Jianping He, Jiahai Yang, Changqing An, Xuenong Li
In recent years, Network Coding (NC) draws a lot of attentions because of its ability to improve the network throughput and enhance the network robustness and security. Some systems using network coding have been built. In this paper, we study collisions in wireless network coding system - COPE. Collisions introduced by network coding can be classified into two types, CodIng node Side Collision (CISC) and Receiver Side Collision (RISC). Then, we analyze the collision probability in different scenarios. To reduce CISC and RISC, we propose Collision Avoidance in Network coding (CAN). Our simulation results show that CAN can reduce the collision ratio significantly.
近年来,网络编码(Network Coding, NC)因其能够提高网络吞吐量、增强网络鲁棒性和安全性而备受关注。已经建立了一些使用网络编码的系统。本文研究了无线网络编码系统COPE中的碰撞问题。网络编码引入的碰撞可以分为编码节点侧碰撞(CISC)和接收端碰撞(RISC)两种类型。然后,我们分析了不同场景下的碰撞概率。为了减少CISC和RISC,我们提出了网络编码中的避免碰撞(Collision Avoidance in Network coding, CAN)。仿真结果表明CAN可以显著降低碰撞率。
{"title":"A study of collisions in wireless network coding system","authors":"Jianping He, Jiahai Yang, Changqing An, Xuenong Li","doi":"10.1109/WD.2008.4812859","DOIUrl":"https://doi.org/10.1109/WD.2008.4812859","url":null,"abstract":"In recent years, Network Coding (NC) draws a lot of attentions because of its ability to improve the network throughput and enhance the network robustness and security. Some systems using network coding have been built. In this paper, we study collisions in wireless network coding system - COPE. Collisions introduced by network coding can be classified into two types, CodIng node Side Collision (CISC) and Receiver Side Collision (RISC). Then, we analyze the collision probability in different scenarios. To reduce CISC and RISC, we propose Collision Avoidance in Network coding (CAN). Our simulation results show that CAN can reduce the collision ratio significantly.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133100482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IEEE 802.16 in its mesh mode relies on the Network Entry Process to authenticate and register new node joining the network. This process is fundamental to form the mesh network topology. However, few research activities have addressed the security of this process. In this paper, we show that the network entry process can fail under many attacks (Topological attacks, Selfish behavior and denial of service attacks), and then we give solutions in order to avoid these threats.
{"title":"Network entry process security in IEEE 802.16 mesh mode","authors":"Mohamed Amin Jabri, Lamia Ben Azzouz","doi":"10.1109/WD.2008.4812902","DOIUrl":"https://doi.org/10.1109/WD.2008.4812902","url":null,"abstract":"IEEE 802.16 in its mesh mode relies on the Network Entry Process to authenticate and register new node joining the network. This process is fundamental to form the mesh network topology. However, few research activities have addressed the security of this process. In this paper, we show that the network entry process can fail under many attacks (Topological attacks, Selfish behavior and denial of service attacks), and then we give solutions in order to avoid these threats.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129367163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Alexiou, Christos Bouras, V. Kokkinos, Evangelos Rekkas
The spread of multimedia data has drastically differentiated the current landscape of Universal Mobile Telecommunication System (UMTS) networks, posing the need for further enhancements in its Radio Resource Management (RRM) strategies. Introduced in 3rd Generation Partnership Project (3 GPP) Release 6, the Multimedia Broadcast/Multicast Services (MBMS) framework aims at the efficient usage of network and radio resources for the transmission of multimedia services. The main requirement during the provision of MBMS multicast services is to minimize the transmission power of UMTS base stations. To this direction, several mechanisms have been proposed that either allow a simultaneous deployment of Point-to-Point (PTP) and Point-to-Multipoint (PTM) transmissions, or a single transport channel deployment (PTP or PTM) in a cell at any given time. Main objective of this paper is to study these mechanisms, compare them in terms of power consumption, underline the advantages that they may offer; and finally to propose enhancements that will ensure the lowest possible power consumption during MBMS transmissions.
