首页 > 最新文献

2010 8th Annual Communication Networks and Services Research Conference最新文献

英文 中文
Analytical Approach to Maximize Throughput in Wireless Ad Hoc Networks 无线自组织网络中吞吐量最大化的分析方法
Pub Date : 2010-05-11 DOI: 10.1109/CNSR.2010.59
K. Mnif, Asma Sellami
The main concerns of network performance are throughput, end-to-end packet delay and packet loss. A high-performance network is characterized by high throughput, small delay, and low packet loss. A larger transmission radius increases the probability of finding a receiver with large progress, but simultaneously increases the probability of collision with other transmissions. Transmission range and the expected progress are pair of design parameters. A short-range transmission is preferred in terms of successful transmission because its avoid collision at the receiver. Long transmission range is favourable in term of: i- it moves a packet the maximum it can in one hop in successful transmission, and ii- the high probability to find a receiver candidate in the progression direction. In this paper, a theoretical model to analyse the one hop throughput with regular structure operating under the CSMA/CA access protocol in wireless ad hoc networks is proposed. We show how we can maximize mean packet progress and mean density of information transport by optimizing the transmission probability and the transmission range. Numerical results show that we can find an optimal transmission range to achieve the highest throughput. An optimal transmission range is essential to limit the energy dissipation on the mobile devices.
网络性能的主要关注点是吞吐量、端到端数据包延迟和数据包丢失。高性能网络的特点是吞吐量大、时延小、丢包少。较大的传输半径增加了发现进度较大的接收机的概率,但同时也增加了与其他传输发生碰撞的概率。传动范围和预期进度是一对设计参数。就成功传输而言,短距离传输是首选,因为它避免了接收器的碰撞。长传输距离的优点在于:1 .在成功传输的一跳中最大限度地移动数据包;2 .在进展方向上找到候选接收方的概率高。本文提出了在CSMA/CA接入协议下运行的无线自组织网络中一跳吞吐量的理论模型。我们展示了如何通过优化传输概率和传输范围来最大化平均数据包进度和平均信息传输密度。数值结果表明,我们可以找到一个最佳的传输范围,以达到最高的吞吐量。为了限制移动设备上的能量损耗,最优的传输距离至关重要。
{"title":"Analytical Approach to Maximize Throughput in Wireless Ad Hoc Networks","authors":"K. Mnif, Asma Sellami","doi":"10.1109/CNSR.2010.59","DOIUrl":"https://doi.org/10.1109/CNSR.2010.59","url":null,"abstract":"The main concerns of network performance are throughput, end-to-end packet delay and packet loss. A high-performance network is characterized by high throughput, small delay, and low packet loss. A larger transmission radius increases the probability of finding a receiver with large progress, but simultaneously increases the probability of collision with other transmissions. Transmission range and the expected progress are pair of design parameters. A short-range transmission is preferred in terms of successful transmission because its avoid collision at the receiver. Long transmission range is favourable in term of: i- it moves a packet the maximum it can in one hop in successful transmission, and ii- the high probability to find a receiver candidate in the progression direction. In this paper, a theoretical model to analyse the one hop throughput with regular structure operating under the CSMA/CA access protocol in wireless ad hoc networks is proposed. We show how we can maximize mean packet progress and mean density of information transport by optimizing the transmission probability and the transmission range. Numerical results show that we can find an optimal transmission range to achieve the highest throughput. An optimal transmission range is essential to limit the energy dissipation on the mobile devices.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127119559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Most Wanted Internet Applications: A Framework for P2P Identification 最受欢迎的互联网应用:一个P2P识别框架
Pub Date : 2010-05-11 DOI: 10.1109/CNSR.2010.64
Guthemberg Silvestre, S. Fernandes, C. Kamienski, D. Sadok
For almost a decade, Peer-to-Peer (P2P) traffic have been putting pressure on network operators. Taking actions to control P2P traffic is a daunting task. In this paper, we present a comprehensive framework for the identification of P2P traffic based on information-theoretic techniques. Despite the inherent difficulty to single out such applications, our methodology is able to successfully identify P2P traffic using a set of communication patterns or profiles. We show that profiles built on the observation of traffic volume are more accurate than those using the number of flows.
