首页 > 最新文献

2009 IEEE International Conference on Communications Workshops最新文献

英文 中文
The Effect of VII Market Penetration on Safety and Efficiency of Transportation Networks VII市场渗透率对交通网络安全与效率的影响
Pub Date : 2009-06-14 DOI: 10.1109/ICCW.2009.5208069
M. Nekoui, H. Pishro-Nik
The introduction of the Vehicle Infrastructure Inte- gration (VII) initiative by the US Department of Transportation (USDOT) has recently attracted the attention of researchers and given rise to a plethora of studies, each one seeking to enhance the safety and efficiency of transportation networks in one way or another. Moreover, vehicles communicating with each other and with the infrastructure, render their drivers with more information on their surroundings, extending the horizon of drivers and making them more vigilant to face the unexpected. In this study, we provide a mathematical framework which foretells the effect of deploying VII-enabled vehicles, such as VII-assisted and VII-automated, on the overall safety and efficiency. We show that inter-vehicular communications improves the throughput of vehicles by reducing the Perception-Reaction times of drivers. Furthermore, we exhibit that this is obtained without needing to compromise over safety requirements. Our framework can be utilized by decision makers to anticipate the effect of VII on transportation networks prior to their real-life deployment. Index Terms—Vehicular Ad-Hoc Networks (VANETs), Vehicle- Infrastructure Integration (VII), Dedicated Short Range Commu- nications (DSRC), Perception-Reaction (P-R) time.
美国运输部(USDOT)推出的车辆基础设施集成(VII)计划最近引起了研究人员的注意,并引发了大量研究,每一项研究都试图以某种方式提高交通网络的安全性和效率。此外,车辆之间以及与基础设施之间的通信,使驾驶员能够获得更多关于周围环境的信息,扩展驾驶员的视野,使他们更加警惕,以面对意外情况。在本研究中,我们提供了一个数学框架来预测部署支持vii的车辆(如vii辅助和vii自动)对整体安全性和效率的影响。我们表明,通过减少驾驶员的感知-反应时间,车际通信提高了车辆的吞吐量。此外,我们证明这是在不需要妥协安全要求的情况下获得的。我们的框架可以被决策者用来预测VII在实际部署之前对交通网络的影响。索引术语:车辆自组织网络(VANETs),车辆-基础设施集成(VII),专用短程通信(DSRC),感知-反应(P-R)时间。
{"title":"The Effect of VII Market Penetration on Safety and Efficiency of Transportation Networks","authors":"M. Nekoui, H. Pishro-Nik","doi":"10.1109/ICCW.2009.5208069","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208069","url":null,"abstract":"The introduction of the Vehicle Infrastructure Inte- gration (VII) initiative by the US Department of Transportation (USDOT) has recently attracted the attention of researchers and given rise to a plethora of studies, each one seeking to enhance the safety and efficiency of transportation networks in one way or another. Moreover, vehicles communicating with each other and with the infrastructure, render their drivers with more information on their surroundings, extending the horizon of drivers and making them more vigilant to face the unexpected. In this study, we provide a mathematical framework which foretells the effect of deploying VII-enabled vehicles, such as VII-assisted and VII-automated, on the overall safety and efficiency. We show that inter-vehicular communications improves the throughput of vehicles by reducing the Perception-Reaction times of drivers. Furthermore, we exhibit that this is obtained without needing to compromise over safety requirements. Our framework can be utilized by decision makers to anticipate the effect of VII on transportation networks prior to their real-life deployment. Index Terms—Vehicular Ad-Hoc Networks (VANETs), Vehicle- Infrastructure Integration (VII), Dedicated Short Range Commu- nications (DSRC), Perception-Reaction (P-R) time.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128736598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Network Virtualization from a Signaling Perspective 信令视角下的网络虚拟化
Pub Date : 2009-06-14 DOI: 10.1109/ICCW.2009.5207978
R. Bless, C. Werle
The use of network virtualization promises additional flexibility and opens up many opportunities for deploying future network architectures. But the increased flexibility creates additional costs with respect to management and control as well as new issues that need to be addressed. In this paper, we describe a framework that allows for dynamic setup of virtual networks and we point out required mechanisms, interfaces, and protocols. Additionally, we take into account runtime aspects by examining control interfaces and signaling protocols necessary for the management of virtual networks and the attachment of end users.
