Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems最新文献

筛选
英文 中文
Performance modeling and analysis of IEEE 802.11 wireless networks with hidden nodes 具有隐藏节点的IEEE 802.11无线网络性能建模与分析
M. Lee, G. Hwang, Sumit Roy
{"title":"Performance modeling and analysis of IEEE 802.11 wireless networks with hidden nodes","authors":"M. Lee, G. Hwang, Sumit Roy","doi":"10.1145/2507924.2507947","DOIUrl":"https://doi.org/10.1145/2507924.2507947","url":null,"abstract":"This work seeks to develop an analytical model for the per-node throughput analysis of IEEE 802.11 WLAN networks with hidden nodes by extending the Bianchi's model. With the analytic model we derive the per-node throughput of each node and quantify the impact of hidden nodes on per-node throughput. Through our analysis, we find that nodes having more hidden nodes are likely to have worse throughput performance than nodes having less hidden nodes, so resulting in unfairness in per-node throughput. We next propose a new algorithm, called the fake collision algorithm, to solve the unfairness due to hidden nodes. The proposed fake collision algorithm allows nodes with poor throughput to acquire more transmission opportunities by slightly modifying the Binary Exponential Backoff algorithm of the IEEE 802.11 Distributed Coordination Function. To this end, the fake collision algorithm uses a new control parameter called the fake collision probability which can be obtained from a computation algorithm that we develop based on our analytic model. We show that the fairness in per-node throughput can be achieved with the fake collision probability for each node through simulation.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114680015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Wake-up radio as an energy-efficient alternative to conventional wireless sensor networks MAC protocols 唤醒无线电作为传统无线传感器网络MAC协议的节能替代方案
J. Oller, I. Demirkol, J. Casademont, J. Aspas, G. U. Gamm, L. Reindl
{"title":"Wake-up radio as an energy-efficient alternative to conventional wireless sensor networks MAC protocols","authors":"J. Oller, I. Demirkol, J. Casademont, J. Aspas, G. U. Gamm, L. Reindl","doi":"10.1145/2507924.2507955","DOIUrl":"https://doi.org/10.1145/2507924.2507955","url":null,"abstract":"The use of duty-cycling in Medium Access Control (MAC) protocols effectively helps improving the energy efficiency of wireless networks. However, while the benefits of these protocols are unquestionable, most of them still suffer from overhearing and idle listening, two issues that prevent duty-cycled systems from achieving optimum energy usage, which is a crucial aspect in specific types of wireless networks such as Wireless Sensor Networks (WSN).Wake-up Radio (WuR) systems have been employed recently to overcome these issues. Under this approach, the nodes' MicroController Unit (MCU) and main radio transceiver are completely switched off and only activated when a secondary, extremely low-power receiver in the node is triggered by a particular wireless transmission. Wake-up Radio systems allow for drastic energy savings since receiver nodes are only activated on-demand, maximizing their battery lifetimes. In this paper, we have modeled and simulated a real, recent and promising WuR hardware platform based on its time and energy consumption characterization. By comparing such WuR approach to B-MAC and IEEE 802.15.4, two well-known and widely employed MAC protocols, we show it effectively out-performs the conventional WSN MAC approaches in terms of energy efficiency. To the best of authors' knowledge, this is the first study to include a comparative analysis for multi-hop networks based on a real WuR platform, which shows WuR systems represent an energy-efficient solution that also provides a good tradeoff between latency, packet delivery ratio and applicability..","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128478026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Congestion control in reliable CoAP communication 可靠CoAP通信中的拥塞控制
A. Betzler, Carles Gomez, I. Demirkol, J. Aspas
{"title":"Congestion control in reliable CoAP communication","authors":"A. Betzler, Carles Gomez, I. Demirkol, J. Aspas","doi":"10.1145/2507924.2507954","DOIUrl":"https://doi.org/10.1145/2507924.2507954","url":null,"abstract":"The development of IPv6 stacks for wireless constrained devices that have limited hardware resources has paved the way for many new areas of applications and protocols. The Constrained Application Protocol (CoAP) has been designed by the IETF to enable the manipulation of resources for constrained devices that are capable of connecting to the Internet. Due to the limited radio channel capacities and hardware resources, congestion is a common phenomenon in networks of constrained devices. CoAP implements a basic congestion control mechanism for the transmission of reliable messages. Alternative CoAP congestion control approaches are a recent topic of interest in the IETF CoRE Working Group. New Internet-Drafts discuss the limitations of the default congestion control mechanisms and propose alternative ones, yet, there have been no studies in the literature that compare the original approach to the alternative ones. In this paper, we target this crucial study and perform evaluations that show how the default and alternative congestion control mechanisms compare to each other. We use the Cooja simulation environment, which is part of the Contiki development toolset, to simulate CoAP within a complete protocol stack that uses IETF protocols for constrained networks. Through simulations of different network topologies and varying traffic loads, we demonstrate how the advanced mechanisms proposed in the drafts perform relative to the basic congestion control mechanism.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126270427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Movement assisted-topology control and geographic routing protocol for underwater sensor networks 水下传感器网络的运动辅助拓扑控制和地理路由协议
