首页 > 最新文献

2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

英文 中文
Measurement-based study on the influence of localization errors on estimated shadow correlations 基于测量的定位误差对估计阴影相关影响的研究
Nikos Perpinias, Alexandros Palaios, Janne Riihijärvi, P. Mähönen
In recent years, novel spectrum access schemes have increased the need to further explore and exploit radio propagation dynamics. One proposed approach is to use spectrum sensing nodes for propagation environment estimation, and particularly to allow shadowing field extraction. In general there is a tendency to develop techniques that allow the automated and localized estimation of the spatial correlation structure of the shadowing field. Key issue when using such data is to take into account inherent localization errors and the impact that it has on these estimates. In this paper we use real measurement data acquired with extremely high localization accuracy to demonstrate and study the impact of localization errors. We present results for the propagation estimation, the extracted shadow field, and estimated shadow correlations. In particular, we show that spatial correlation metrics such as semivariograms are robust against localization errors higher than arising from the typical embedded GPS chipsets, up to approximately 20 m. Moreover, we have considered various probability distributions of localization errors, exploring their impact into our analysis. The reported results are highly relevant to development of measurement-based coverage estimation techniques and planning of drive tests or understanding limits of crowd-sourced data from user devices.
近年来,新的频谱接入方案增加了进一步探索和利用无线电传播动力学的需求。一种被提出的方法是使用频谱感知节点进行传播环境估计,特别是允许阴影场提取。一般来说,有一种趋势是发展技术,允许自动和局部估计的空间相关结构的阴影场。使用这些数据时的关键问题是要考虑到固有的定位错误及其对这些估计的影响。本文采用具有极高定位精度的实测数据,对定位误差的影响进行了论证和研究。我们给出了传播估计、提取阴影场和估计阴影相关性的结果。特别是,我们表明,空间相关指标(如半变方差)对定位误差的鲁棒性高于典型嵌入式GPS芯片组产生的定位误差,误差可达约20米。此外,我们还考虑了定位误差的各种概率分布,探讨了它们对我们分析的影响。报告的结果与开发基于测量的覆盖估计技术和规划驾驶测试或了解来自用户设备的众包数据的限制高度相关。
{"title":"Measurement-based study on the influence of localization errors on estimated shadow correlations","authors":"Nikos Perpinias, Alexandros Palaios, Janne Riihijärvi, P. Mähönen","doi":"10.1109/WoWMoM.2016.7523587","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523587","url":null,"abstract":"In recent years, novel spectrum access schemes have increased the need to further explore and exploit radio propagation dynamics. One proposed approach is to use spectrum sensing nodes for propagation environment estimation, and particularly to allow shadowing field extraction. In general there is a tendency to develop techniques that allow the automated and localized estimation of the spatial correlation structure of the shadowing field. Key issue when using such data is to take into account inherent localization errors and the impact that it has on these estimates. In this paper we use real measurement data acquired with extremely high localization accuracy to demonstrate and study the impact of localization errors. We present results for the propagation estimation, the extracted shadow field, and estimated shadow correlations. In particular, we show that spatial correlation metrics such as semivariograms are robust against localization errors higher than arising from the typical embedded GPS chipsets, up to approximately 20 m. Moreover, we have considered various probability distributions of localization errors, exploring their impact into our analysis. The reported results are highly relevant to development of measurement-based coverage estimation techniques and planning of drive tests or understanding limits of crowd-sourced data from user devices.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114668212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indoor localization of vehicles using Deep Learning 使用深度学习的车辆室内定位
A. Kumar, Bernd Schäufele, Daniel Becker, Oliver Sawade, I. Radusch
Modern vehicles are equipped with numerous driver assistance and telematics functions, such as Turn-by-Turn navigation. Most of these systems rely on precise positioning of the vehicle. While Global Navigation Satellite Systems (GNSS) are available outdoors, these systems fail in indoor environments such as a car-park or a tunnel. Alternatively, the vehicle can localize itself with landmark-based positioning and internal car sensors, yet this is not only costly but also requires precise knowledge of the enclosed area. Instead, our approach is to use infrastructure-based positioning. Here, we utilize off-the shelf cameras mounted in the car-park and Vehicle-to-Infrastructure Communication to allow all vehicles to obtain an indoor position given from an infrastructure-based localization service. Our approach uses a Convolutional Neural Network (CNN) with Deep Learning to identify and localize vehicles in a car-park. We thus enable position-based Driver Assistance Systems (DAS) and telematics in an underground facility. We compare the novel Deep Learning classifier to a conventional classifier using Haar-like features.