网络虚拟化的使用保证了额外的灵活性,并为部署未来的网络架构提供了许多机会。但是,灵活性的增加在管理和控制方面产生了额外的成本以及需要解决的新问题。在本文中,我们描述了一个允许动态设置虚拟网络的框架,并指出了所需的机制、接口和协议。此外,我们通过检查管理虚拟网络和终端用户的附件所需的控制接口和信令协议来考虑运行时方面。
{"title":"Network Virtualization from a Signaling Perspective","authors":"R. Bless, C. Werle","doi":"10.1109/ICCW.2009.5207978","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5207978","url":null,"abstract":"The use of network virtualization promises additional flexibility and opens up many opportunities for deploying future network architectures. But the increased flexibility creates additional costs with respect to management and control as well as new issues that need to be addressed. In this paper, we describe a framework that allows for dynamic setup of virtual networks and we point out required mechanisms, interfaces, and protocols. Additionally, we take into account runtime aspects by examining control interfaces and signaling protocols necessary for the management of virtual networks and the attachment of end users.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116100213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Clone-Resistant Network Unit Identification 抗克隆网络单元识别
Pub Date : 2009-06-14 DOI: 10.1109/ICCW.2009.5208013
W. Adi
Contemporary networks are lacking resilient identification for their participating entities as switches, hosts, terminals, mobile devices and others. Replacement attacks on such units represent a major security gap in many environments and applications. A provable and un-clonable physical unit identity was not an essential security requirement in most contemporary networks due to flexibility requirements avoiding expected increase in hardware complexity and the difficulty to cope with additional system identity. There has been also no essential necessarily for it in most practical operation. However, this missing physical security represents today serious threat as false network units could allow untraceable attacks. Once a network entity can be physically replaced by another fake unit, many denial of service attacks, intrusion and man-in-the-middle attacks become quite easy. Recently, "Physical Unclonable Functions" PUFs were proposed to generate unclonable physical identity (6), (7), (8). PUFs however are costly, complex to manage and exhibit inconsistent reproducibility due to aging and drifts as in voltage and temperature. In this work a practically hard to clone structures for network physical entities are proposed based on clone-resistant evolving dynamic identity concept. Units can be securely traced in an operating network in such a way that it is virtually infeasible to clone due to practical reasons. The proposed technique is combining the time scale as a true irreversible "one-way function" together with the transaction profile in the system environment to come up with practically unclonable identity after a short operation time. The paper demonstrates a sample scenario including new core cryptographic primitives towards creating and managing such clone-resistant identity in contemporary network units. Keywords-identification; network security; clone-resistant Identity; authentication
当代网络缺乏对交换机、主机、终端、移动设备等参与实体的弹性识别。对这些单元的替换攻击在许多环境和应用程序中代表了一个主要的安全漏洞。在大多数当代网络中,可证明的和不可克隆的物理单元标识并不是基本的安全要求,因为灵活性要求避免硬件复杂性的预期增加和处理额外系统标识的困难。在大多数实际操作中,也没有必要使用它。然而,这种缺失的物理安全性在今天代表了严重的威胁,因为虚假的网络单元可能允许无法追踪的攻击。一旦网络实体可以被另一个假单元物理替换,许多拒绝服务攻击、入侵和中间人攻击就变得相当容易。最近,“物理不可克隆功能”puf被提出来产生不可克隆的物理身份(6),(7),(8)。然而,puf成本高,管理复杂,并且由于老化和电压和温度的漂移而表现出不一致的可重复性。本文基于抗克隆演化动态同一性概念,提出了一种难以克隆的网络物理实体结构。单元可以在运行网络中安全地跟踪,这样由于实际原因,克隆实际上是不可行的。所提出的技术是将时间尺度作为真正不可逆的“单向函数”与系统环境中的事务概况相结合,在短时间内得到实际上不可克隆的身份。本文演示了一个示例场景,包括在当代网络单元中创建和管理这种抗克隆身份的新核心加密原语。Keywords-identification;网络安全;clone-resistant身份;身份验证
{"title":"Clone-Resistant Network Unit Identification","authors":"W. Adi","doi":"10.1109/ICCW.2009.5208013","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208013","url":null,"abstract":"Contemporary networks are lacking resilient identification for their participating entities as switches, hosts, terminals, mobile devices and others. Replacement attacks on such units represent a major security gap in many environments and applications. A provable and un-clonable physical unit identity was not an essential security requirement in most contemporary networks due to flexibility requirements avoiding expected increase in hardware complexity and the difficulty to cope with additional system