近十年来,点对点(P2P)流量一直给网络运营商带来压力。采取措施控制P2P流量是一项艰巨的任务。在本文中,我们提出了一个基于信息论技术的P2P流量识别的综合框架。尽管挑出这样的应用程序存在固有的困难,但我们的方法能够使用一组通信模式或配置文件成功地识别P2P流量。我们表明,建立在交通量上的轮廓比使用流量的轮廓更准确。
{"title":"Most Wanted Internet Applications: A Framework for P2P Identification","authors":"Guthemberg Silvestre, S. Fernandes, C. Kamienski, D. Sadok","doi":"10.1109/CNSR.2010.64","DOIUrl":"https://doi.org/10.1109/CNSR.2010.64","url":null,"abstract":"For almost a decade, Peer-to-Peer (P2P) traffic have been putting pressure on network operators. Taking actions to control P2P traffic is a daunting task. In this paper, we present a comprehensive framework for the identification of P2P traffic based on information-theoretic techniques. Despite the inherent difficulty to single out such applications, our methodology is able to successfully identify P2P traffic using a set of communication patterns or profiles. We show that profiles built on the observation of traffic volume are more accurate than those using the number of flows.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis and Implementation of a Simple Method to Add Noise to a Channel Using Non-uniform Sampling 一种利用非均匀采样向信道中添加噪声的简单方法的分析与实现
Pub Date : 2010-05-11 DOI: 10.1109/CNSR.2010.50
Brandon C. Brown, M. Kaye, B. Petersen
This paper is an investigation into non--uniform sampling and its effects when correction is not available. First, a mathematical model is put forth, which a physical implementation was then based on. A comparison of both the theoretical and practical implementation took place, and it was found that the mathematical model accurately predicted the results. The mathematical model used statistics to predict the output variance given an input variance; the output variance was found to have half the input variance. It was found that the amount of noise added to the channel increases linearly with the length of the shift register until it reaches a maximum value.
本文研究了非均匀抽样及其在不可校正情况下的影响。首先,提出了数学模型,并在此基础上进行了物理实现。通过理论和实际实现的比较,发现数学模型能准确地预测结果。该数学模型利用统计量来预测给定输入方差的输出方差;我们发现输出方差只有输入方差的一半。结果发现,加入信道的噪声量随着移位寄存器的长度线性增加,直到达到最大值。
{"title":"Analysis and Implementation of a Simple Method to Add Noise to a Channel Using Non-uniform Sampling","authors":"Brandon C. Brown, M. Kaye, B. Petersen","doi":"10.1109/CNSR.2010.50","DOIUrl":"https://doi.org/10.1109/CNSR.2010.50","url":null,"abstract":"This paper is an investigation into non--uniform sampling and its effects when correction is not available. First, a mathematical model is put forth, which a physical implementation was then based on. A comparison of both the theoretical and practical implementation took place, and it was found that the mathematical model accurately predicted the results. The mathematical model used statistics to predict the output variance given an input variance; the output variance was found to have half the input variance. It was found that the amount of noise added to the channel increases linearly with the length of the shift register until it reaches a maximum value.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127932646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling and Resource Allocation in LTE Uplink with a Delay Requirement 具有时延要求的LTE上行链路调度与资源分配
Pub Date : 2010-05-11 DOI: 10.1109/CNSR.2010.33
Oscar Delgado, B. Jaumard
In this paper, we investigate the problem of schedulingand resource allocation for LTE Single Cell Uplink systemswhich use Single Carrier Frequency Division MultipleAccess (SC-FDMA). SC-FDMA (L-FDMA scheme) has particularscheduling requirements such as limited power consumption and contiguous resource block constraints. This last requirement has been seldom taken into account in the previous scheduling and resource allocation algorithms. In addition, there is also an end-to-end delay requirement concern, which has not yet been investigated in conjunction with block contiguity constraints, in the LTE Uplink scheduling and resource allocation literature.The end-to-end delay is a significant quality of service (QoS) matter; taking into account that it has a notable impact on the number of users that can be effectively served.We provide two new scheduling algorithms that, in additionto the channel contiguity constraint, take also into account the end-to-end delay constraint. Simulations are conducted on traffic instances with up to 144 users and results are compared with two very recently proposed algorithms. Results show that we increase by approximately a factor of 3, the user capacity of the system relative to systems that does not include the end-to-end delay constraint, without sacrificing the user fairness.
