首页 > 最新文献

2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems最新文献

英文 中文
CETT: A cross layer routing metric for cooperative wireless Ad hoc networks CETT:用于协作无线自组织网络的跨层路由度量
Kiron Vijayasankar, L. N. Kannan, M. Tacca, A. Fumagalli
Cooperative link layer protocols are typically used in single hop networks to enhance the link layer capabilities using a special node, called relay. In multi-hop networks, a frame is sent from an original source to the final destination through a series of intermediate nodes. The performance benefits of cooperation at link layer can be channeled into multi-hop networks as well. This paper addresses the challenge in finding multi-hop routes accounting for relays at the link layer by proposing the cooperative expected transmission time (CETT) metric. CETT is used to compute the route, i.e., the sequence of intermediate nodes in terms of the minimum end-to-end average transmission time taking into account the cooperative nature of the link layer.
协作链路层协议通常用于单跳网络,通过使用称为中继的特殊节点来增强链路层功能。在多跳网络中,帧从原始源通过一系列中间节点发送到最终目的地。链路层合作的性能优势也可以引入到多跳网络中。本文通过提出合作预期传输时间(CETT)度量来解决在链路层寻找考虑中继的多跳路由的挑战。CETT用于计算路由,即考虑链路层的协作性,以最小端到端平均传输时间计算中间节点的顺序。
{"title":"CETT: A cross layer routing metric for cooperative wireless Ad hoc networks","authors":"Kiron Vijayasankar, L. N. Kannan, M. Tacca, A. Fumagalli","doi":"10.1109/MASCOT.2009.5366781","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366781","url":null,"abstract":"Cooperative link layer protocols are typically used in single hop networks to enhance the link layer capabilities using a special node, called relay. In multi-hop networks, a frame is sent from an original source to the final destination through a series of intermediate nodes. The performance benefits of cooperation at link layer can be channeled into multi-hop networks as well. This paper addresses the challenge in finding multi-hop routes accounting for relays at the link layer by proposing the cooperative expected transmission time (CETT) metric. CETT is used to compute the route, i.e., the sequence of intermediate nodes in terms of the minimum end-to-end average transmission time taking into account the cooperative nature of the link layer.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A linear method for calibrating LIDAR-and-camera systems 一种校准激光雷达和相机系统的线性方法
A. Willis, M.J. Zapata, J. Conrad
This article describes a multimedia system consisting of two sensors: (1) a laser range scanner (LIDAR) and (2) a conventional digital camera. Our work specifies a mathematical calibration model that allows for this data to be explicitly integrated. Data integration is accomplished by calibrating the system, i.e., estimating for each variable of the model for a specific LIDAR-and-camera pair. Our approach requires detection of feature points in both the LIDAR scan and the digital images. Using correspondences between feature points, we can then estimate the model variables that specify an explicit mathematical relationship between sensed (x, y, z) LIDAR points and (x, y) digital image positions. Our system is designed for 3D line scanners, i.e., scanners that detect positions that lie in a 3D plane which requires some special theoretical and experimental treatment. Results are provided for simulations of the system in a virtual environment and for a real LIDAR-and-camera system consisting of a SICK LMS200 and an inexpensive USB web-camera. Calibrated systems can integrate the data in real-time which is of particular use for autonomous vehicular and robotic navigation.