{"title":"Evaluation of different radio bearer selection approaches for MBMS in B3G networks","authors":"A. Alexiou, Christos Bouras, V. Kokkinos, Evangelos Rekkas","doi":"10.1109/WD.2008.4812904","DOIUrl":"https://doi.org/10.1109/WD.2008.4812904","url":null,"abstract":"The spread of multimedia data has drastically differentiated the current landscape of Universal Mobile Telecommunication System (UMTS) networks, posing the need for further enhancements in its Radio Resource Management (RRM) strategies. Introduced in 3rd Generation Partnership Project (3 GPP) Release 6, the Multimedia Broadcast/Multicast Services (MBMS) framework aims at the efficient usage of network and radio resources for the transmission of multimedia services. The main requirement during the provision of MBMS multicast services is to minimize the transmission power of UMTS base stations. To this direction, several mechanisms have been proposed that either allow a simultaneous deployment of Point-to-Point (PTP) and Point-to-Multipoint (PTM) transmissions, or a single transport channel deployment (PTP or PTM) in a cell at any given time. Main objective of this paper is to study these mechanisms, compare them in terms of power consumption, underline the advantages that they may offer; and finally to propose enhancements that will ensure the lowest possible power consumption during MBMS transmissions.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131052698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The access technique of non real time services in 802.16 networks is generally based on multicast or broadcast polling and contentions resolution mechanisms. Thus, the major problem that faces this class of service is the number of collisions that occur between the bandwidth request messages of subscribers' stations (SSs). These collisions cause waste of bandwidth and increase the access delay. In this paper, we propose a new strategy that aims at reducing to the minimum the collision probability in contention periods. The proposed approach allows to the base station (BS) to select the SSs that can participate to the multicast polling, based on the amount of bandwidth already used by their active connection. Once this selection is made, the considered SSs will adopt a queue status-based contention window (QCW) technique that combines the minimum value sent by the BS and the number of nrtps packets waiting in the queue. Using the simulation results obtained with NS2, we demonstrate the effectiveness of our approach, especially at reducing access delay and collision rate.
{"title":"Enhancing access technique for non real time services in 802.16 systems","authors":"F. Ghandour, M. Frikha, S. Tabbane","doi":"10.1109/WD.2008.4812824","DOIUrl":"https://doi.org/10.1109/WD.2008.4812824","url":null,"abstract":"The access technique of non real time services in 802.16 networks is generally based on multicast or broadcast polling and contentions resolution mechanisms. Thus, the major problem that faces this class of service is the number of collisions that occur between the bandwidth request messages of subscribers' stations (SSs). These collisions cause waste of bandwidth and increase the access delay. In this paper, we propose a new strategy that aims at reducing to the minimum the collision probability in contention periods. The proposed approach allows to the base station (BS) to select the SSs that can participate to the multicast polling, based on the amount of bandwidth already used by their active connection. Once this selection is made, the considered SSs will adopt a queue status-based contention window (QCW) technique that combines the minimum value sent by the BS and the number of nrtps packets waiting in the queue. Using the simulation results obtained with NS2, we demonstrate the effectiveness of our approach, especially at reducing access delay and collision rate.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116183928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Fusté-Vilella, J. García-Vidal, Julián David Morillo-Pozo
In this paper we introduce a novel cooperative forwarding mechanism for IEEE 802.11-based MANETs. The mechanism has been adapted to operate together with two well known routing protocols: AODV and LUNAR. We evaluate our proposal by means of a prototype, using pedestrian mobility inside a building. Results show that, in dense MANETs, our cooperative forwarding mechanism is a promising technique to achieve robustness, and with a low cost of overhead.