Rodolfo W. L. Coutinho, L. Vieira, A. Loureiro
{"title":"Movement assisted-topology control and geographic routing protocol for underwater sensor networks","authors":"Rodolfo W. L. Coutinho, L. Vieira, A. Loureiro","doi":"10.1145/2507924.2507956","DOIUrl":"https://doi.org/10.1145/2507924.2507956","url":null,"abstract":"Underwater sensor networks have recently been proposed as a way to observe and to explore the lakes, rivers, seas, and oceans. A challenging issue in these networks is the communication, mainly due to the impairments of the acoustic transmission. Thus, efficient mechanisms to improve the data delivery must be proposed. In this work we present a novel anycast greedy geographic forwarding protocol and two topology control mechanisms. The proposed geo-routing protocol considers the anycast network architecture in the data forwarding process. The proposed centralized topology control (CTC) and distributed topology control (DTC) mechanisms organize the network via depth adjustment of some nodes. The simulation results show that with these mechanisms, the data packet delivery ratio achieves more than 90% even in hard and difficult scenarios of very sparse or very dense networks, the end-to-end delay and energy consumption per delivered packet is reduced.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117213844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
An intelligent routing scheme effectively utilizing mass storage embedded on satellites to mitigate network congestions 一种智能路由方案,有效地利用卫星上嵌入的海量存储来缓解网络拥塞
Kazuma Kaneko, Y. Kawamoto, Hiroki Nishiyama, N. Kato, Shinichi Yamamoto, N. Yoshimura
{"title":"An intelligent routing scheme effectively utilizing mass storage embedded on satellites to mitigate network congestions","authors":"Kazuma Kaneko, Y. Kawamoto, Hiroki Nishiyama, N. Kato, Shinichi Yamamoto, N. Yoshimura","doi":"10.1145/2507924.2507951","DOIUrl":"https://doi.org/10.1145/2507924.2507951","url":null,"abstract":"Recently, since many kinds of wireless devices have been widely used and a large amount of contents is available on the Internet, a network system that provides adequate services anytime and anywhere is required. In this research, we focus on satellite networks using mass storage devices to provide the above mentioned services. In this kind of network, multiple satellites are used to cover the whole surface of the earth, and each satellite is equipped with a mass storage device. By using mass storage devices, the satellite network can manage a high buffer capacity to handle large amounts of data. However, no routing method has been developed for such kind of satellite network that can utilize the storage devices and manage the large amount of data in the network effectively. In this paper, we propose a novel routing scheme for the efficient utilization of the mass storage on satellites to mitigate network congestion. The proposed method is analyzed mathematically. The numerical results validate the effectiveness of our proposed method.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115661285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hierarchical modeling of IEEE 802.11 multi-hop wireless networks IEEE 802.11多跳无线网络的分层建模
Thiago Abreu, B. Baynat, Thomas Begin, I. G. Lassous
{"title":"Hierarchical modeling of IEEE 802.11 multi-hop wireless networks","authors":"Thiago Abreu, B. Baynat, Thomas Begin, I. G. Lassous","doi":"10.1145/2507924.2507949","DOIUrl":"https://doi.org/10.1145/2507924.2507949","url":null,"abstract":"IEEE 802.11 is implemented in many wireless networks, including multi-hop networks where communications between nodes are conveyed along a chain. We present a modeling framework to evaluate the performance of flows conveyed through such a chain. Our framework is based on a hierarchical modeling composed of two levels. The lower level is dedicated to the modeling of each node, while the upper level matches the actual topology of the chain. Our approach can handle different topologies, takes into account Bit Error Rate and can be applied to multi-hop flows with rates ranging from light to heavy workloads. We assess the ability of our model to evaluate loss rate, throughput, and end-to-end delay experienced by flows on a simple scenario, where the number of nodes is limited to three. Numerical results show that our model accurately approximates the performance of flows with a relative error typically less than 10%.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122901351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Equilibrium sensing time for distributed opportunistic access incognitive radio networks 认知无线网络中分布式机会接入的平衡感知时间
S. Bouferda, Essaid Sabir, A. Hayar, M. Rifi
