首页 > 最新文献

2016 18th International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
Fault localization in NFV framework NFV框架中的故障定位
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423388
B. Lee, B. Lee
Network function virtualization is quickly gaining acceptance as the new approach to delivering communication services. The promises of greater flexibility and dramatically reduced time to introduce new services coupled with the cost advantages, are driving communications service providers(CSP) around the world to begin deploying NFV-based services. But NFV service is actually operated based on virtualization environment, it has greater impact on disability virtual resources, when the physical devices had a fault. In this paper, when physical faults occurred in the NFV Framework, or logical failure occurs on a specific logical device, we will present a structure for Fault Localization method to ensure the continuity of service in NFVI.
网络功能虚拟化作为交付通信服务的新方法正迅速获得认可。更大的灵活性和大幅缩短引入新服务的时间,再加上成本优势,正在推动全球通信服务提供商(CSP)开始部署基于nfv的服务。但NFV业务实际上是在虚拟化环境下运行的,当物理设备发生故障时,对虚拟资源的影响更大。在本文中,当NFV框架中发生物理故障时,或者在特定逻辑设备上发生逻辑故障时,我们将提出一种故障定位方法的结构,以保证NFVI中业务的连续性。
{"title":"Fault localization in NFV framework","authors":"B. Lee, B. Lee","doi":"10.1109/ICACT.2016.7423388","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423388","url":null,"abstract":"Network function virtualization is quickly gaining acceptance as the new approach to delivering communication services. The promises of greater flexibility and dramatically reduced time to introduce new services coupled with the cost advantages, are driving communications service providers(CSP) around the world to begin deploying NFV-based services. But NFV service is actually operated based on virtualization environment, it has greater impact on disability virtual resources, when the physical devices had a fault. In this paper, when physical faults occurred in the NFV Framework, or logical failure occurs on a specific logical device, we will present a structure for Fault Localization method to ensure the continuity of service in NFVI.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Spectral efficiency evaluation for non-orthogonal multiple access in Rayleigh fading 瑞利衰落条件下非正交多址频谱效率评价
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423543
P. Sedtheetorn, T. Chulajata
This paper presents original analysis on the downlink spectral efficiency of non-orthogonal multiple access (NOMA) in Rayleigh fading environment. According to our accurate evaluation technique, a closed-form expression of NOMA spectral efficiency is proposed. With the closed form, the exact average of NOMA spectral efficiency can be achieved at different system parameters. Moreover, this closed form can be used to evaluate other orthogonal multiple access (OMA) techniques such as orthogonal frequency division multiple access (OFDMA).
本文对非正交多址(NOMA)在瑞利衰落环境下的下行频谱效率进行了初步分析。根据我们的精确评价技术,提出了NOMA光谱效率的封闭表达式。采用封闭形式,可以得到不同系统参数下NOMA光谱效率的精确平均值。此外,这种封闭形式可用于评估其他正交多址(OMA)技术,如正交频分多址(OFDMA)。
{"title":"Spectral efficiency evaluation for non-orthogonal multiple access in Rayleigh fading","authors":"P. Sedtheetorn, T. Chulajata","doi":"10.1109/ICACT.2016.7423543","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423543","url":null,"abstract":"This paper presents original analysis on the downlink spectral efficiency of non-orthogonal multiple access (NOMA) in Rayleigh fading environment. According to our accurate evaluation technique, a closed-form expression of NOMA spectral efficiency is proposed. With the closed form, the exact average of NOMA spectral efficiency can be achieved at different system parameters. Moreover, this closed form can be used to evaluate other orthogonal multiple access (OMA) techniques such as orthogonal frequency division multiple access (OFDMA).","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122316024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An algorithm for home energy management using environmental conditions 一种基于环境条件的家庭能源管理算法
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423505
Eun Soon Ki, Jeong sik Kim, Seung Min Ryu, S. Choi
Resent study of load management minimizes for electricity bill and peak load, but does not consider convenience about human experience. Just focused on saving energy management of the electricity price can't consider residential customers convenience. In this paper, we propose optimal load control strategy for human convenience as well as to minimize the electricity price. The strategy is to use some of the indoor environmental parameters, reflecting the various forms of patterns of energy management system, which controls the load within a range that can maintain human convenience.