本文研究了采用单载波频分多址(SC-FDMA)的LTE单小区上行系统的调度和资源分配问题。SC-FDMA (L-FDMA方案)有特殊的调度要求,如有限的功耗和连续的资源块约束。在以前的调度和资源分配算法中,很少考虑到最后一个要求。此外,在LTE上行调度和资源分配文献中,还存在端到端延迟需求问题,但尚未与块连续性约束一起进行研究。端到端延迟是一个重要的服务质量(QoS)问题;考虑到它对可以有效服务的用户数量有显著的影响。我们提供了两种新的调度算法,除了信道连续性约束外,还考虑了端到端延迟约束。在最多144个用户的流量实例上进行了仿真,并将结果与最近提出的两种算法进行了比较。结果表明,相对于不包含端到端延迟约束的系统,我们在不牺牲用户公平性的情况下,将系统的用户容量增加了大约3倍。
{"title":"Scheduling and Resource Allocation in LTE Uplink with a Delay Requirement","authors":"Oscar Delgado, B. Jaumard","doi":"10.1109/CNSR.2010.33","DOIUrl":"https://doi.org/10.1109/CNSR.2010.33","url":null,"abstract":"In this paper, we investigate the problem of schedulingand resource allocation for LTE Single Cell Uplink systemswhich use Single Carrier Frequency Division MultipleAccess (SC-FDMA). SC-FDMA (L-FDMA scheme) has particularscheduling requirements such as limited power consumption and contiguous resource block constraints. This last requirement has been seldom taken into account in the previous scheduling and resource allocation algorithms. In addition, there is also an end-to-end delay requirement concern, which has not yet been investigated in conjunction with block contiguity constraints, in the LTE Uplink scheduling and resource allocation literature.The end-to-end delay is a significant quality of service (QoS) matter; taking into account that it has a notable impact on the number of users that can be effectively served.We provide two new scheduling algorithms that, in additionto the channel contiguity constraint, take also into account the end-to-end delay constraint. Simulations are conducted on traffic instances with up to 144 users and results are compared with two very recently proposed algorithms. Results show that we increase by approximately a factor of 3, the user capacity of the system relative to systems that does not include the end-to-end delay constraint, without sacrificing the user fairness.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127962757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Characterizing the Impacts of VPN Security Models on Streaming Video 描述VPN安全模型对流媒体视频的影响
Pub Date : 2010-05-11 DOI: 10.1109/CNSR.2010.60
Shihyon Park, B. Matthews, Danny D'Amours, W. McIver
Video-based communications are becoming more important within domains, such as health care, that have stringent security and privacy requirements for data. VPN-based encryption is a now common part of organizational security architectures. It is expected that the time required to perform encryption at a VPN concentrator and decryption at the client side video may add significant overhead to the transmission of real-time video, which is already delay-sensitive. The real impacts of this overhead on Quality of user Experience are not well-understood. This paper describes experimental methods for measuring the network-level impacts of virtual private network (VPN) encryption on real-time video in wired and wireless networks. It also presents experimental results using these methods. This paper concludes that VPN-based encryption introduces significant latency to real-time video and that further analysis is warranted to characterize the transitive impacts of such latency on the quality of user experience
基于视频的通信在医疗保健等领域变得越来越重要,这些领域对数据有严格的安全和隐私要求。基于vpn的加密现在是组织安全体系结构的常见组成部分。预计在VPN集中器上执行加密和在客户端视频上执行解密所需的时间可能会增加实时视频传输的显著开销,这已经是延迟敏感的。这种开销对用户体验质量的真正影响还没有得到很好的理解。本文介绍了在有线和无线网络中测量虚拟专用网(VPN)加密对实时视频的网络级影响的实验方法。并给出了使用这些方法的实验结果。本文的结论是,基于vpn的加密给实时视频带来了显著的延迟,有必要进一步分析这种延迟对用户体验质量的传递性影响
{"title":"Characterizing the Impacts of VPN Security Models on Streaming Video","authors":"Shihyon Park, B. Matthews, Danny D'Amours, W. McIver","doi":"10.1109/CNSR.2010.60","DOIUrl":"https://doi.org/10.1109/CNSR.2010.60","url":null,"abstract":"Video-based communications are becoming more important within domains, such as health care, that have stringent security and privacy requirements for data. VPN-based encryption is a now common part of organizational security architectures. It is expected that the time required to perform encryption at a VPN concentrator and decryption at the client side video may add significant overhead to the transmission of real-time video, which is already delay-sensitive. The