本文介绍了一个由两个传感器组成的多媒体系统:(1)激光测距仪(LIDAR)和(2)传统数码相机。我们的工作指定了一个数学校准模型,该模型允许显式集成该数据。数据集成是通过校准系统来完成的,即对特定激光雷达和相机对模型的每个变量进行估计。我们的方法需要在激光雷达扫描和数字图像中检测特征点。利用特征点之间的对应关系,我们可以估计模型变量,这些变量指定了感测(x, y, z)激光雷达点与(x, y)数字图像位置之间的显式数学关系。我们的系统是为3D线扫描仪设计的,即扫描仪检测位于3D平面上的位置,这需要一些特殊的理论和实验处理。给出了该系统在虚拟环境中的仿真结果,以及由SICK LMS200和廉价USB网络摄像机组成的真实激光雷达和摄像机系统的仿真结果。经过校准的系统可以实时整合数据,这在自动驾驶汽车和机器人导航中特别有用。
{"title":"A linear method for calibrating LIDAR-and-camera systems","authors":"A. Willis, M.J. Zapata, J. Conrad","doi":"10.1109/MASCOT.2009.5366801","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366801","url":null,"abstract":"This article describes a multimedia system consisting of two sensors: (1) a laser range scanner (LIDAR) and (2) a conventional digital camera. Our work specifies a mathematical calibration model that allows for this data to be explicitly integrated. Data integration is accomplished by calibrating the system, i.e., estimating for each variable of the model for a specific LIDAR-and-camera pair. Our approach requires detection of feature points in both the LIDAR scan and the digital images. Using correspondences between feature points, we can then estimate the model variables that specify an explicit mathematical relationship between sensed (x, y, z) LIDAR points and (x, y) digital image positions. Our system is designed for 3D line scanners, i.e., scanners that detect positions that lie in a 3D plane which requires some special theoretical and experimental treatment. Results are provided for simulations of the system in a virtual environment and for a real LIDAR-and-camera system consisting of a SICK LMS200 and an inexpensive USB web-camera. Calibrated systems can integrate the data in real-time which is of particular use for autonomous vehicular and robotic navigation.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Modeling and simulating a path planning and obstacle avoidance algorithm for an autonomous robotic vehicle 自主机器人车辆路径规划与避障算法建模与仿真
Sharayu Ghangrekar, J. Conrad
Path planning in robotics deals with developing the logic for the navigation of a robot. The implementation details of most previous algorithms are proprietary to specific organizations. The requirement of a customized strategy for collision free and concerted navigation of an All-Terrain Vehicle (ATV) led to the activities of this research. As a part of this research an algorithm has been developed and visually simulated. The algorithm is evolutionary and capable of path planning for ATVs in the presence of completely known and newly-discovered obstacles. This algorithm helps the ATV model to maneuver in an open field in a specific pattern and avoid obstacles, if any, along its path. The algorithm is implemented and simulated using C and WINAPI. As a result, given the data of known obstacles and the field, the virtually-modeled ATV can maneuver in a systematic and optimum manner towards its goal by avoiding all the obstacles in its path.
机器人技术中的路径规划涉及开发机器人导航的逻辑。以前大多数算法的实现细节都是特定组织专有的。针对全地形车辆(ATV)无碰撞协调导航的定制化策略需求,开展了本课题的研究。作为本研究的一部分,我们开发了一种算法并进行了可视化仿真。该算法具有进化性,能够在完全已知和新发现障碍物的情况下进行全地形车的路径规划。该算法可以帮助ATV模型以特定的模式在开放区域中机动,并避开路径上的障碍物。用C语言和WINAPI对算法进行了实现和仿真。因此,在给定已知障碍物和场地数据的情况下,虚拟建模的ATV可以通过避开路径上的所有障碍物,以系统和最佳的方式向目标移动。
{"title":"Modeling and simulating a path planning and obstacle avoidance algorithm for an autonomous robotic vehicle","authors":"Sharayu Ghangrekar, J. Conrad","doi":"10.1109/MASCOT.2009.5366693","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366693","url":null,"abstract":"Path planning in robotics deals with developing the logic for the navigation of a robot. The implementation details of most previous algorithms are proprietary to specific organizations. The requirement of a customized strategy for collision free and concerted navigation of an All-Terrain Vehicle (ATV) led to the activities of this research. As a part of this research an algorithm has been developed and visually simulated. The algorithm is evolutionary and capable of path planning for ATVs in the presence of completely known and newly-discovered obstacles. This algorithm helps the ATV model to maneuver in an open field in a specific pattern and avoid obstacles, if any, along its path. The algorithm is implemented and simulated using C and WINAPI. As a result, given the data of known obstacles and the field, the virtually-modeled ATV can maneuver in a systematic and optimum manner towards its goal by avoiding all the obstacles in its path.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122639761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Modeling and test generation for worst-case performance evaluation of MAC protocols for wireless ad hoc networks 无线自组网MAC协议最坏情况性能评估建模与测试生成
S. Begum, A. Helmy, S. Gupta