目前的负荷管理研究以电费和高峰负荷为目标,而没有考虑到人类体验的便利性。只注重节约能源的电价管理,不能考虑居民用户的便利性。本文提出了最优负荷控制策略,以方便人类使用,并使电价最小。该策略是利用一些室内环境参数,反映各种形式模式的能源管理系统,将负荷控制在一个可以保持人类便利性的范围内。
{"title":"An algorithm for home energy management using environmental conditions","authors":"Eun Soon Ki, Jeong sik Kim, Seung Min Ryu, S. Choi","doi":"10.1109/ICACT.2016.7423505","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423505","url":null,"abstract":"Resent study of load management minimizes for electricity bill and peak load, but does not consider convenience about human experience. Just focused on saving energy management of the electricity price can't consider residential customers convenience. In this paper, we propose optimal load control strategy for human convenience as well as to minimize the electricity price. The strategy is to use some of the indoor environmental parameters, reflecting the various forms of patterns of energy management system, which controls the load within a range that can maintain human convenience.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Radio access model for universal service 通用服务的无线电接入模型
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423459
Idriss Saleh Bachar, A. Kora, R. M. Faye, C. Aupetit-Berthelemot
This paper proposes a mathematical model as a decision tool for the choice of radio access solutions adapted to a geographical region through universal access. It integrates the formalism related to engineering radio network access in general as well as financial constraints imposed by the access and universal service funds. Services considered are voice and data services. This approach has helped to derive a general expression set for radio technologies. The coverage and capacity deployment strategy has also been combined to clarify the optimal implementation based on financial constraints. A case study on the Ouaddai region in Chad accompanied by simulations curves for wireless technologies as Wi-Fi, WiMAX and CDMA for example has shown the efficiency of such approach.
本文提出了一个数学模型,作为通过普遍接入选择适合地理区域的无线接入解决方案的决策工具。它综合了与一般工程无线网络接入有关的形式主义以及接入和普遍服务基金所施加的财务限制。考虑的服务包括语音和数据服务。这种方法有助于推导出无线电技术的通用表达式集。还将覆盖和能力部署战略结合起来,以明确基于财政限制的最佳实施。通过对乍得Ouaddai地区的案例研究,以及Wi-Fi、WiMAX和CDMA等无线技术的模拟曲线,证明了这种方法的有效性。
{"title":"Radio access model for universal service","authors":"Idriss Saleh Bachar, A. Kora, R. M. Faye, C. Aupetit-Berthelemot","doi":"10.1109/ICACT.2016.7423459","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423459","url":null,"abstract":"This paper proposes a mathematical model as a decision tool for the choice of radio access solutions adapted to a geographical region through universal access. It integrates the formalism related to engineering radio network access in general as well as financial constraints imposed by the access and universal service funds. Services considered are voice and data services. This approach has helped to derive a general expression set for radio technologies. The coverage and capacity deployment strategy has also been combined to clarify the optimal implementation based on financial constraints. A case study on the Ouaddai region in Chad accompanied by simulations curves for wireless technologies as Wi-Fi, WiMAX and CDMA for example has shown the efficiency of such approach.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124244032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A smart home control system based on context and human speech 基于上下文和人类语音的智能家居控制系统
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423314
Yoonseon Han, J. Hyun, Taeyeol Jeong, Jae-Hyoung Yoo, J. W. Hong
Traditionally, home appliances are controlled by switches or remote controllers manually. In order to control the appliances, a user have to be near the switches or carry remote controllers all the time. To alleviate this inconvenience, this paper proposes a control system for home appliances using human speech and context information. We present an architecture of the control system and a process to control home appliances composed of three steps: speech detection, speech recognition, and command execution. To validate our system, we show two useful case studies by testing it at POSTECH smart home and UPnP-OSGi simulator.