real impacts of this overhead on Quality of user Experience are not well-understood. This paper describes experimental methods for measuring the network-level impacts of virtual private network (VPN) encryption on real-time video in wired and wireless networks. It also presents experimental results using these methods. This paper concludes that VPN-based encryption introduces significant latency to real-time video and that further analysis is warranted to characterize the transitive impacts of such latency on the quality of user experience","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130443951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using Routing Optimization in Next Generation Network to Achieve High QoS 利用下一代网络中的路由优化实现高QoS
Pub Date : 2010-05-11 DOI: 10.1109/CNSR.2010.41
E. Fgee, Abdoelbari Elalo, W. Phillips, A. Elhounie
This paper deals with the routing optimization in IPV6networks. It's the key processes of traffic engineering andnetwork planning.Routing optimization provides a means to balance thetraffic load in the network with the goal to improve thequality of service. The main objective of our routingoptimization procedures is the minimization of the end-to-end delay, which is the total time of an individual packetto transfer from source to destination node. By optimizedone of router's functions, this function is the packetclassification. This work is done modify the packetclassification operation in the router architecture bymaking it based on two tuples (source address and flowlabel)instead of the regular five tuples to classify thecoming packets.Finally, to test and compare the performance ofour algorithm, we used the network simulator NS-2,version 2.29. The simulation results indicate that theproposed algorithm indeed helps to minimize the end-toenddelay as a result of router optimization.
本文研究了ipv6网络中的路由优化问题。它是交通工程和网络规划的关键过程。路由优化提供了一种平衡网络中流量负载的方法,目的是提高服务质量。我们的路由优化过程的主要目标是最小化端到端延迟,即单个数据包从源节点传输到目的节点的总时间。通过优化路由器的一个功能,这个功能是分组分类。这项工作通过修改路由器架构中的数据包分类操作,使其基于两个元组(源地址和流标签)而不是常规的五个元组来对到来的数据包进行分类。最后,为了测试和比较我们的算法的性能,我们使用了网络模拟器NS-2,版本2.29。仿真结果表明,由于路由器的优化,该算法确实有助于最小化端到端延迟。
{"title":"Using Routing Optimization in Next Generation Network to Achieve High QoS","authors":"E. Fgee, Abdoelbari Elalo, W. Phillips, A. Elhounie","doi":"10.1109/CNSR.2010.41","DOIUrl":"https://doi.org/10.1109/CNSR.2010.41","url":null,"abstract":"This paper deals with the routing optimization in IPV6networks. It's the key processes of traffic engineering andnetwork planning.Routing optimization provides a means to balance thetraffic load in the network with the goal to improve thequality of service. The main objective of our routingoptimization procedures is the minimization of the end-to-end delay, which is the total time of an individual packetto transfer from source to destination node. By optimizedone of router's functions, this function is the packetclassification. This work is done modify the packetclassification operation in the router architecture bymaking it based on two tuples (source address and flowlabel)instead of the regular five tuples to classify thecoming packets.Finally, to test and compare the performance ofour algorithm, we used the network simulator NS-2,version 2.29. The simulation results indicate that theproposed algorithm indeed helps to minimize the end-toenddelay as a result of router optimization.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115826142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Topology Control Algorithm with Good Spanner Properties for Wireless Sensor Networks 一种具有良好扳手特性的无线传感器网络拓扑控制算法
Pub Date : 2010-05-11 DOI: 10.1109/CNSR.2010.37
N. Ababneh, Anastasios Viglas, S. Selvadurai, N. Boukhatem