We propose a novel framework to critically analyze a given MAC protocol for wireless ad hoc networks with respect to its correctness criteria and performance metrics. The framework is composed of wanted state generation and test scenario generation algorithms. The wanted state generation algorithm generates a set of conditions that meet our study objective. The test generation algorithm then generates complete test scenarios that satisfy our objective, e.g., minimize the value of a particular performance metric. The core of our search engine utilizes novel algorithms that use combinations of goal-oriented backward and forward search and implications as well as heuristics that enable the generation of worst case scenarios in manageable complexity for our practical purposes. We demonstrate the effectiveness of our approach by using our framework to analyze the worst case performance, in terms of throughput and fairness of IEEE 802.11 for ad hoc networks. For all topologies, the worst case scenarios generated by our framework show the worst performance among all scenarios that we generate. The scenarios generated by our framework include the scenarios typically used for performance evaluation of IEEE 802.11 protocol. The case study of IEEE 802.11 shows that the complexity of our novel algorithms are quite practical.
我们提出了一个新的框架来批判性地分析一个给定的MAC协议的无线自组织网络的正确性标准和性能指标。该框架由所需状态生成算法和测试场景生成算法组成。期望状态生成算法生成一组满足我们研究目标的条件。测试生成算法然后生成满足我们目标的完整测试场景,例如,最小化特定性能度量的值。我们的搜索引擎的核心利用了新颖的算法,结合了面向目标的向后和向前搜索和暗示,以及启发式,可以在可管理的复杂性下生成最坏的情况,以满足我们的实际目的。我们通过使用我们的框架来分析最坏情况下的性能(就自组织网络的IEEE 802.11的吞吐量和公平性而言)来证明我们方法的有效性。对于所有拓扑,我们的框架生成的最坏情况场景在我们生成的所有场景中表现出最差的性能。我们的框架生成的场景包括通常用于IEEE 802.11协议性能评估的场景。通过对IEEE 802.11的实例研究表明,本文提出的算法具有较强的实用性。
{"title":"Modeling and test generation for worst-case performance evaluation of MAC protocols for wireless ad hoc networks","authors":"S. Begum, A. Helmy, S. Gupta","doi":"10.1109/MASCOT.2009.5366667","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366667","url":null,"abstract":"We propose a novel framework to critically analyze a given MAC protocol for wireless ad hoc networks with respect to its correctness criteria and performance metrics. The framework is composed of wanted state generation and test scenario generation algorithms. The wanted state generation algorithm generates a set of conditions that meet our study objective. The test generation algorithm then generates complete test scenarios that satisfy our objective, e.g., minimize the value of a particular performance metric. The core of our search engine utilizes novel algorithms that use combinations of goal-oriented backward and forward search and implications as well as heuristics that enable the generation of worst case scenarios in manageable complexity for our practical purposes. We demonstrate the effectiveness of our approach by using our framework to analyze the worst case performance, in terms of throughput and fairness of IEEE 802.11 for ad hoc networks. For all topologies, the worst case scenarios generated by our framework show the worst performance among all scenarios that we generate. The scenarios generated by our framework include the scenarios typically used for performance evaluation of IEEE 802.11 protocol. The case study of IEEE 802.11 shows that the complexity of our novel algorithms are quite practical.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130352607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Device-transparent network-layer handoff for micro-mobility 用于微移动性的设备透明网络层切换
F. Guo, T. Chiueh
An emerging class of applications for enterprise wireless LANs (WLAN) is voice over IP (VoIP) applications, which impose a stringent requirement on end-to-end delay. Because access points on an enterprise WLAN tend to be associated with different IP subnets, support for network-layer handoff is indispensable. Moreover, the handoff frequency is expected to be much higher for WLANs than for cellular networks because the coverage of a WLAN access point is much smaller. Although mobile IP is a mature solution to the network-layer handoff problem, no known mobile IP implementation on IEEE 802.11 WLANs can reduce the handoff latency below 100 msec, a nominal requirement for VoIP applications. This paper describes a novel Ethernet-over-IP overlay network architecture that completely does away with network-layer handoff, and thus reduces the end-to-end handoff delay to that of link-layer handoff, which is supported by WLAN hardware directly. In addition, the proposed wireless overlay network (WON) architecture, which has been implemented in a commercial WLAN access point, represents the first mobility solution that allows a mobile device to maintain its network connections while roaming across different IP subnets without requiring any modification on the mobile device. As a result, the proposed architecture can automatically provide seamless network-layer handoff to a wide variety of mobile devices (such as PDA, portable, cell phone) running on different operating systems, as long as they are equipped with 802.11 network interface.