identity. There has been also no essential necessarily for it in most practical operation. However, this missing physical security represents today serious threat as false network units could allow untraceable attacks. Once a network entity can be physically replaced by another fake unit, many denial of service attacks, intrusion and man-in-the-middle attacks become quite easy. Recently, \"Physical Unclonable Functions\" PUFs were proposed to generate unclonable physical identity (6), (7), (8). PUFs however are costly, complex to manage and exhibit inconsistent reproducibility due to aging and drifts as in voltage and temperature. In this work a practically hard to clone structures for network physical entities are proposed based on clone-resistant evolving dynamic identity concept. Units can be securely traced in an operating network in such a way that it is virtually infeasible to clone due to practical reasons. The proposed technique is combining the time scale as a true irreversible \"one-way function\" together with the transaction profile in the system environment to come up with practically unclonable identity after a short operation time. The paper demonstrates a sample scenario including new core cryptographic primitives towards creating and managing such clone-resistant identity in contemporary network units. Keywords-identification; network security; clone-resistant Identity; authentication","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116413229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Sleep Mode Operation for IEEE 802.16m Advanced WMAN IEEE 802.16m高级无线城域网睡眠模式的性能分析
Pub Date : 2009-06-14 DOI: 10.1109/ICCW.2009.5208113
S. Baek, J. Son, B. D. Choi
We mathematically analyze a sleep mode operation proposed by Samsung for IEEE 802.16 m. The sleep mode operation for downlink traffic is modeled as a 2-dimensional Markov chain. We obtain the power consumption of a mobile station. We show that the power consumption of a mobile station decreases as the sleep cycle increases and the analytical results also match with the simulation results very well.
我们从数学上分析了三星针对IEEE 802.16 m提出的睡眠模式操作。下行流量的休眠模式操作被建模为一个二维马尔可夫链。我们得到了一个移动站的功耗。结果表明,移动基站的功耗随睡眠周期的增加而降低,分析结果与仿真结果吻合良好。
{"title":"Performance Analysis of Sleep Mode Operation for IEEE 802.16m Advanced WMAN","authors":"S. Baek, J. Son, B. D. Choi","doi":"10.1109/ICCW.2009.5208113","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208113","url":null,"abstract":"We mathematically analyze a sleep mode operation proposed by Samsung for IEEE 802.16 m. The sleep mode operation for downlink traffic is modeled as a 2-dimensional Markov chain. We obtain the power consumption of a mobile station. We show that the power consumption of a mobile station decreases as the sleep cycle increases and the analytical results also match with the simulation results very well.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114648364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Weight Clustering Histogram Equalization for Medical Image Enhancement 基于权重聚类直方图均衡化的医学图像增强
Pub Date : 2009-06-14 DOI: 10.1109/ICCW.2009.5208082
N. Sengee, B. Bazarragchaa, T. Y. Kim, H. Choi
Contrast enhancement is important and useful for medical images. One of the widely accepted contrast enhancement method is histogram equalization (GHE). Although GHE achieves comparatively better performance on almost all types of image, GHE sometimes produces excessive visual deterioration. Some extensions of GHE are developed, however these extensions sometimes either fail to enhance the visualization or over enhance contrast of the original image. By over-enhancing contrast, some important information may be lost. Therefore we propose a new method called "Weight Clustering Histogram Equalization" (WCHE). WCHE assigns each non-zero bin of the original image's histogram to a separate cluster, and computes each cluster's weight. The cluster numbers are reduced by three suggesting criteria. Then, the clusters acquire the same partitions as the result image histogram. Finally, transformation functions for each cluster's sub-histogram are calculated based on the traditional GHE method in the new acquired partitions of the result image histogram, and the sub-histogram's gray levels are mapped to the result image by the corresponding transformation functions. We showed experimentally that WCHE bas been validated with some numerical results.