现代车辆配备了许多驾驶员辅助和远程信息处理功能,如转弯导航。这些系统大多依赖于车辆的精确定位。虽然全球导航卫星系统(GNSS)在室外可用,但这些系统在室内环境(如停车场或隧道)中会失效。或者,车辆可以通过基于地标的定位和内部汽车传感器来定位自己,但这不仅成本高昂,而且需要对封闭区域有精确的了解。相反,我们的方法是使用基于基础设施的定位。在这里,我们利用安装在停车场的现成摄像头和车辆与基础设施的通信,让所有车辆都能从基于基础设施的定位服务中获得室内位置。我们的方法使用卷积神经网络(CNN)和深度学习来识别和定位停车场中的车辆。因此,我们在地下设施中启用了基于位置的驾驶辅助系统(DAS)和远程信息处理。我们将新的深度学习分类器与使用haar样特征的传统分类器进行比较。
{"title":"Indoor localization of vehicles using Deep Learning","authors":"A. Kumar, Bernd Schäufele, Daniel Becker, Oliver Sawade, I. Radusch","doi":"10.1109/WoWMoM.2016.7523569","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523569","url":null,"abstract":"Modern vehicles are equipped with numerous driver assistance and telematics functions, such as Turn-by-Turn navigation. Most of these systems rely on precise positioning of the vehicle. While Global Navigation Satellite Systems (GNSS) are available outdoors, these systems fail in indoor environments such as a car-park or a tunnel. Alternatively, the vehicle can localize itself with landmark-based positioning and internal car sensors, yet this is not only costly but also requires precise knowledge of the enclosed area. Instead, our approach is to use infrastructure-based positioning. Here, we utilize off-the shelf cameras mounted in the car-park and Vehicle-to-Infrastructure Communication to allow all vehicles to obtain an indoor position given from an infrastructure-based localization service. Our approach uses a Convolutional Neural Network (CNN) with Deep Learning to identify and localize vehicles in a car-park. We thus enable position-based Driver Assistance Systems (DAS) and telematics in an underground facility. We compare the novel Deep Learning classifier to a conventional classifier using Haar-like features.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127247478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
SWAP: Protecting pull-based P2P video streaming systems from inference attacks SWAP:保护基于拉的P2P视频流系统免受推理攻击
Giang T. Nguyen, Stefanie Roos, Benjamin Schiller, T. Strufe
In pull-based Peer-to-Peer video streaming systems, peers exchange buffer maps to reveal the availability of video chunks in their buffer. When collecting these buffer maps, a malicious party can infer the system's overlay structure and even identify head nodes, the direct communication partners of the stream's source. Attacking these head nodes can isolate peers from the source resulting in a disruption of the video dissemination for most peers in the system. We introduce a lightweight SWAP scheme, which allows peers to proactively change their partners, to reduce the chance of head nodes to be identified by such an inference attacker. Extensive simulation studies demonstrate that our scheme effectively undermines the attack's accuracy in identifying head nodes. So, SWAP lowers the chunk miss ratio while causing only a slight increase in signaling overhead.