The main design challenge for wireless sensor network solutions is energy efficiency to prolong the network operable lifetime. Since most energy is spent for radio communications, an effective approach for energy conservation is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide continuous service. Assuming node position information is unavailable we propose an algorithm to construct a sparse spanner network topology for these networks. It uses two-hop neighborhood information to select a subset of nodes to be active among all nodes in the neighborhood. Each node in the network selects its own set of active neighbors from among its one-hop neighbors. This set is determined such that it covers all two-hop neighbors. Our proposed algorithm is proved to achieve several desirable properties on both Euclidean and general weighted graphs: (1) the resulting graph is symmetric and connected; (2) the resulting graph also exhibits good spanner properties for both distance/energy and hops; (3) it is constructed locally in a fully distributed fashion; (4) we prove that on the average-case unit disk graphs, the resulting topology features the bounded degree property; (5) finally, the computation cost of our algorithm is at most O(n^3 ), and the communication cost is bounded by O(n^2 ).
无线传感器网络解决方案的主要设计挑战是能源效率,以延长网络的工作寿命。由于无线电通信消耗了大量的能量,因此一种有效的节能方法是为外部节点安排睡眠间隔,而其余节点保持活动状态以提供连续的服务。假设节点位置信息不可用,我们提出了一种算法来构建稀疏扳手网络拓扑。它使用两跳邻居信息在邻居的所有节点中选择一个活跃的节点子集。网络中的每个节点从它的单跳邻居中选择自己的一组活动邻居。这个集合被确定为覆盖所有两跳邻居。我们的算法被证明在欧几里得和一般加权图上都达到了几个理想的性质:(1)结果图是对称的和连通的;(2)所得图对距离/能量和跳数都表现出良好的扳手性质;(3)以全分布式方式局部构建;(4)证明了在平均情况下单元圆盘图的拓扑结构具有有界度性质;(5)最后,我们算法的计算代价不超过O(n^3),通信代价以O(n^2)为界。
{"title":"A Topology Control Algorithm with Good Spanner Properties for Wireless Sensor Networks","authors":"N. Ababneh, Anastasios Viglas, S. Selvadurai, N. Boukhatem","doi":"10.1109/CNSR.2010.37","DOIUrl":"https://doi.org/10.1109/CNSR.2010.37","url":null,"abstract":"The main design challenge for wireless sensor network solutions is energy efficiency to prolong the network operable lifetime. Since most energy is spent for radio communications, an effective approach for energy conservation is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide continuous service. Assuming node position information is unavailable we propose an algorithm to construct a sparse spanner network topology for these networks. It uses two-hop neighborhood information to select a subset of nodes to be active among all nodes in the neighborhood. Each node in the network selects its own set of active neighbors from among its one-hop neighbors. This set is determined such that it covers all two-hop neighbors. Our proposed algorithm is proved to achieve several desirable properties on both Euclidean and general weighted graphs: (1) the resulting graph is symmetric and connected; (2) the resulting graph also exhibits good spanner properties for both distance/energy and hops; (3) it is constructed locally in a fully distributed fashion; (4) we prove that on the average-case unit disk graphs, the resulting topology features the bounded degree property; (5) finally, the computation cost of our algorithm is at most O(n^3 ), and the communication cost is bounded by O(n^2 ).","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128393730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Game-Theory Based User Centric Network Selection with Media Independent Handover Services and Flow Management 基于博弈论的用户中心网络选择与媒体独立切换服务和流量管理
Pub Date : 2010-05-11 DOI: 10.1109/CNSR.2010.40
M. A. Khan, U. Toseef, Stefan Marx, C. Görg
Future envisions universal and uninterrupted access to information owing to the widespread use of heterogeneous wireless technologies. The integration of heterogeneous wireless technologies and existence of multi-mode terminals enable users get associated to the best available networks according to user preferences over different application specific requirements, prices and network technologies. In this paper we present the user-centric network selection decision mechanism, where negotiation between users and network operators is carried out using game-theoretic approach. We model the utility functions of users and network operators in terms of offered prices and service quality. The proposed approach builds on IEEE 802.21standard. Session Initiation Protocol(SIP) and Mobile Internet Protocol (MIPv6) based flow management solutions are given, the later approach is implemented using OPNET modeller simulator. The performance of our approachis compared with Long-term contractual approach in termsof users throughput, users’ cost, operators’ revenue and call blocking probability.