传统上,家用电器是由开关或遥控器手动控制的。为了控制这些电器,用户必须一直靠近开关或随身携带遥控器。为了减轻这种不便,本文提出了一种利用人的语音和上下文信息的家用电器控制系统。我们提出了一种控制系统的架构和控制家用电器的过程,包括三个步骤:语音检测、语音识别和命令执行。为了验证我们的系统,我们通过在POSTECH智能家居和UPnP-OSGi模拟器上进行测试,展示了两个有用的案例研究。
{"title":"A smart home control system based on context and human speech","authors":"Yoonseon Han, J. Hyun, Taeyeol Jeong, Jae-Hyoung Yoo, J. W. Hong","doi":"10.1109/ICACT.2016.7423314","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423314","url":null,"abstract":"Traditionally, home appliances are controlled by switches or remote controllers manually. In order to control the appliances, a user have to be near the switches or carry remote controllers all the time. To alleviate this inconvenience, this paper proposes a control system for home appliances using human speech and context information. We present an architecture of the control system and a process to control home appliances composed of three steps: speech detection, speech recognition, and command execution. To validate our system, we show two useful case studies by testing it at POSTECH smart home and UPnP-OSGi simulator.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122925727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Method for providing reliable peer activity report for managed P2P communications 为管理的P2P通信提供可靠的对等活动报告的方法
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423435
Wook Hyun, Juyoung Park
In P2P-based contents distribution, an overlay network is constructed by peers that reside in user domain not service provider domain, and each peer shares data with each other. Due to the unmanageability characteristics of P2P networking, it tends to lead to inefficiency due to ignorance of underlying network in spite of its advantages and unfairness caused by absence of incentives to contributing peers. In order to solve several issues regarding P2P networking and making use of its advantages compared to existing server-client model, ITU-T Q.9/11 is developing a series of MP2P (Managed P2P communications) standards. In order to figure out the status of overlay network and gathering activities information of peers, it aggregates the information from peers that may not be trusted due to the possibility of forgery. It is important to assure the integrity and non-forgery of reports from peers. In this paper, we propose a method for gathering reliable peer activity report by use of digital signatures.
在基于p2p的内容分发中,由驻留在用户域而不是服务提供商域的对等体构成覆盖网络,并相互共享数据。由于P2P网络的不可管理性,它虽然具有优势,但容易由于对底层网络的无知而导致效率低下,也容易由于缺乏对贡献节点的激励而导致不公平。为了解决与P2P网络有关的几个问题,并利用其与现有服务器-客户端模型相比的优势,ITU-T Q.9/11正在制定一系列MP2P (Managed P2P通信)标准。为了了解覆盖网络的状态和收集对等体的活动信息,该算法将来自可能被伪造而不可信的对等体的信息进行聚合。确保同行报告的完整性和非伪造性是非常重要的。本文提出了一种利用数字签名收集可靠的对等体活动报告的方法。
{"title":"Method for providing reliable peer activity report for managed P2P communications","authors":"Wook Hyun, Juyoung Park","doi":"10.1109/ICACT.2016.7423435","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423435","url":null,"abstract":"In P2P-based contents distribution, an overlay network is constructed by peers that reside in user domain not service provider domain, and each peer shares data with each other. Due to the unmanageability characteristics of P2P networking, it tends to lead to inefficiency due to ignorance of underlying network in spite of its advantages and unfairness caused by absence of incentives to contributing peers. In order to solve several issues regarding P2P networking and making use of its advantages compared to existing server-client model, ITU-T Q.9/11 is developing a series of MP2P (Managed P2P communications) standards. In order to figure out the status of overlay network and gathering activities information of peers, it aggregates the information from peers that may not be trusted due to the possibility of forgery. It is important to assure the integrity and non-forgery of reports from peers. In this paper, we propose a method for gathering reliable peer activity report by use of digital signatures.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128341243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model for network traffic anomaly detection 网络流量异常检测模型
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423586
Nguyễn Hà Dương, Hoang Dang Hai
Network traffic anomaly detection can find unusual events cause by hacker activity. Most research in this area focus on supervised and unsupervised model. In this work, we proposed a semi-supervised model based on combination of Mahalanobis distance and principal component analysis for network traffic anomaly detection. We also experiment clustering technique with suitable features to remove noise in training data along with some enhanced detection technique. With the approach of combining anomaly detection and signature-based detection system, we believe the quality of normal dataset will greatly improve.