在基于拉的点对点视频流系统中,对等体交换缓冲区映射以显示其缓冲区中视频块的可用性。当收集这些缓冲映射时,恶意方可以推断系统的覆盖结构,甚至可以识别头节点,即流源的直接通信伙伴。攻击这些头节点可以将对等点与源隔离,从而导致系统中大多数对等点的视频传播中断。我们引入了一种轻量级SWAP方案,该方案允许对等体主动更改其伙伴,以减少头部节点被此类推理攻击者识别的机会。大量的仿真研究表明,我们的方案有效地破坏了攻击在识别头节点方面的准确性。因此,SWAP降低了块丢失率,同时只略微增加了信令开销。
{"title":"SWAP: Protecting pull-based P2P video streaming systems from inference attacks","authors":"Giang T. Nguyen, Stefanie Roos, Benjamin Schiller, T. Strufe","doi":"10.1109/WoWMoM.2016.7523509","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523509","url":null,"abstract":"In pull-based Peer-to-Peer video streaming systems, peers exchange buffer maps to reveal the availability of video chunks in their buffer. When collecting these buffer maps, a malicious party can infer the system's overlay structure and even identify head nodes, the direct communication partners of the stream's source. Attacking these head nodes can isolate peers from the source resulting in a disruption of the video dissemination for most peers in the system. We introduce a lightweight SWAP scheme, which allows peers to proactively change their partners, to reduce the chance of head nodes to be identified by such an inference attacker. Extensive simulation studies demonstrate that our scheme effectively undermines the attack's accuracy in identifying head nodes. So, SWAP lowers the chunk miss ratio while causing only a slight increase in signaling overhead.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126114602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Have you asked your neighbors? A Hidden Market approach for device-to-device offloading 你问过你的邻居吗?设备到设备卸载的隐藏市场方法
Dimitris Chatzopoulos, Mahdieh Ahmadi, Sokol Kosta, P. Hui
During the last years, researchers have proposed solutions to help smartphones offload heavy tasks to remote entities in order to improve execution time and reduce energy consumption. Lately, inspired by the promising results of message forwarding in opportunistic networks, many researchers have proposed strategies for task offloading towards nearby mobile devices. None of these strategies, though, proposes any mechanism that considers selfish users and, most importantly, that motivates and defrays the participating devices who spend their resources. In this paper, we address these problems and propose the design of a framework that integrates an incentive scheme and a reputation mechanism. Our proposal follows the principles of the Hidden Market Design approach, which allows users to specify the amount of resources they are willing to “sacrifice” when participating in the offloading system. The underlying algorithm, that users are not aware of, is based on a truthful auction strategy and a peer-to-peer reputation exchange scheme. Extensive simulations on real traces depict how our designed mechanism achieves higher offloading rate and produces less traffic compared to three benchmark algorithms. Finally, we show how collaborating devices get rewarded for their contribution, while selfish ones get sidelined by others.
在过去的几年里,研究人员提出了一些解决方案,帮助智能手机将繁重的任务卸载到远程实体,以提高执行时间并降低能耗。最近,受机会主义网络中消息转发的良好结果的启发,许多研究人员提出了将任务卸载到附近移动设备的策略。然而,这些策略都没有提出任何机制来考虑自私的用户,最重要的是,没有提出任何机制来激励和支付花费资源的参与设备。在本文中,我们解决了这些问题,并提出了一个整合激励机制和声誉机制的框架设计。我们的建议遵循隐藏市场设计方法的原则,允许用户指定他们在参与卸载系统时愿意“牺牲”的资源数量。用户不知道的底层算法是基于真实拍卖策略和点对点信誉交换方案。在真实轨迹上的大量模拟描述了与三种基准算法相比,我们设计的机制如何实现更高的卸载率并产生更少的流量。最后,我们展示了协作设备如何因其贡献而获得奖励,而自私的设备如何被其他人边缘化。
{"title":"Have you asked your neighbors? A Hidden Market approach for device-to-device offloading","authors":"Dimitris Chatzopoulos, Mahdieh Ahmadi, Sokol Kosta, P. Hui","doi":"10.1109/WoWMoM.2016.7523497","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523497","url":null,"abstract":"During the last years, researchers have proposed solutions to help smartphones offload heavy tasks to remote entities in order to improve execution time and reduce energy consumption. Lately, inspired by the promising results of message forwarding in opportunistic networks, many researchers have proposed strategies for task offloading towards nearby mobile devices. None of these strategies, though, proposes any mechanism that considers selfish users and, most importantly, that motivates and defrays the participating devices who spend their resources. In this paper, we address these problems and propose the design of a framework that integrates an incentive scheme and a reputation mechanism. Our proposal follows the principles of the Hidden Market Design approach, which allows users to specify the amount of resources they are willing to “sacrifice” when participating in the offloading system. The underlying algorithm, that users are not aware of, is based on a truthful auction strategy and a peer-to-peer reputation exchange scheme. Extensive simulations on real traces depict how our designed mechanism achieves higher offloading rate and produces less traffic compared to three benchmark algorithms. Finally, we show how collaborating devices get rewarded for their contribution, while selfish ones get sidelined by others.