企业无线局域网(WLAN)的一种新兴应用是IP语音(VoIP)应用,它对端到端延迟提出了严格的要求。由于企业WLAN上的接入点往往与不同的IP子网相关联,因此对网络层切换的支持是必不可少的。此外,由于WLAN接入点的覆盖范围要小得多,因此预计WLAN的切换频率要比蜂窝网络高得多。虽然移动IP是解决网络层切换问题的成熟解决方案,但在IEEE 802.11 wlan上没有已知的移动IP实现可以将切换延迟降低到100毫秒以下,这是VoIP应用的标称要求。本文描述了一种全新的Ethernet-over-IP覆盖网络体系结构,该体系结构完全取消了网络层切换,从而将端到端切换延迟降低到链路层切换延迟,并直接由WLAN硬件支持。此外,所提出的无线覆盖网络(WON)架构(已在商用WLAN接入点中实现)代表了第一个移动解决方案,该解决方案允许移动设备在漫游不同IP子网时保持其网络连接,而无需对移动设备进行任何修改。因此,所提出的架构可以自动提供无缝的网络层切换到运行在不同操作系统上的各种移动设备(如PDA、便携式、蜂窝电话),只要它们配备了802.11网络接口。
{"title":"Device-transparent network-layer handoff for micro-mobility","authors":"F. Guo, T. Chiueh","doi":"10.1109/MASCOT.2009.5366648","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366648","url":null,"abstract":"An emerging class of applications for enterprise wireless LANs (WLAN) is voice over IP (VoIP) applications, which impose a stringent requirement on end-to-end delay. Because access points on an enterprise WLAN tend to be associated with different IP subnets, support for network-layer handoff is indispensable. Moreover, the handoff frequency is expected to be much higher for WLANs than for cellular networks because the coverage of a WLAN access point is much smaller. Although mobile IP is a mature solution to the network-layer handoff problem, no known mobile IP implementation on IEEE 802.11 WLANs can reduce the handoff latency below 100 msec, a nominal requirement for VoIP applications. This paper describes a novel Ethernet-over-IP overlay network architecture that completely does away with network-layer handoff, and thus reduces the end-to-end handoff delay to that of link-layer handoff, which is supported by WLAN hardware directly. In addition, the proposed wireless overlay network (WON) architecture, which has been implemented in a commercial WLAN access point, represents the first mobility solution that allows a mobile device to maintain its network connections while roaming across different IP subnets without requiring any modification on the mobile device. As a result, the proposed architecture can automatically provide seamless network-layer handoff to a wide variety of mobile devices (such as PDA, portable, cell phone) running on different operating systems, as long as they are equipped with 802.11 network interface.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A BitTorrent module for the OMNeT++ simulator omnet++模拟器的BitTorrent模块
K. Katsaros, V. Kemerlis, Charilaos Stais, G. Xylomenos
In the past few years numerous P2P file-sharing and content distribution systems have been designed, implemented, and evaluated via simulations, real world measurements, and mathematical analysis. Yet, only few of them have stood the test of time and gained wide user acceptance. BitTorrent is the one that holds the lion's share among them and the reasons behind its success have been studied to a great extent with interesting results. Nevertheless, even though P2P content distribution remains one of the most active research areas, little progress has been made towards the study of the BitTorrent protocol (and its variations), in a fully controllable and realistic simulation environment. In this paper we describe and analyze a full-featured and extensible implementation of BitTorrent for the OMNeT++ simulation platform. Moreover, since we aim at realistic simulations, we present our enhancements on a popular conversion tool for practical Internet topologies, as well as our churn generator that is based on the analysis of real BitTorrent traces. Finally, we set forth the results from the evaluation of our prototype implementation regarding resource demands under different simulation scenarios.