对比度增强对于医学图像来说是非常重要和有用的。一种被广泛接受的对比度增强方法是直方图均衡化(GHE)。虽然GHE在几乎所有类型的图像上都取得了相对较好的性能,但GHE有时会产生过度的视觉退化。人们开发了一些GHE扩展,但是这些扩展有时不能增强原始图像的可视化或过度增强原始图像的对比度。过度增强对比度,可能会丢失一些重要信息。为此,我们提出了一种新的加权聚类直方图均衡化方法(WCHE)。WCHE将原始图像直方图的每个非零bin分配给单独的聚类,并计算每个聚类的权值。通过三个建议标准减少聚类数。然后,聚类获得与结果图像直方图相同的分区。最后,在新获得的结果图像直方图分区中,基于传统的GHE方法计算每个聚类的子直方图的变换函数,并通过相应的变换函数将子直方图的灰度级映射到结果图像上。我们通过实验验证了WCHE的有效性,并给出了一些数值结果。
{"title":"Weight Clustering Histogram Equalization for Medical Image Enhancement","authors":"N. Sengee, B. Bazarragchaa, T. Y. Kim, H. Choi","doi":"10.1109/ICCW.2009.5208082","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208082","url":null,"abstract":"Contrast enhancement is important and useful for medical images. One of the widely accepted contrast enhancement method is histogram equalization (GHE). Although GHE achieves comparatively better performance on almost all types of image, GHE sometimes produces excessive visual deterioration. Some extensions of GHE are developed, however these extensions sometimes either fail to enhance the visualization or over enhance contrast of the original image. By over-enhancing contrast, some important information may be lost. Therefore we propose a new method called \"Weight Clustering Histogram Equalization\" (WCHE). WCHE assigns each non-zero bin of the original image's histogram to a separate cluster, and computes each cluster's weight. The cluster numbers are reduced by three suggesting criteria. Then, the clusters acquire the same partitions as the result image histogram. Finally, transformation functions for each cluster's sub-histogram are calculated based on the traditional GHE method in the new acquired partitions of the result image histogram, and the sub-histogram's gray levels are mapped to the result image by the corresponding transformation functions. We showed experimentally that WCHE bas been validated with some numerical results.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114668779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An Optimal Opportunistic Spectrum Access Approach 一种最佳机会频谱接入方法
Pub Date : 2009-06-14 DOI: 10.1109/ICCW.2009.5208061
Q. Xiao, Q. Gao, L. Xiao, S. Zhou, J. Wang
Opportunistic spectrum access system allows the secondary user to access spectrum holes not being utilized by the primary user. Traditional opportunistic spectrum access approaches only sense and utilize current spectrum holes. This can result in uncontrollable collision probability, which exceed the maximum collision probability allowed by the primary user network. In this paper, we consider a cognitive radio system with one primary channel and one secondary user, and then we introduce a channel-usage pattern model and a fundamental access scheme in this system. On the basis of this model and fundamental access scheme, we study optimal opportunistic spectrum access problem and formulate it as an optimization problem that the secondary user maximizes spectrum holes utilization under the constraint of collision tolerable level. And then we solve this optimization problem in the case that the idle period is exponential distribution. Theoretical analysis and simulation results both show that the optimal opportunistic spectrum access approach can maximize spectrum holes utilization under the constraint of collision tolerable level.