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"514 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127046262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Energy-efficient cluster-based protocol using an adaptive data aggregative window function (A-DAWF) for wireless sensor networks 基于自适应数据聚合窗口函数(A-DAWF)的无线传感器网络节能聚类协议
S. Kandukuri, J. Lebreton, N. Murad, R. Lorion, Jean-Daniel Lan Sun Luk
We present an adaptive data aggregative window function (A-DAWF) for a distributed sensor network model in which nodes store data in their attribute window functions, and provide non-correlated data towards the base station (BS). Unlike previous works, namely data collection or data gathering management systems, we propose a novel approach that aims to process temporal redundant techniques in sensor nodes as well as providing spatial redundant filtration methods in cluster-head (CH) nodes. In this regard, preliminary results show that A-DAWF can suppress up to 90% of temporal redundant data among the considered sensor nodes by an optimal threshold of the window sizes, and their spatial correlations in CH node by a maximum error threshold compared to either periodic or a continuous data transmission system.
针对分布式传感器网络模型,提出了一种自适应数据聚合窗口函数(a - dawf),其中节点将数据存储在其属性窗口函数中,并向基站(BS)提供非相关数据。与以前的工作不同,即数据收集或数据收集管理系统,我们提出了一种新的方法,旨在处理传感器节点中的时间冗余技术,并提供簇头(CH)节点中的空间冗余过滤方法。在这方面,初步结果表明,与周期或连续数据传输系统相比,a - dawf通过窗口大小的最优阈值可以抑制所考虑的传感器节点之间高达90%的时间冗余数据,并且通过最大误差阈值可以抑制CH节点中的空间相关性。
{"title":"Energy-efficient cluster-based protocol using an adaptive data aggregative window function (A-DAWF) for wireless sensor networks","authors":"S. Kandukuri, J. Lebreton, N. Murad, R. Lorion, Jean-Daniel Lan Sun Luk","doi":"10.1109/WoWMoM.2016.7523529","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523529","url":null,"abstract":"We present an adaptive data aggregative window function (A-DAWF) for a distributed sensor network model in which nodes store data in their attribute window functions, and provide non-correlated data towards the base station (BS). Unlike previous works, namely data collection or data gathering management systems, we propose a novel approach that aims to process temporal redundant techniques in sensor nodes as well as providing spatial redundant filtration methods in cluster-head (CH) nodes. In this regard, preliminary results show that A-DAWF can suppress up to 90% of temporal redundant data among the considered sensor nodes by an optimal threshold of the window sizes, and their spatial correlations in CH node by a maximum error threshold compared to either periodic or a continuous data transmission system.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130442677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tie-breaking can maximize fairness without sacrificing throughput in D2D-assisted networks 在d2d辅助网络中,平局可以在不牺牲吞吐量的情况下最大化公平性
V. Mancuso, A. Asadi, P. Jacko
Opportunistic schedulers such as MaxRate and Proportional Fair are known for trading off between throughput and fairness of users in cellular networks. In this paper, we propose a novel solution that integrates opportunistic scheduling design principles and cooperative D2D communication capabilities in order to maximize fairness without sacrificing throughput. Specifically, we develop a mathematical approach and design a smart tie-breaking scheme which maximizes the fairness achieved by the MaxRate scheduler. However, our approach could be applied to improve fairness of any scheduler. In addition, we show that users that cooperatively form D2D clusters benefit from both higher throughput and fairness. Our scheduling scheme is simple to implement, scales linearly with the number of clusters, and is able to double the throughput of Equal Time schedulers and to outperform by 20% or more Proportional Fair schedulers, while providing a user fairness index comparable to or better than Proportional Fair.