由于异构无线技术的广泛使用,未来人们将普遍和不间断地获取信息。异构无线技术的集成和多模终端的存在使用户能够根据不同的应用特定需求、价格和网络技术,根据用户的偏好与最佳可用网络相关联。本文提出了以用户为中心的网络选择决策机制,其中用户和网络运营商之间采用博弈论的方法进行协商。我们根据提供的价格和服务质量建立了用户和网络运营商的效用函数模型。提出的方法建立在IEEE 802.21标准之上。给出了基于会话发起协议(SIP)和移动互联网协议(MIPv6)的流量管理方案,并利用OPNET建模模拟器实现了基于会话发起协议(SIP)的流量管理方案。在用户吞吐量、用户成本、运营商收入和呼叫阻塞概率方面,我们的方法与长期合同方法的性能进行了比较。
{"title":"Game-Theory Based User Centric Network Selection with Media Independent Handover Services and Flow Management","authors":"M. A. Khan, U. Toseef, Stefan Marx, C. Görg","doi":"10.1109/CNSR.2010.40","DOIUrl":"https://doi.org/10.1109/CNSR.2010.40","url":null,"abstract":"Future envisions universal and uninterrupted access to information owing to the widespread use of heterogeneous wireless technologies. The integration of heterogeneous wireless technologies and existence of multi-mode terminals enable users get associated to the best available networks according to user preferences over different application specific requirements, prices and network technologies. In this paper we present the user-centric network selection decision mechanism, where negotiation between users and network operators is carried out using game-theoretic approach. We model the utility functions of users and network operators in terms of offered prices and service quality. The proposed approach builds on IEEE 802.21standard. Session Initiation Protocol(SIP) and Mobile Internet Protocol (MIPv6) based flow management solutions are given, the later approach is implemented using OPNET modeller simulator. The performance of our approachis compared with Long-term contractual approach in termsof users throughput, users’ cost, operators’ revenue and call blocking probability.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130942494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Mobility Model for User's Realistic Behavior in Mobile Ad Hoc Network 移动Ad Hoc网络中用户现实行为的移动性模型
Pub Date : 2010-05-11 DOI: 10.1109/CNSR.2010.27
Shiddhartha Raj Bhandari, G. Lee, N. Crespi
Mobile ad hoc network (MANET) can be the best option in developing seamless communication environment in various application scenarios where there is no any pre-defined infrastructure. A mobility model which represents movement behavior of considered application scenarios should incorporate important features that may change characteristics of mobile nodes. In most of the cases, mobile nodes used to move along predefined paths toward their destination. We propose a new mobility model which represents movement of mobile nodes in case of pre-defined structured area including attraction points to incorporate realistic behavior. We simulate performance of Ad hoc on-demand distance vector (AODV) routing protocol varying speed, load and node density. In terms of performances, average end-to-end delay is less in case of proposed mobility model. However, packet delivery ratio is found lower compare to random way point. The goal of our proposal is to model user’s realistic behavior in conventional routing protocols.