机会性频谱接入系统允许从用户接入主用户未利用的频谱孔。传统的机会性频谱接入方法只能感知和利用当前的频谱空洞。这可能导致不可控的碰撞概率,超过主用户网络允许的最大碰撞概率。本文考虑了一个具有一个主信道和一个从用户的认知无线电系统,在此基础上提出了该系统的信道使用模式模型和基本接入方案。在此模型和基本接入方案的基础上,研究了最优机会性频谱接入问题,并将其表述为二次用户在碰撞容忍水平约束下频谱孔利用率最大化的优化问题。然后我们在空闲时间是指数分布的情况下解决这个优化问题。理论分析和仿真结果均表明,在碰撞容忍水平约束下,最优机会频谱接入方法能最大限度地利用频谱空穴。
{"title":"An Optimal Opportunistic Spectrum Access Approach","authors":"Q. Xiao, Q. Gao, L. Xiao, S. Zhou, J. Wang","doi":"10.1109/ICCW.2009.5208061","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208061","url":null,"abstract":"Opportunistic spectrum access system allows the secondary user to access spectrum holes not being utilized by the primary user. Traditional opportunistic spectrum access approaches only sense and utilize current spectrum holes. This can result in uncontrollable collision probability, which exceed the maximum collision probability allowed by the primary user network. In this paper, we consider a cognitive radio system with one primary channel and one secondary user, and then we introduce a channel-usage pattern model and a fundamental access scheme in this system. On the basis of this model and fundamental access scheme, we study optimal opportunistic spectrum access problem and formulate it as an optimization problem that the secondary user maximizes spectrum holes utilization under the constraint of collision tolerable level. And then we solve this optimization problem in the case that the idle period is exponential distribution. Theoretical analysis and simulation results both show that the optimal opportunistic spectrum access approach can maximize spectrum holes utilization under the constraint of collision tolerable level.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127303959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Optimal Energy Savings in Cellular Access Networks 蜂窝接入网的最佳节能
Pub Date : 2009-06-14 DOI: 10.1109/ICCW.2009.5208045
M. Marsan, L. Chiaraviglio, D. Ciullo, M. Meo
In this paper we study with simple analytical models the energy-aware management of cellular access networks, trying to characterize the amount of energy that can be saved by reducing the number of active cells during the periods when they are not necessary because traffic is low. When some cells are switched off, radio coverage and service provisioning are taken care of by the cells that remain active, so as to guarantee that service is available over the whole area. We show how to optimize the energy saving, first assuming that any fraction of cells can be turned off, and then accounting for the constraints resulting from the cell layout.
在本文中,我们用简单的分析模型研究了蜂窝接入网的能量感知管理,试图描述由于流量低而不需要减少活跃单元的数量可以节省的能量量。当一些小区关闭时,无线电覆盖和服务供应由保持活动的小区负责,以保证整个区域都有服务可用。我们将展示如何优化节能,首先假设可以关闭单元的任何部分,然后考虑由单元布局产生的约束。
{"title":"Optimal Energy Savings in Cellular Access Networks","authors":"M. Marsan, L. Chiaraviglio, D. Ciullo, M. Meo","doi":"10.1109/ICCW.2009.5208045","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208045","url":null,"abstract":"In this paper we study with simple analytical models the energy-aware management of cellular access networks, trying to characterize the amount of energy that can be saved by reducing the number of active cells during the periods when they are not necessary because traffic is low. When some cells are switched off, radio coverage and service provisioning are taken care of by the cells that remain active, so as to guarantee that service is available over the whole area. We show how to optimize the energy saving, first assuming that any fraction of cells can be turned off, and then accounting for the constraints resulting from the cell layout.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127580191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 698
Evaluation of Medium Access Technologies for Next Generation Millimeter-Wave WLAN and WPAN 下一代毫米波WLAN和WPAN的介质接入技术评价
Pub Date : 2009-06-14 DOI: 10.1109/ICCW.2009.5208112
C. Cordeiro
The wide harmonized spectrum in the unlicensed millimeter-wave (60 GHz) band has been receiving increased attention, since it enables multi-Gbps data rates suitable for applications of next generation WLAN and WPAN such as wireless display, high-speed device synchronization, and the evolution of Wi-Fi. As such, the industry is in the process of defining new 60 GHz PHY and MAC technologies that can serve a wide variety of applications and usages, as to avoid the proliferation of non-coexistent devices operating in this unoccupied spectrum. Therefore, in this paper we discuss the challenges and trade-offs with three of the most "popular" medium access schemes, namely, CSMA/CA, TDMA, and polling, in meeting the diverse requirements of the applications and usages envisioned for the 60 GHz band. We also analyze the throughput performance of each access technology and discuss a hybrid MAC that takes advantage of each access mechanism to meet the requirements of the envisioned usages and applications of 60 GHz WLAN and WPAN.