MaxRate和Proportional Fair等机会调度器以在蜂窝网络中用户的吞吐量和公平性之间进行权衡而闻名。在本文中,我们提出了一种新的解决方案,该方案集成了机会调度设计原则和协作D2D通信能力,以便在不牺牲吞吐量的情况下最大化公平性。具体来说,我们开发了一种数学方法并设计了一种智能断线方案,该方案可以最大限度地提高MaxRate调度器实现的公平性。然而,我们的方法可以应用于提高任何调度器的公平性。此外,我们还表明,协作形成D2D集群的用户可以从更高的吞吐量和公平性中受益。我们的调度方案易于实现,随集群数量线性扩展,并且能够将Equal Time调度器的吞吐量提高一倍,并比比例公平调度器的性能高出20%或更多,同时提供与比例公平相当或更好的用户公平性指数。
{"title":"Tie-breaking can maximize fairness without sacrificing throughput in D2D-assisted networks","authors":"V. Mancuso, A. Asadi, P. Jacko","doi":"10.1109/WoWMoM.2016.7523498","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523498","url":null,"abstract":"Opportunistic schedulers such as MaxRate and Proportional Fair are known for trading off between throughput and fairness of users in cellular networks. In this paper, we propose a novel solution that integrates opportunistic scheduling design principles and cooperative D2D communication capabilities in order to maximize fairness without sacrificing throughput. Specifically, we develop a mathematical approach and design a smart tie-breaking scheme which maximizes the fairness achieved by the MaxRate scheduler. However, our approach could be applied to improve fairness of any scheduler. In addition, we show that users that cooperatively form D2D clusters benefit from both higher throughput and fairness. Our scheduling scheme is simple to implement, scales linearly with the number of clusters, and is able to double the throughput of Equal Time schedulers and to outperform by 20% or more Proportional Fair schedulers, while providing a user fairness index comparable to or better than Proportional Fair.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127625674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
WiseHAUL: An SDN-empowered Wireless Small Cell Backhaul testbed WiseHAUL:基于sdn的无线小型蜂窝回程测试平台
José Núñez-Martínez, J. Baranda, I. Pascual, J. Mangues‐Bafalluy
The deployment of dense networks of Small Cells (SC) is one of the key components of 5G mobile networks and will pose several challenges to the backhaul network. Software-Defined Networking (SDN) is a key technique to cope with the increased management complexity of such heterogeneous deployments, helping in the task of achieving a system-wide network management, which includes the 5G mobile wireless backhaul. Therefore, it is fundamental to devise the tools for the evaluation of 5G backhauling SDN architectures. This paper presents WiseHAUL: an SDN-empowered Wireless Small Cell Backhaul testbed. We present the design considerations of WiseHAUL, deployed in the form of an hypercube mesh that combines heterogeneous wireless technologies with the final goal of conducting SDN research and experimentation. Preliminary experimental results serve to identify the main research challenges faced by canonical SDN management techniques in an all-wireless backhaul deployment, hence acting as key drivers for further redesign and testbed development towards hybrid SDN models.