在过去的几年中,许多P2P文件共享和内容分发系统已经被设计、实现,并通过模拟、真实世界的测量和数学分析进行了评估。然而,它们中只有少数经受住了时间的考验并获得了广泛的用户接受。BitTorrent是其中占有最大份额的一个,其成功背后的原因在很大程度上得到了有趣的研究结果。然而,尽管P2P内容分发仍然是最活跃的研究领域之一,但在完全可控和现实的模拟环境中,对BitTorrent协议(及其变体)的研究进展甚微。在本文中,我们描述和分析了一个功能齐全、可扩展的BitTorrent在omnet++仿真平台上的实现。此外,由于我们的目标是真实的模拟,我们提出了我们的增强在一个流行的转换工具,为实际的互联网拓扑,以及我们的流失生成器,是基于真实的BitTorrent痕迹的分析。最后,我们给出了原型实现在不同仿真场景下对资源需求的评估结果。
{"title":"A BitTorrent module for the OMNeT++ simulator","authors":"K. Katsaros, V. Kemerlis, Charilaos Stais, G. Xylomenos","doi":"10.1109/MASCOT.2009.5366131","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366131","url":null,"abstract":"In the past few years numerous P2P file-sharing and content distribution systems have been designed, implemented, and evaluated via simulations, real world measurements, and mathematical analysis. Yet, only few of them have stood the test of time and gained wide user acceptance. BitTorrent is the one that holds the lion's share among them and the reasons behind its success have been studied to a great extent with interesting results. Nevertheless, even though P2P content distribution remains one of the most active research areas, little progress has been made towards the study of the BitTorrent protocol (and its variations), in a fully controllable and realistic simulation environment. In this paper we describe and analyze a full-featured and extensible implementation of BitTorrent for the OMNeT++ simulation platform. Moreover, since we aim at realistic simulations, we present our enhancements on a popular conversion tool for practical Internet topologies, as well as our churn generator that is based on the analysis of real BitTorrent traces. Finally, we set forth the results from the evaluation of our prototype implementation regarding resource demands under different simulation scenarios.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124158117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
On the structure and evolution of vehicular networks 车辆网络的结构与演化
G. Pallis, Dimitrios Katsaros, M. Dikaiakos, N. Loulloudes, L. Tassiulas
Vehicular ad hoc networks have emerged recently as a platform to support intelligent inter-vehicle communication and improve traffic safety and performance. The road-constrained and high mobility of the vehicles, their unbounded power source, and the emergence of roadside wireless infrastructures make VANETs a challenging research topic. A key to the development of protocols for intervehicle communication and services lies in the knowledge of the topological characteristics of the VANET communication graph. This article provides answers to the general question: how does a VANET communication graph look like over time and space? This study is the first one that examines a very large-scale VANET graph and conducts a thorough investigation of its topological characteristics using several metrics, not examined in previous studies. Our work characterizes a VANET graph at the connectivity (link) level, quantifies the notion of “qualitative” nodes as required by routing and dissemination protocols, and examines the existence and evolution of communities (dense clusters of vehicles) in the VANET. Several latent facts about the VANET graph are revealed and incentives for their exploitation in protocol design are examined.