未经许可的毫米波(60ghz)频段的宽协调频谱受到越来越多的关注,因为它可以实现适合下一代WLAN和WPAN应用的多gbps数据速率,例如无线显示、高速设备同步和Wi-Fi的发展。因此,业界正在定义新的60 GHz PHY和MAC技术,这些技术可以服务于各种应用和用途,以避免在这一未占用的频谱中运行的非共存设备的扩散。因此,在本文中,我们讨论了三种最“流行”的媒体接入方案(即CSMA/CA, TDMA和轮询)在满足60 GHz频段应用和用途的不同要求时所面临的挑战和权衡。我们还分析了每种接入技术的吞吐量性能,并讨论了一种混合MAC,该MAC利用每种接入机制来满足60 GHz WLAN和WPAN的预期使用和应用要求。
{"title":"Evaluation of Medium Access Technologies for Next Generation Millimeter-Wave WLAN and WPAN","authors":"C. Cordeiro","doi":"10.1109/ICCW.2009.5208112","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208112","url":null,"abstract":"The wide harmonized spectrum in the unlicensed millimeter-wave (60 GHz) band has been receiving increased attention, since it enables multi-Gbps data rates suitable for applications of next generation WLAN and WPAN such as wireless display, high-speed device synchronization, and the evolution of Wi-Fi. As such, the industry is in the process of defining new 60 GHz PHY and MAC technologies that can serve a wide variety of applications and usages, as to avoid the proliferation of non-coexistent devices operating in this unoccupied spectrum. Therefore, in this paper we discuss the challenges and trade-offs with three of the most \"popular\" medium access schemes, namely, CSMA/CA, TDMA, and polling, in meeting the diverse requirements of the applications and usages envisioned for the 60 GHz band. We also analyze the throughput performance of each access technology and discuss a hybrid MAC that takes advantage of each access mechanism to meet the requirements of the envisioned usages and applications of 60 GHz WLAN and WPAN.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124802178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A Fractional Soft Handover Scheme for 3GPP LTE-Advanced System 3GPP LTE-Advanced系统的分式软切换方案
Pub Date : 2009-06-14 DOI: 10.1109/ICCW.2009.5208019
J. Chang, Yuan Li, Shulan Feng, Haiguang Wang, Chao Sun, Philipp Zhang
Mobility enhancement and carrier aggregation are important aspects to investigate as part of the LTE-Advanced study. Hard handover is the only handover scheme in LTE Rel-8. Generally, hard handover is fairly simple, but its outage probability is high and the handover procedure may be unreliable, especially for VoIP service. In this paper, we propose a fractional soft handover scheme based on the carrier aggregation. The main idea is to partially perform soft handover for VoIP, but non-VoIP service is only transmitted from source eNodeB or target eNodeB. The theoretical analysis and simulation results show that the proposed fractional soft handover scheme not only attains the lowest handover outage probability, but also improve the reliability of VoIP service.