密集小蜂窝网络(SC)的部署是5G移动网络的关键组成部分之一,将对回程网络提出若干挑战。软件定义网络(SDN)是应对这种异构部署日益增加的管理复杂性的关键技术,有助于实现包括5G移动无线回程在内的全系统网络管理任务。因此,设计评估5G回程SDN架构的工具至关重要。本文介绍了WiseHAUL:一个支持sdn的无线小蜂窝回程测试平台。我们介绍了WiseHAUL的设计考虑,它以超立方体网格的形式部署,将异构无线技术与进行SDN研究和实验的最终目标相结合。初步实验结果有助于确定全无线回程部署中规范SDN管理技术面临的主要研究挑战,从而成为进一步重新设计和混合SDN模型测试平台开发的关键驱动因素。
{"title":"WiseHAUL: An SDN-empowered Wireless Small Cell Backhaul testbed","authors":"José Núñez-Martínez, J. Baranda, I. Pascual, J. Mangues‐Bafalluy","doi":"10.1109/WoWMoM.2016.7523527","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523527","url":null,"abstract":"The deployment of dense networks of Small Cells (SC) is one of the key components of 5G mobile networks and will pose several challenges to the backhaul network. Software-Defined Networking (SDN) is a key technique to cope with the increased management complexity of such heterogeneous deployments, helping in the task of achieving a system-wide network management, which includes the 5G mobile wireless backhaul. Therefore, it is fundamental to devise the tools for the evaluation of 5G backhauling SDN architectures. This paper presents WiseHAUL: an SDN-empowered Wireless Small Cell Backhaul testbed. We present the design considerations of WiseHAUL, deployed in the form of an hypercube mesh that combines heterogeneous wireless technologies with the final goal of conducting SDN research and experimentation. Preliminary experimental results serve to identify the main research challenges faced by canonical SDN management techniques in an all-wireless backhaul deployment, hence acting as key drivers for further redesign and testbed development towards hybrid SDN models.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131042940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Virtualization at the network edge: A performance comparison 网络边缘的虚拟化:性能比较
F. Ramalho, A. Neto
The rapid growth of the Internet of Things (IoT) is driving the evolution of Cloud technologies towards resource distribution across multi-clouds and the inclusion of various heterogeneous devices. IoT specific applications may require the deployment of gateways at the network edge to enable its interaction with physical sensors, pre-processing data from these sensors, and synchronizing it with the cloud. The orchestration, deployment, and maintenance of the software running on the gateways in large-scale deployments is known to be challenging. In this paper we analyze two virtualization techniques commonly used for deployment and management of applications at the cloud, but on the context of IoT and network edge. A study was conducted to evaluate the performance of the container-based approach compared to a hypervisor-based virtualization when running on devices typically used at the network edge. The study was performed through the execution of several synthetic benchmarks providing an insight in the performance overhead introduced by Docker containers (lightweight-virtualization) and KVM VMs (hypervisor-virtualization) running at network edge devices.
物联网(IoT)的快速发展正在推动云技术向跨多云资源分布和包含各种异构设备的方向发展。物联网特定应用可能需要在网络边缘部署网关,以实现与物理传感器的交互,预处理来自这些传感器的数据,并与云同步。在大规模部署中,对运行在网关上的软件进行编排、部署和维护是非常具有挑战性的。在本文中,我们分析了两种通常用于部署和管理云应用程序的虚拟化技术,但在物联网和网络边缘的背景下。我们进行了一项研究,以评估在网络边缘通常使用的设备上运行时,基于容器的方法与基于管理程序的虚拟化的性能。这项研究是通过执行几个综合基准测试来完成的,这些基准测试提供了对运行在网络边缘设备上的Docker容器(轻量级虚拟化)和KVM vm(管理程序虚拟化)带来的性能开销的洞察。
{"title":"Virtualization at the network edge: A performance comparison","authors":"F. Ramalho, A. Neto","doi":"10.1109/WoWMoM.2016.7523584","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523584","url":null,"abstract":"The rapid growth of the Internet of Things (IoT) is driving the evolution of Cloud technologies towards resource distribution across multi-clouds and the inclusion of various heterogeneous devices. IoT specific applications may require the deployment of gateways at the network edge to enable its interaction with physical sensors, pre-processing data from these sensors, and synchronizing it with the cloud. The orchestration, deployment, and maintenance of the software running on the gateways in large-scale deployments is known to be challenging. In this paper we analyze two virtualization techniques commonly used for deployment and management of applications at the cloud, but on the context of IoT and network edge. A study was conducted to evaluate the performance of the container-based approach compared to a hypervisor-based virtualization when running on devices typically used at the network edge. The study was performed through the execution of several synthetic benchmarks providing an insight in the performance overhead introduced by Docker containers (lightweight-virtualization) and KVM VMs (hypervisor-virtualization) running at network edge devices.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134256139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Beacons in dense Wi-Fi networks: How to befriend with neighbors in the 5G world? 密集Wi-Fi网络中的信标:如何在5G世界中与邻居交朋友?