{"title":"Cooperative forwarding in IEEE 802.11-based MANETs","authors":"D. Fusté-Vilella, J. García-Vidal, Julián David Morillo-Pozo","doi":"10.1109/WD.2008.4812845","DOIUrl":"https://doi.org/10.1109/WD.2008.4812845","url":null,"abstract":"In this paper we introduce a novel cooperative forwarding mechanism for IEEE 802.11-based MANETs. The mechanism has been adapted to operate together with two well known routing protocols: AODV and LUNAR. We evaluate our proposal by means of a prototype, using pedestrian mobility inside a building. Results show that, in dense MANETs, our cooperative forwarding mechanism is a promising technique to achieve robustness, and with a low cost of overhead.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123834956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Existing plans for home networks are aimed at the short to medium term and postulate that TCP/IP will extend to home networks. This view may be unsustainable in the long term, with increasing network diversity. This paper proposes a network/transport home network protocol (HNP) that supports multiple levels of flexibility. Protocol layer fusion is possible through a combined mode or TCP compatibility is preserved with a split mode. Within combined mode simple or flexible sub-modes are possible. HNP introduces device-centric addressing allowing anycast and broadcast to be easily supported. Relative to IP addressing, header overhead is reduced and short command messages are supported.
{"title":"Home network protocol with device-centric addressing","authors":"Xiang Ren, M. Fleury","doi":"10.1109/WD.2008.4812907","DOIUrl":"https://doi.org/10.1109/WD.2008.4812907","url":null,"abstract":"Existing plans for home networks are aimed at the short to medium term and postulate that TCP/IP will extend to home networks. This view may be unsustainable in the long term, with increasing network diversity. This paper proposes a network/transport home network protocol (HNP) that supports multiple levels of flexibility. Protocol layer fusion is possible through a combined mode or TCP compatibility is preserved with a split mode. Within combined mode simple or flexible sub-modes are possible. HNP introduces device-centric addressing allowing anycast and broadcast to be easily supported. Relative to IP addressing, header overhead is reduced and short command messages are supported.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121167855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Orthogonal frequency division multiplexing based on offset quadrature amplitude modulation (OFDM-OQAM) over wideband frequency selective multipath channels suffers from inter-symbol interference (ISI) and inter-carrier interference (ICI) that degrade its performance. Channel estimation and equalization are needed to combat these interferences. In this paper a novel channel estimator for passband OFDM-OQAM signaling over wideband multipath channels, which is based on multiple signal classification (MUSIC) with the Spatial Smoothing technique is presented. Numerical simulation results are presented in the low number of subcarriers, i.e. wideband, scenario.
{"title":"MUSIC-based modal channel estimation for wideband OFDM-OQAM","authors":"G. Garbo, S. Mangione, V. Maniscalco","doi":"10.1109/WD.2008.4812914","DOIUrl":"https://doi.org/10.1109/WD.2008.4812914","url":null,"abstract":"Orthogonal frequency division multiplexing based on offset quadrature amplitude modulation (OFDM-OQAM) over wideband frequency selective multipath channels suffers from inter-symbol interference (ISI) and inter-carrier interference (ICI) that degrade its performance. Channel estimation and equalization are needed to combat these interferences. In this paper a novel channel estimator for passband OFDM-OQAM signaling over wideband multipath channels, which is based on multiple signal classification (MUSIC) with the Spatial Smoothing technique is presented. Numerical simulation results are presented in the low number of subcarriers, i.e. wideband, scenario.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122610843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a new routing protocol, called traffic-aware and low-overhead routing protocol (TALORP) is proposed. The TALORP protocol, which is an enhancements of the low-overhead routing protocol (LORP), uses backup routes to mitigate the flooding problem that is frequently used to repair link failures. It also takes into account the traffic flows on different paths toward the destination in order to select the shortest and the least-congested path. The simulation results demonstrated that TALORP achieves better performance compared to LORP under all traffic conditions in terms of packet delivery ratio and end-to-end delay but at the cost of higher routing overhead.