移动性增强和载波聚合是LTE-Advanced研究的重要方面。硬切换是LTE Rel-8中唯一的切换方式。一般来说,硬切换比较简单,但其中断概率高,切换过程可能不可靠,特别是对于VoIP业务。本文提出了一种基于载波聚合的分式软切换方案。主要思想是对VoIP进行部分软切换,而非VoIP业务仅从源eNodeB或目标eNodeB传输。理论分析和仿真结果表明,提出的分式软切换方案不仅实现了最低的切换中断概率,而且提高了VoIP业务的可靠性。
{"title":"A Fractional Soft Handover Scheme for 3GPP LTE-Advanced System","authors":"J. Chang, Yuan Li, Shulan Feng, Haiguang Wang, Chao Sun, Philipp Zhang","doi":"10.1109/ICCW.2009.5208019","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208019","url":null,"abstract":"Mobility enhancement and carrier aggregation are important aspects to investigate as part of the LTE-Advanced study. Hard handover is the only handover scheme in LTE Rel-8. Generally, hard handover is fairly simple, but its outage probability is high and the handover procedure may be unreliable, especially for VoIP service. In this paper, we propose a fractional soft handover scheme based on the carrier aggregation. The main idea is to partially perform soft handover for VoIP, but non-VoIP service is only transmitted from source eNodeB or target eNodeB. The theoretical analysis and simulation results show that the proposed fractional soft handover scheme not only attains the lowest handover outage probability, but also improve the reliability of VoIP service.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130636318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
On Error Probabilities for DS-CDMA/MRC in Frequency Selective Nakagami Fading 频率选择性中上衰落中DS-CDMA/MRC的误差概率研究
Pub Date : 2009-06-14 DOI: 10.1109/ICCW.2009.5208118
M. Rahman, S. Sasaki, J. Wang, T. Baykaş, C. Sum, R. Funada, H. Harada, S. Kato
An in-depth yet simple analysis is presented for binary direct sequence code division multiple access (DS-CDMA) systems considering a frequency selective Nakagami fading channel and maximal ratio combining (MRC) receiver. The inevitable inter-symbol interference as well as multiple access interference from simultaneous users are modeled elegantly and their characteristic functions (CF) are developed. Utilizing the CFs, the exact bit error probabilities are developed following the CF method of error rate analysis that claims the honor to be the first-to-publish reliable result for such channel and receiver. The CF based exact error rate is less computationally intensive than that can be obtained by traditional methods of approximation. The same method also lets us develop a new simpler approximate error rate. The exact method is utilized to investigate the range of parameters where approximations (existing and the new) would be accurate.
对考虑频率选择性中川衰落信道和最大比组合(MRC)接收机的二进制直接序列码分多址(DS-CDMA)系统进行了深入而简单的分析。对不可避免的码间干扰和同时用户的多址干扰进行了简洁的建模,并给出了它们的特征函数。利用CF,准确的误码率概率是根据误码率分析的CF方法开发的,该方法荣幸地成为首次发布此类信道和接收器的可靠结果。与传统的近似方法相比,基于CF的精确错误率的计算量更小。同样的方法也让我们开发了一个新的更简单的近似错误率。精确的方法被用来研究参数的范围,其中近似值(现有的和新的)是准确的。
{"title":"On Error Probabilities for DS-CDMA/MRC in Frequency Selective Nakagami Fading","authors":"M. Rahman, S. Sasaki, J. Wang, T. Baykaş, C. Sum, R. Funada, H. Harada, S. Kato","doi":"10.1109/ICCW.2009.5208118","DOIUrl":"https://doi.org/10.1109/ICCW.2009.5208118","url":null,"abstract":"An in-depth yet simple analysis is presented for binary direct sequence code division multiple access (DS-CDMA) systems considering a frequency selective Nakagami fading channel and maximal ratio combining (MRC) receiver. The inevitable inter-symbol interference as well as multiple access interference from simultaneous users are modeled elegantly and their characteristic functions (CF) are developed. Utilizing the CFs, the exact bit error probabilities are developed following the CF method of error rate analysis that claims the honor to be the first-to-publish reliable result for such channel and receiver. The CF based exact error rate is less computationally intensive than that can be obtained by traditional methods of approximation. The same method also lets us develop a new simpler approximate error rate. The exact method is utilized to investigate the range of parameters where approximations (existing and the new) would be accurate.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130652049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 IEEE International Conference on Communications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1