近年来,车载自组织网络作为一种支持智能车际通信、提高交通安全和性能的平台应运而生。道路约束和车辆的高移动性,它们的无限电源以及路边无线基础设施的出现使vanet成为一个具有挑战性的研究课题。开发车辆间通信和服务协议的关键在于了解VANET通信图的拓扑特征。本文提供了一些一般性问题的答案:随着时间和空间的变化,VANET通信图是什么样的?本研究首次研究了一个非常大规模的VANET图,并使用几个指标对其拓扑特征进行了彻底的调查,而这些指标在以前的研究中没有被检查过。我们的工作在连接性(链接)层面描绘了VANET图的特征,根据路由和传播协议的要求量化了“定性”节点的概念,并检查了VANET中社区(密集的车辆集群)的存在和演变。揭示了VANET图的几个潜在事实,并研究了在协议设计中利用VANET图的动机。
{"title":"On the structure and evolution of vehicular networks","authors":"G. Pallis, Dimitrios Katsaros, M. Dikaiakos, N. Loulloudes, L. Tassiulas","doi":"10.1109/MASCOT.2009.5366230","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366230","url":null,"abstract":"Vehicular ad hoc networks have emerged recently as a platform to support intelligent inter-vehicle communication and improve traffic safety and performance. The road-constrained and high mobility of the vehicles, their unbounded power source, and the emergence of roadside wireless infrastructures make VANETs a challenging research topic. A key to the development of protocols for intervehicle communication and services lies in the knowledge of the topological characteristics of the VANET communication graph. This article provides answers to the general question: how does a VANET communication graph look like over time and space? This study is the first one that examines a very large-scale VANET graph and conducts a thorough investigation of its topological characteristics using several metrics, not examined in previous studies. Our work characterizes a VANET graph at the connectivity (link) level, quantifies the notion of “qualitative” nodes as required by routing and dissemination protocols, and examines the existence and evolution of communities (dense clusters of vehicles) in the VANET. Several latent facts about the VANET graph are revealed and incentives for their exploitation in protocol design are examined.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
Optimal multicast in multi-channel multi-radio wireless networks 多通道多无线电无线网络中的最优组播
A. Gopinathan, Zongpeng Li, C. Williamson
Recent advances in wireless technology have made it increasingly feasible to equip wireless nodes with multiple radios, thereby allowing each radio to exploit channel diversity in the form of orthogonal, non-overlapping transmission spectrums. Multi-channel operation mitigates interference, but at the same time raises new challenges for network optimization, in terms of judicious channel assignment for efficient bandwidth utilization. While previous research mostly studies optimizing channel assignment for unicast, we focus instead on multicast, which is an efficient mechanism for one-to-many data dissemination. We derive a model for optimal multicast in multi-channel multi-radio wireless networks under the assumption that channel assignment is static. Our model employs network coding as the multicast mechanism of choice, and exploits the broadcast nature of omnidirectional antennas for efficient bandwidth utilization. Based on the model derived, we formulate optimal multicast as a linear integer program. Two accompanying solutions are proposed: a greedy channel assignment scheme and an improved iterative scheme inspired by primal-dual algorithm design. The effectiveness of the two schemes are empirically examined through simulation studies, and are compared to results obtained from solving the integer program as well as its linear programming relaxation. Finally, we present an alternate model for optimal multicast under the assumption that transmission frequencies are not fixed divisions of the usable spectrum.