网络流量异常检测可以发现黑客活动引起的异常事件。该领域的研究主要集中在有监督模型和无监督模型上。本文提出了一种基于马氏距离和主成分分析相结合的网络流量异常检测半监督模型。我们还尝试了使用合适特征的聚类技术以及一些增强的检测技术来去除训练数据中的噪声。通过将异常检测与基于签名的检测系统相结合的方法,我们相信正常数据集的质量将得到极大的提高。
{"title":"A model for network traffic anomaly detection","authors":"Nguyễn Hà Dương, Hoang Dang Hai","doi":"10.1109/ICACT.2016.7423586","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423586","url":null,"abstract":"Network traffic anomaly detection can find unusual events cause by hacker activity. Most research in this area focus on supervised and unsupervised model. In this work, we proposed a semi-supervised model based on combination of Mahalanobis distance and principal component analysis for network traffic anomaly detection. We also experiment clustering technique with suitable features to remove noise in training data along with some enhanced detection technique. With the approach of combining anomaly detection and signature-based detection system, we believe the quality of normal dataset will greatly improve.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126329126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ASC: Improving spark driver performance with automatic spark checkpoint ASC:提高火花驱动性能与自动火花检查点
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423490
Weirong Zhu, Hao-peng Chen, Fei Hu
Many great big data processing platforms, for example Hadoop Map Reduce, are keeping improving large-scale data processing performance which make big data processing focus of IT industry. Among them Spark has become increasingly popular big data processing framework since it was presented in 2010 first time. Spark use RDD for its data abstraction, targeting at the multiple iteration large-scale data processing with reuse of data, the in-memory feature of RDD make Spark faster than many other non-in-memory big data processing platform. However in-memory feature also bring the volatile problem, a failure or a missing RDD will cause Spark to recompute all the missing RDD on the lineage. And a long lineage will also increasing the time cost and memory usage of Driver analysing the lineage. A checkpoint will cut off the lineage and save the data which is required in the coming computing, the frequency to make a checkpoint and the RDDs which are selected to save will significantly influence the performance. In this paper, we are presenting an automatic checkpoint algorithm on Spark to help solve the long lineage problem with less influence on the performance. The automatic checkpoint will select the necessary RDD to save and bring an acceptable overhead and improve the time performance for multiple iteration.
许多伟大的大数据处理平台,如Hadoop Map Reduce,都在不断提高大规模数据处理性能,使得大数据处理成为IT行业的焦点。其中Spark自2010年首次提出以来,已经成为越来越受欢迎的大数据处理框架。Spark使用RDD进行数据抽象,针对数据重用的多次迭代大规模数据处理,RDD的内存特性使Spark比许多其他非内存大数据处理平台更快。然而,内存特性也带来了易失性问题,一个故障或丢失的RDD将导致Spark重新计算沿袭上所有丢失的RDD。长谱系也会增加驱动程序分析谱系的时间成本和内存使用。检查点将切断沿袭并保存后续计算所需的数据,检查点的频率和选择保存的rdd将对性能产生重大影响。在本文中,我们提出了一种基于Spark的自动检查点算法,以帮助解决对性能影响较小的长沿袭问题。自动检查点将选择必要的RDD来保存,并带来可接受的开销,并改善多次迭代的时间性能。
{"title":"ASC: Improving spark driver performance with automatic spark checkpoint","authors":"Weirong Zhu, Hao-peng Chen, Fei Hu","doi":"10.1109/ICACT.2016.7423490","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423490","url":null,"abstract":"Many great big data processing platforms, for example Hadoop Map Reduce, are keeping improving large-scale data processing performance which make big data processing focus of IT industry. Among them Spark has become increasingly popular big data processing framework since it was presented in 2010 first time. Spark use RDD for its data abstraction, targeting at the multiple iteration large-scale data processing with reuse of data, the in-memory feature of RDD make Spark faster than many other non-in-memory big data processing platform. However in-memory feature also bring the volatile problem, a failure or a missing RDD will cause Spark to recompute all the missing RDD on the lineage. And a long lineage will also increasing the time cost and memory usage of Driver analysing the lineage. A checkpoint will cut off the lineage and save the data which is required in the coming computing, the frequency to make a checkpoint and the RDDs which are selected to save will significantly influence the performance. In this paper, we are presenting an automatic checkpoint algorithm on Spark to help solve the long lineage problem with less influence on the performance. The automatic checkpoint will select the necessary RDD to save and bring an acceptable overhead and improve the time performance for multiple iteration.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124534624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A performance analysis of MAC and PHY layers in IEEE 802.11ac wireless network IEEE 802.11ac无线网络中MAC层和物理层的性能分析
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423258
G. Khan, R. González, Eun-Chan Park
This paper gives an insight into IEEE 802.11ac by analysing its performance in terms of system throughput taking into consideration the key features of MAC and PHY layers. Throughput at MAC layer is calculated from transmission probability, contention window and transmission stage. Likewise, the new critical attributes of 802.11ac PHY (i.e. modulation and coding schemes, spatial streams, and channel bandwidth) are used to determine the throughput. To this end, a theoretical model is developed followed by simulation analysis. The results compare theoretical and simulation findings for different set of parameters. Furthermore, important trends and tradeoffs are identified between system throughput and (MAC + PHY) features as a function of number of contending stations and payload size.