D. Bankov, E. Khorov, A. Lyakhov, S. Schelstraete
To address 5G challenges, IEEE 802.11 is currently developing new amendments to the Wi-Fi standard, the most promising of which is 802.11ax. A key scenario considered by the developers of this amendment is dense and overlapped networks typically present in residential buildings, offices, airports, stadiums, and other places of a modern city. Being crucial for Wi-Fi hotspots, the hidden station problem becomes even more challenging for dense and overlapped networks, where even access points (APs) can be hidden. In this case, user stations can experience continuous collisions of beacons sent by different APs, which can cause disassociation and break Internet access. In this paper, we show that beacon collisions are rather typical for residential networks and may lead to unexpected and irreproducible malfunction. We investigate how often beacon collisions occur, and describe a number of mechanisms which can be used to avoid beacon collisions in dense deployment. Specifically, we pay much attention to those mechanisms which are currently under consideration of the IEEE 802.11ax group.
为了应对5G的挑战,IEEE 802.11目前正在开发对Wi-Fi标准的新修订,其中最有希望的是802.11ax。该修正案的开发商考虑的一个关键场景是,密集和重叠的网络通常出现在住宅建筑、办公室、机场、体育场和现代城市的其他地方。对于Wi-Fi热点来说,隐藏站问题至关重要,但对于密集和重叠的网络来说,隐藏站问题变得更具挑战性,因为在这些网络中,甚至连接入点(ap)都可以隐藏起来。在这种情况下,用户站可能会经历不同ap发送的信标的连续碰撞,这可能导致分离并中断Internet访问。在本文中,我们表明信标碰撞是相当典型的住宅网络,并可能导致意外和不可复制的故障。我们研究了信标冲突发生的频率,并描述了在密集部署中可以用来避免信标冲突的一些机制。具体来说,我们非常关注IEEE 802.11ax组目前正在考虑的那些机制。
{"title":"Beacons in dense Wi-Fi networks: How to befriend with neighbors in the 5G world?","authors":"D. Bankov, E. Khorov, A. Lyakhov, S. Schelstraete","doi":"10.1109/WoWMoM.2016.7523579","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523579","url":null,"abstract":"To address 5G challenges, IEEE 802.11 is currently developing new amendments to the Wi-Fi standard, the most promising of which is 802.11ax. A key scenario considered by the developers of this amendment is dense and overlapped networks typically present in residential buildings, offices, airports, stadiums, and other places of a modern city. Being crucial for Wi-Fi hotspots, the hidden station problem becomes even more challenging for dense and overlapped networks, where even access points (APs) can be hidden. In this case, user stations can experience continuous collisions of beacons sent by different APs, which can cause disassociation and break Internet access. In this paper, we show that beacon collisions are rather typical for residential networks and may lead to unexpected and irreproducible malfunction. We investigate how often beacon collisions occur, and describe a number of mechanisms which can be used to avoid beacon collisions in dense deployment. Specifically, we pay much attention to those mechanisms which are currently under consideration of the IEEE 802.11ax group.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132873182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of the IEEE 802.11ah Restricted Access Window mechanism for dense IoT networks 面向密集物联网网络的IEEE 802.11ah限制访问窗口机制评估
L. Tian, J. Famaey, Steven Latré