无线技术的最新进展使得为无线节点配备多个无线电变得越来越可行,从而允许每个无线电以正交、不重叠的传输频谱的形式利用信道分集。多信道运行减轻了干扰,但同时也对网络优化提出了新的挑战,即如何合理分配信道以实现有效的带宽利用。以往的研究主要集中在单播的信道分配优化上,而我们的研究主要集中在多播上,多播是一种有效的一对多数据传播机制。在信道分配是静态的前提下,建立了多通道多无线网络中最优组播模型。我们的模型采用网络编码作为多播机制的选择,并利用全向天线的广播特性来有效地利用带宽。在此基础上,将最优组播规划为线性整数规划。提出了贪婪信道分配方案和基于原对偶算法设计的改进迭代方案。通过仿真研究对两种方案的有效性进行了实证检验,并与求解整数规划及其线性规划松弛的结果进行了比较。最后,在假定传输频率不是可用频谱的固定分割的情况下,提出了一种备选的最优组播模型。
{"title":"Optimal multicast in multi-channel multi-radio wireless networks","authors":"A. Gopinathan, Zongpeng Li, C. Williamson","doi":"10.1109/MASCOT.2009.5366718","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366718","url":null,"abstract":"Recent advances in wireless technology have made it increasingly feasible to equip wireless nodes with multiple radios, thereby allowing each radio to exploit channel diversity in the form of orthogonal, non-overlapping transmission spectrums. Multi-channel operation mitigates interference, but at the same time raises new challenges for network optimization, in terms of judicious channel assignment for efficient bandwidth utilization. While previous research mostly studies optimizing channel assignment for unicast, we focus instead on multicast, which is an efficient mechanism for one-to-many data dissemination. We derive a model for optimal multicast in multi-channel multi-radio wireless networks under the assumption that channel assignment is static. Our model employs network coding as the multicast mechanism of choice, and exploits the broadcast nature of omnidirectional antennas for efficient bandwidth utilization. Based on the model derived, we formulate optimal multicast as a linear integer program. Two accompanying solutions are proposed: a greedy channel assignment scheme and an improved iterative scheme inspired by primal-dual algorithm design. The effectiveness of the two schemes are empirically examined through simulation studies, and are compared to results obtained from solving the integer program as well as its linear programming relaxation. Finally, we present an alternate model for optimal multicast under the assumption that transmission frequencies are not fixed divisions of the usable spectrum.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116284989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A hardware test bed for measuring IEEE 802.11g distribution coordination function performance 一种用于测量IEEE 802.11g分配协调功能性能的硬件测试平台
A. Symington, P. Kritzinger
The Distributed Coordination Function is one of three channel access control protocols specified by the IEEE 802.11 standard. In this paper we present a method of measuring DCF performance using a test bed built with off-the-shelf hardware. Performance is measured by normalized aggregate throughput as a function of the number of stations contending for channel access. We present measurements for both basic access and RTS/CTS access in fully-connected IEEE 802.11g networks experiencing conditions of saturation. We compare our measurements to results from three analytic models and a simulator, all of which shared the same assumptions about the workload model and operation of DCF. For small networks the analytic models predict a much lower performance than shown through simulation and test bed experiments. As the network grows, so the measured performance deteriorates significantly faster than predicted by the analytic models. We attribute this to inaccuracies in the analytic model, imperfect channels and queuing. The simulation results fit the measured data with more accuracy, as the simulator makes fewer restrictive assumptions about DCF when compared to the analytic models. This is the first paper to provide a cross-comparison of test bed, simulation and analytic results for IEEE 802.11g DCF performance.
