experiences interference, it can adopt either one of two choices-switch to a new band hoping to find a non-interfering one, or stay with its current band hoping that the interfering network(s) will move away to a new band. We model the spectrum band switching process as an infinite horizon repeated game where the aim of each network (player) is to find a channel void of interference from it's neighboring networks incurring minimal cost. We investigate both pure and mixed strategy solution space of the game and show that pure strategy solution of the game is infeasible. Thus a mixed strategy is proposed which achieves subgame-perfect Nash Equilibrium. Simulation results reveal that using the proposed strategies, each network can find a clear channel quickly and at the same time incur a low cost.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128530145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Modeling for Heterogeneous Wireless Networks with Multiservice Overflow Traffic","authors":"Qian Huang, K. Ko, V. Iversen","doi":"10.1109/GLOCOM.2009.5425762","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425762","url":null,"abstract":"Performance modeling is important for the purpose of developing efficient dimensioning tools for large complicated networks. But it is difficult to achieve in heterogeneous wireless networks, where different networks have different statistical characteristics in service and traffic models. Multiservice loss analysis based on multi-dimensional Markov chain becomes intractable in these networks due to intensive computations required. This paper focuses on performance modeling for heterogeneous wireless networks based on a hierarchical overlay infrastructure. A method based on decomposition of the correlated traffic is used to achieve an approximate performance modeling for multiservice in hierarchical heterogeneous wireless networks with overflow traffic. The accuracy of the approximate performance obtained by our proposed modeling is verified by simulations.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128792177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MPC: Mitigating Stealthy Power Control Attacks in Wireless Ad Hoc Networks","authors":"Issa M. Khalil","doi":"10.1109/GLOCOM.2009.5425559","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425559","url":null,"abstract":"Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to stealthy packet dropping through transmission power control. Stealthy packet dropping disrupts the packet from reaching the destination by malicious behavior at an intermediate node. However, the malicious node gives the impression to its neighbors that it performed the legitimate forwarding action. Moreover, a legitimate node comes under suspicion. We provide a protocol called MPC to remedy the attack. MPC expands the set of possible monitors of a node by redefining the monitor role and functionality. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy power control attacks while MPC successfully mitigates them.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128292730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Modeling of Cognitive Wireless Sensor Networks Applied to Environmental Protection","authors":"Elyes Bdira, M. Ibnkahla","doi":"10.1109/GLOCOM.2009.5425812","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425812","url":null,"abstract":"This paper presents a methodology, a theoretical framework, and some novel ideas on performance modeling and evaluation of application-specific cognitive wireless sensor networks applied to environmental protection. Cross-layer optimizations integrating the use of adaptive sleep, adaptive modulation and energy-aware higher layer processing and protocols are assumed. Routing and application layer processing are assumed to be dependent on lower- layer protocols, requirements, and constraints. Applications relevant to this study are forest monitoring, where the probability of network failure is the main parameter to be minimized, and endangered-species monitoring, where the probability of node failure is reduced by increasing the expected node life. Results are shown comparing expected node life of a cross-layered design to that of a traditional adaptive modulation system.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128355836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}