在没有任何预定义基础设施的各种应用场景中,移动自组织网络(MANET)是开发无缝通信环境的最佳选择。表示所考虑的应用程序场景的移动行为的移动性模型应该包含可能改变移动节点特征的重要特征。在大多数情况下,移动节点通常沿着预定义的路径移动到目的地。我们提出了一种新的移动模型,该模型表示在预定义的结构化区域(包括吸引力点)中移动节点的运动,以结合现实行为。本文模拟了AODV路由协议在不同速度、负载和节点密度下的性能。在性能方面,提出的移动性模型的平均端到端延迟较小。然而,与随机路径点相比,发现数据包的投递率较低。我们建议的目标是在传统路由协议中对用户的实际行为进行建模。
{"title":"Mobility Model for User's Realistic Behavior in Mobile Ad Hoc Network","authors":"Shiddhartha Raj Bhandari, G. Lee, N. Crespi","doi":"10.1109/CNSR.2010.27","DOIUrl":"https://doi.org/10.1109/CNSR.2010.27","url":null,"abstract":"Mobile ad hoc network (MANET) can be the best option in developing seamless communication environment in various application scenarios where there is no any pre-defined infrastructure. A mobility model which represents movement behavior of considered application scenarios should incorporate important features that may change characteristics of mobile nodes. In most of the cases, mobile nodes used to move along predefined paths toward their destination. We propose a new mobility model which represents movement of mobile nodes in case of pre-defined structured area including attraction points to incorporate realistic behavior. We simulate performance of Ad hoc on-demand distance vector (AODV) routing protocol varying speed, load and node density. In terms of performances, average end-to-end delay is less in case of proposed mobility model. However, packet delivery ratio is found lower compare to random way point. The goal of our proposal is to model user’s realistic behavior in conventional routing protocols.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125469067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks 下一代宽带无线网络中应急站的优先接入
Pub Date : 2010-05-11 DOI: 10.1109/CNSR.2010.35
Paul Boone, M. Barbeau, E. Kranakis
We focus on the interference between mobile stations as they attempt to gain access to an OFDMA-based WiMAX/IEEE 802.16 network. We propose a set of strategies that enable base stations to 1) reduce or eliminate the interference between emergency and non-emergency mobile stations and 2) provide prioritized access to emergency mobile stations. Our strategies include introducing a sliding contention window, redistribution of ranging codes and the abilityof base stations to delay the entry process of any mobile station. We give an analysis of our strategies and some simulated results.
当移动站试图接入基于ofdma的WiMAX/IEEE 802.16网络时,我们关注的是它们之间的干扰。我们提出了一套策略,使基站能够1)减少或消除紧急和非紧急移动站之间的干扰,2)提供对紧急移动站的优先接入。我们的策略包括引入滑动竞争窗口,重新分配距离代码以及基站延迟任何移动站进入过程的能力。最后给出了我们的策略分析和一些仿真结果。
{"title":"Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks","authors":"Paul Boone, M. Barbeau, E. Kranakis","doi":"10.1109/CNSR.2010.35","DOIUrl":"https://doi.org/10.1109/CNSR.2010.35","url":null,"abstract":"We focus on the interference between mobile stations as they attempt to gain access to an OFDMA-based WiMAX/IEEE 802.16 network. We propose a set of strategies that enable base stations to 1) reduce or eliminate the interference between emergency and non-emergency mobile stations and 2) provide prioritized access to emergency mobile stations. Our strategies include introducing a sliding contention window, redistribution of ranging codes and the abilityof base stations to delay the entry process of any mobile station. We give an analysis of our strategies and some simulated results.","PeriodicalId":208564,"journal":{"name":"2010 8th Annual Communication Networks and Services Research Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114805023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2010 8th Annual Communication Networks and Services Research Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1