本文通过分析其在系统吞吐量方面的性能,并考虑到MAC层和物理层的关键特征,从而深入了解IEEE 802.11ac。从传输概率、竞争窗口和传输阶段三个方面计算MAC层的吞吐量。同样,802.11ac PHY的新关键属性(即调制和编码方案、空间流和信道带宽)用于确定吞吐量。为此,建立了理论模型,并进行了仿真分析。结果比较了不同参数下的理论和仿真结果。此外,还确定了系统吞吐量和(MAC + PHY)特征之间的重要趋势和权衡,作为竞争站点数量和有效负载大小的函数。
{"title":"A performance analysis of MAC and PHY layers in IEEE 802.11ac wireless network","authors":"G. Khan, R. González, Eun-Chan Park","doi":"10.1109/ICACT.2016.7423258","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423258","url":null,"abstract":"This paper gives an insight into IEEE 802.11ac by analysing its performance in terms of system throughput taking into consideration the key features of MAC and PHY layers. Throughput at MAC layer is calculated from transmission probability, contention window and transmission stage. Likewise, the new critical attributes of 802.11ac PHY (i.e. modulation and coding schemes, spatial streams, and channel bandwidth) are used to determine the throughput. To this end, a theoretical model is developed followed by simulation analysis. The results compare theoretical and simulation findings for different set of parameters. Furthermore, important trends and tradeoffs are identified between system throughput and (MAC + PHY) features as a function of number of contending stations and payload size.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133438186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robust and fast device discovery in OFDMA-based cellular networks for disaster environment 灾害环境下基于ofdma的蜂窝网络鲁棒快速设备发现
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423447
Seung Beom Seo, Jae Young Kim, W. Jeon
Device-to-device (D2D) communication is a salient function of public safety networks for enabling communications, even in a disaster environment where the communication infrastructures are fully or partially destroyed. In order that devices directly communicate, they must first find and identify each other. Especially, in a disaster environment where wireless channel conditions may be very poor, discovery should be robust and fast for quick resume of the blocked communications again. In this paper, considering frequency selective fading which may lead to missing devices even though they exist, we propose a device discovery scheme using a simple physical layer waveform called signature. Typically, in a signature-based discovery under OFDMA-based system, a device advertises its presence by selecting a discovery channel and energizing subcarriers in the channel for a while (one subcarrier at a time). In the proposed scheme, we design discovery channels having well dispersed subcarriers to tolerate the frequency selectivity. By simulation, it is shown that not only successful discovery ratio of the proposed scheme is improved, but also our scheme is more frequency selective fading tolerant in comparison with other approaches.
设备对设备(D2D)通信是公共安全网络的一项重要功能,即使在通信基础设施全部或部分被破坏的灾难环境中也能实现通信。为了使设备直接通信,它们必须首先找到并识别彼此。特别是在无线信道条件很差的灾难环境中,发现应该是鲁棒的和快速的,以便再次快速恢复被阻塞的通信。在本文中,考虑到频率选择性衰落可能导致丢失设备,即使它们存在,我们提出了一个设备发现方案,使用一个简单的物理层波形称为签名。通常,在基于ofdma系统的基于签名的发现中,设备通过选择一个发现信道并在一段时间内激活该信道中的子载波(一次激活一个子载波)来宣布其存在。在提出的方案中,我们设计了具有分散良好的子载波的发现信道来容忍频率选择性。仿真结果表明,该方案不仅提高了发现成功率,而且与其他方法相比,具有更强的频率选择性衰落容忍度。
{"title":"Robust and fast device discovery in OFDMA-based cellular networks for disaster environment","authors":"Seung Beom Seo, Jae Young Kim, W. Jeon","doi":"10.1109/ICACT.2016.7423447","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423447","url":null,"abstract":"Device-to-device (D2D) communication is a salient function of public safety networks for enabling communications, even in a disaster environment where the communication infrastructures are fully or partially destroyed. In order that devices directly communicate, they must first find and identify each other. Especially, in a disaster environment where wireless channel conditions may be very poor, discovery should be robust and fast for quick resume of the blocked communications again. In this paper, considering frequency selective fading which may lead to missing devices even though they exist, we propose a device discovery scheme using a simple physical layer waveform called signature. Typically, in a signature-based discovery under OFDMA-based system, a device advertises its presence by selecting a discovery channel and energizing subcarriers in the channel for a while (one subcarrier at a time). In the proposed scheme, we design discovery channels having well dispersed subcarriers to tolerate the frequency selectivity. By simulation, it is shown that not only successful discovery ratio of the proposed scheme is improved, but also our scheme is more frequency selective fading tolerant in comparison with other approaches.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 18th International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1