{"title":"Traffic-Aware and Low-Overhead Routing Protocol for MANETs","authors":"Mohammad S. Alsheakhali, F. Awad","doi":"10.1109/WD.2008.4812867","DOIUrl":"https://doi.org/10.1109/WD.2008.4812867","url":null,"abstract":"In this paper, a new routing protocol, called traffic-aware and low-overhead routing protocol (TALORP) is proposed. The TALORP protocol, which is an enhancements of the low-overhead routing protocol (LORP), uses backup routes to mitigate the flooding problem that is frequently used to repair link failures. It also takes into account the traffic flows on different paths toward the destination in order to select the shortest and the least-congested path. The simulation results demonstrated that TALORP achieves better performance compared to LORP under all traffic conditions in terms of packet delivery ratio and end-to-end delay but at the cost of higher routing overhead.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. O. Alayyan, Y. Leung, A. Zoubir, R. Shubair, Omar al-Ketbi
We introduce blind channel identification and equalization for orthogonal frequency division multiplexing (OFDM) system without using a guard interval (GI). Inter-symbol-interference (ISI) is significantly reduced by truncation method. To perform channel identification, Subspace and Maximum Likelihood methods are proposed. To achieve enhanced performance and robustness to channel frequency nulls, receiver diversity and OFDM is combined. The performance of the proposed system is illustrated by computer simulations.
{"title":"Blind channel identification and equalization for GI-less OFDM systems","authors":"F. O. Alayyan, Y. Leung, A. Zoubir, R. Shubair, Omar al-Ketbi","doi":"10.1109/WD.2008.4812827","DOIUrl":"https://doi.org/10.1109/WD.2008.4812827","url":null,"abstract":"We introduce blind channel identification and equalization for orthogonal frequency division multiplexing (OFDM) system without using a guard interval (GI). Inter-symbol-interference (ISI) is significantly reduced by truncation method. To perform channel identification, Subspace and Maximum Likelihood methods are proposed. To achieve enhanced performance and robustness to channel frequency nulls, receiver diversity and OFDM is combined. The performance of the proposed system is illustrated by computer simulations.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124647531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the new area of heterogeneous environments, roaming users, using multi-interface mobile terminals, need to access to services anytime and anywhere. For that, a seamless vertical handover has to be considered. In our paper, we propose a 3G/UMTS-WLAN loosely-coupled interworking architecture with mobile IP as a service continuity solution. We focus on a mobile-controlled vertical handover management scheme. Our solution chooses the best access network according to user preferences and it maintains the ongoing session. It has several advantages to be simple and to generate minor changes at the network side. Moreover, MIP-based handover execution procedure is prepared thanks to a handover decision taken at the mobile side. The scheme proposes an interesting answer to intersystem and inter-domain mobility management issues. Finally, a simulation model is developed to validate the feasibility of the proposed 3G/UMTS-WLAN architecture.
{"title":"A mobile-controlled handover management scheme in a loosely-coupled 3G-WLAN interworking architecture","authors":"Meriem Kassar, Amel Achour, B. Kervella","doi":"10.1109/WD.2008.4812918","DOIUrl":"https://doi.org/10.1109/WD.2008.4812918","url":null,"abstract":"In the new area of heterogeneous environments, roaming users, using multi-interface mobile terminals, need to access to services anytime and anywhere. For that, a seamless vertical handover has to be considered. In our paper, we propose a 3G/UMTS-WLAN loosely-coupled interworking architecture with mobile IP as a service continuity solution. We focus on a mobile-controlled vertical handover management scheme. Our solution chooses the best access network according to user preferences and it maintains the ongoing session. It has several advantages to be simple and to generate minor changes at the network side. Moreover, MIP-based handover execution procedure is prepared thanks to a handover decision taken at the mobile side. The scheme proposes an interesting answer to intersystem and inter-domain mobility management issues. Finally, a simulation model is developed to validate the feasibility of the proposed 3G/UMTS-WLAN architecture.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126973463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}