IEEE 802.11ah is a new Wi-Fi draft for sub-1Ghz communications, aiming to address the major challenges of the Internet of Things (IoT): connectivity among a large number of power-constrained stations deployed over a wide area. The new Restricted Access Window (RAW) mechanism promises to increase throughput and energy efficiency by dividing stations into different RAW groups. Only the stations in the same group can access the channel simultaneously, which reduces collision probability in dense scenarios. However, the draft does not specify any RAW grouping algorithms, while the grouping strategy is expected to severely impact RAW performance. To study the impact of parameters such as traffic load, number of stations and RAW group duration on optimal number of RAW groups, we implemented a sub-1Ghz PHY model and the 802.11ah MAC protocol in ns-3 to evaluate its transmission range, throughput, latency and energy efficiency in dense IoT network scenarios. The simulation shows that, with appropriate grouping, the RAW mechanism substantially improves throughput, latency and energy efficiency. Furthermore, the results suggest that the optimal grouping strategy depends on many parameters, and intelligent RAW group adaptation is necessary to maximize performance under dynamic conditions. This paper provides a major leap towards such a strategy.
IEEE 802.11ah是针对低于1ghz通信的新Wi-Fi草案,旨在解决物联网(IoT)的主要挑战:在广泛区域内部署的大量功率受限的站点之间的连接。新的限制访问窗口(RAW)机制承诺通过将站点划分为不同的RAW组来提高吞吐量和能源效率。只有同一组的站点才能同时进入信道,从而降低了密集场景下的碰撞概率。然而,草案并没有指定任何RAW分组算法,而分组策略预计会严重影响RAW性能。为了研究流量负载、站点数量和RAW组持续时间等参数对最优RAW组数量的影响,我们在ns-3中实现了一个低于1ghz的PHY模型和802.11ah MAC协议,以评估其在密集物联网网络场景下的传输范围、吞吐量、延迟和能效。仿真结果表明,通过适当的分组,RAW机制大大提高了吞吐量、延迟和能量效率。此外,研究结果表明,最优分组策略取决于许多参数,在动态条件下,智能分组适应是实现性能最大化的必要条件。本文为实现这一战略提供了一个重大飞跃。
{"title":"Evaluation of the IEEE 802.11ah Restricted Access Window mechanism for dense IoT networks","authors":"L. Tian, J. Famaey, Steven Latré","doi":"10.1109/WoWMoM.2016.7523502","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523502","url":null,"abstract":"IEEE 802.11ah is a new Wi-Fi draft for sub-1Ghz communications, aiming to address the major challenges of the Internet of Things (IoT): connectivity among a large number of power-constrained stations deployed over a wide area. The new Restricted Access Window (RAW) mechanism promises to increase throughput and energy efficiency by dividing stations into different RAW groups. Only the stations in the same group can access the channel simultaneously, which reduces collision probability in dense scenarios. However, the draft does not specify any RAW grouping algorithms, while the grouping strategy is expected to severely impact RAW performance. To study the impact of parameters such as traffic load, number of stations and RAW group duration on optimal number of RAW groups, we implemented a sub-1Ghz PHY model and the 802.11ah MAC protocol in ns-3 to evaluate its transmission range, throughput, latency and energy efficiency in dense IoT network scenarios. The simulation shows that, with appropriate grouping, the RAW mechanism substantially improves throughput, latency and energy efficiency. Furthermore, the results suggest that the optimal grouping strategy depends on many parameters, and intelligent RAW group adaptation is necessary to maximize performance under dynamic conditions. This paper provides a major leap towards such a strategy.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114860899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
期刊
2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1