分布式协调功能是IEEE 802.11标准指定的三个通道访问控制协议之一。在本文中,我们提出了一种使用现成硬件构建的测试平台来测量DCF性能的方法。性能是通过标准化的总吞吐量作为争夺信道访问的站点数量的函数来衡量的。我们提出了在完全连接的IEEE 802.11g网络中经历饱和条件的基本访问和RTS/CTS访问的测量。我们将我们的测量结果与三个分析模型和一个模拟器的结果进行了比较,所有这些模型和模拟器都对DCF的工作负载模型和操作有相同的假设。对于小型网络,分析模型预测的性能远低于通过仿真和试验台实验显示的性能。随着网络的增长,实测性能的下降速度明显快于分析模型的预测。我们将此归因于分析模型的不准确性、不完善的渠道和排队。与分析模型相比,仿真器对DCF的限制性假设更少,仿真结果与实测数据拟合精度更高。这是第一篇对IEEE 802.11g DCF性能的测试平台、仿真和分析结果进行交叉比较的论文。
{"title":"A hardware test bed for measuring IEEE 802.11g distribution coordination function performance","authors":"A. Symington, P. Kritzinger","doi":"10.1109/MASCOT.2009.5366313","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366313","url":null,"abstract":"The Distributed Coordination Function is one of three channel access control protocols specified by the IEEE 802.11 standard. In this paper we present a method of measuring DCF performance using a test bed built with off-the-shelf hardware. Performance is measured by normalized aggregate throughput as a function of the number of stations contending for channel access. We present measurements for both basic access and RTS/CTS access in fully-connected IEEE 802.11g networks experiencing conditions of saturation. We compare our measurements to results from three analytic models and a simulator, all of which shared the same assumptions about the workload model and operation of DCF. For small networks the analytic models predict a much lower performance than shown through simulation and test bed experiments. As the network grows, so the measured performance deteriorates significantly faster than predicted by the analytic models. We attribute this to inaccuracies in the analytic model, imperfect channels and queuing. The simulation results fit the measured data with more accuracy, as the simulator makes fewer restrictive assumptions about DCF when compared to the analytic models. This is the first paper to provide a cross-comparison of test bed, simulation and analytic results for IEEE 802.11g DCF performance.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116449847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A case for conservative workload modeling: Parallel job scheduling with daily cycles of activity 保守工作负载建模的一个案例:具有每日活动周期的并行作业调度
D. Feitelson, Edi Shmueli
Computer workloads have many attributes. When modeling these workloads it is often difficult to decide which attributes are important, and which can be abstracted away. In many cases, the modeler only includes attributes that are believed to be important, and ignores the rest. We argue, however, that this can lead to impaired workloads and unreliable system evaluations. Using parallel job scheduling as a case study, and daily cycles of activity as the attribute in dispute, we present two schedulers whose simulated performance seems identical without cycles, but then becomes significantly different when daily cycles are included in the workload. We trace this to the ability of one scheduler to prioritize interactive jobs, which leads to implicitly delaying less critical work to nighttime, when it can utilize resources that otherwise would have been left idle. Notably, this was not a design feature of this scheduler, but rather an emergent property that was not anticipated in advance.
计算机工作负载有许多属性。在对这些工作负载建模时,通常很难确定哪些属性是重要的,哪些属性可以抽象掉。在许多情况下,建模器只包含被认为是重要的属性,而忽略其余的。然而,我们认为这可能导致工作负载受损和系统评估不可靠。以并行作业调度为例,以每日活动周期为争议属性,我们给出了两个调度程序,它们的模拟性能在没有周期的情况下看起来是相同的,但是当工作负载中包含每日周期时,它们的模拟性能就会变得明显不同。我们将其追溯到一个调度器对交互式作业进行优先级排序的能力,这将隐式地将不太重要的工作延迟到夜间,当它可以利用原本闲置的资源时。值得注意的是,这不是这个调度器的设计特性,而是一个事先没有预料到的紧急属性。
{"title":"A case for conservative workload modeling: Parallel job scheduling with daily cycles of activity","authors":"D. Feitelson, Edi Shmueli","doi":"10.1109/MASCOT.2009.5366139","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366139","url":null,"abstract":"Computer workloads have many attributes. When modeling these workloads it is often difficult to decide which attributes are important, and which can be abstracted away. In many cases, the modeler only includes attributes that are believed to be important, and ignores the rest. We argue, however, that this can lead to impaired workloads and unreliable system evaluations. Using parallel job scheduling as a case study, and daily cycles of activity as the attribute in dispute, we present two schedulers whose simulated performance seems identical without cycles, but then becomes significantly different when daily cycles are included in the workload. We trace this to the ability of one scheduler to prioritize interactive jobs, which leads to implicitly delaying less critical work to nighttime, when it can utilize resources that otherwise would have been left idle. Notably, this was not a design feature of this scheduler, but rather an emergent property that was not anticipated in advance.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126873830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1