{"title":"Equilibrium sensing time for distributed opportunistic access incognitive radio networks","authors":"S. Bouferda, Essaid Sabir, A. Hayar, M. Rifi","doi":"10.1145/2507924.2507944","DOIUrl":"https://doi.org/10.1145/2507924.2507944","url":null,"abstract":"In this paper, we consider a distributed opportunistic access (D-OSA), in which cognitive radio (CR) users attempt to access a channel licensed to a primary network. In this context, we formulate the problem of designing the equilibrium sensing time in a distributed manner, in order to maximize the throughput of CR users while guarantying a good protection to the primary users (PU). Next, we study the Nash equilibrium of the system, we also propose a combined learning algorithm for continuous actions that is fully distributed, and allows to the CR users to learn their equilibrium payoffs and their equilibrium sensing time. The simulation results show that the system can learn the sensing time and converge to a unique Nash equilibrium, which come to prove the theoretical study. A surprising feature is that there exists a correlation between the transmit probability and the sensing time. More precisely, lower transmit probability induces lower sensing times.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"16 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113979614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed base station activation for energy-efficient operation of cellular networks 面向蜂窝网络节能运行的分布式基站激活
A. Abbasi, Majid Ghaderi
{"title":"Distributed base station activation for energy-efficient operation of cellular networks","authors":"A. Abbasi, Majid Ghaderi","doi":"10.1145/2507924.2507961","DOIUrl":"https://doi.org/10.1145/2507924.2507961","url":null,"abstract":"Dynamic base station activation (DBA) has recently emerged as a viable solution for reducing energy consumption in cellular networks. While most of the works on this topic focused on centralized decision making algorithms, in this paper we investigate distributive solutions. These solutions are particularly desirable due to importance of self-organization and self-optimization in future cellular networks. The goal of DBA is to achieve an optimal trade-off between network operator's revenue and operational cost while guaranteeing coverage for network users. The problem is posed as a network utility maximization aiming to find the optimal activation schedule of each base station. Using Lagrangian duality, the problem is decomposed into smaller subproblems, where each subproblem is solved locally at its associated base station. Controlled message passing among base stations ensures convergence to the global optimal solution. Moreover, this general solution is further extended to capture the combinatorial nature of DBA. Finally, numerical results are provided to demonstrate the behavior of our solution in terms of utility and cost trade-off and convergence in some example network scenarios.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116264023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient new delayed ACK for TCP: old problem, new insight TCP有效的新延迟ACK:老问题,新见解
Ming Li, Andrey Lukyanenko, S. Tarkoma, Antti Ylä-Jääski
{"title":"Efficient new delayed ACK for TCP: old problem, new insight","authors":"Ming Li, Andrey Lukyanenko, S. Tarkoma, Antti Ylä-Jääski","doi":"10.1145/2507924.2507948","DOIUrl":"https://doi.org/10.1145/2507924.2507948","url":null,"abstract":"When a TCP connection experiences a timeout, the sender must wait at least RTOmin (Minimum Retransmission Timeout) before doing the retransmission, during which the channel may be completely idle, undermining the throughput and channel efficiency. In this paper, we investigate the origin of RTOmin and find that it is needed to mitigate against spurious timeouts when the Delayed ACK (DA) scheme for TCP is implemented. Motivated by this observation, we propose a deployable and TCP-compatible new Delayed ACK (NDA) to replace the legacy DA. Our solution differs with previous work is that instead of using complex algorithms or fine-grained timer to tune RTOmin, we modify the DA scheme with minor changes to allow the sender to remove the RTOmin constraint while reserving the delayed ACK function at the receiver. In order to eliminate the aggressiveness of RTO (Retransmission Timeout) after removing RTOmin, we use coding techniques to encode the timeout retransmitted packets to make the potential spurious retransmissions useful. The simulation results demonstrate that in lossy wireless networks, NDA is efficient, because it achieves much higher TCP goodput and channel efficiency compared to DA. The gain we obtain by the use of NDA comes from two-order effects. One effect comes from removing the RTOmin constraint, because small RTO timer makes TCP react quickly to timeouts, resulting in small transmission idle. The other effect comes from eliminating consecutive RTO by allowing the receiver to acknowledge each timeout retransmission, which further reduces the RTO idle.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123196794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling and analysis of link adaptation for LTE-advanced LTE-advanced链路自适应建模与分析
Parth Amin, S. Iraji, J. Nurminen
{"title":"Modelling and analysis of link adaptation for LTE-advanced","authors":"Parth Amin, S. Iraji, J. Nurminen","doi":"10.1145/2507924.2507986","DOIUrl":"https://doi.org/10.1145/2507924.2507986","url":null,"abstract":"We present the detailed system model for adaptive modulation and coding (AMC) in the physical layer, and hybrid automatic repeat request (HARQ) in the data link layer, which play key roles in link layer of future wireless technologies as for e.g. LTE-Advanced. The packet combining schemes hard combining and weighted hard combining are compared in an attempt to reduce packet error rate (PER) and increase spectral efficiency. Simulation results show that both combining schemes will always keep the required quality of service (QoS) and increase spectral efficiency significantly over the system without AMC/HARQ. Moreover, with severe interference, hard combining will improve the system spectral efficiency more than weighted hard combining.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128511921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信