Pub Date : 2004-04-19DOI: 10.1109/CCNC.2004.1286844
Namgi Kim, H. Yoon
Recently, a number of fair queueing algorithms for wireless networks have been proposed. They, however, need perfect channel prediction before transmission and rarely consider a medium access control (MAC) algorithm. In the wireless world, the link level retransmission scheme is popularly used in the MAC layer for recovering channel errors. Therefore, we propose a new wireless fair queueing algorithm that works well with link level retransmission and does not require channel prediction. Through simulation, we showed that our algorithm guarantees throughput and fairness. Also, we found that our algorithm achieves flow separation and compensation.
{"title":"Packet fair queueing algorithms for wireless networks with link level retransmission","authors":"Namgi Kim, H. Yoon","doi":"10.1109/CCNC.2004.1286844","DOIUrl":"https://doi.org/10.1109/CCNC.2004.1286844","url":null,"abstract":"Recently, a number of fair queueing algorithms for wireless networks have been proposed. They, however, need perfect channel prediction before transmission and rarely consider a medium access control (MAC) algorithm. In the wireless world, the link level retransmission scheme is popularly used in the MAC layer for recovering channel errors. Therefore, we propose a new wireless fair queueing algorithm that works well with link level retransmission and does not require channel prediction. Through simulation, we showed that our algorithm guarantees throughput and fairness. Also, we found that our algorithm achieves flow separation and compensation.","PeriodicalId":316094,"journal":{"name":"First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132646945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/CCNC.2004.1286945
Calebe P. Bianchini, F. I. Massetto
The MoDPAI tool was built because of the increasing decentralization of computational resources and the need for distributed and heterogeneous management systems. MoDPAI stands for the Portuguese phrase "monitoramento de dispositivos utilizando computacao pervasiva e agentes de software inteligentes". Its main goal is to assist network administrators in a great part of their tasks through automatic monitoring of devices. Combining the ideas of pervasive computing and software agents, this work presents a tool for monitoring devices distributed in a network and guided by a well-defined strategy. The tool uses intelligent software agents as the main monitoring mechanism.
{"title":"MoDPAI: an intelligent network devices management tool","authors":"Calebe P. Bianchini, F. I. Massetto","doi":"10.1109/CCNC.2004.1286945","DOIUrl":"https://doi.org/10.1109/CCNC.2004.1286945","url":null,"abstract":"The MoDPAI tool was built because of the increasing decentralization of computational resources and the need for distributed and heterogeneous management systems. MoDPAI stands for the Portuguese phrase \"monitoramento de dispositivos utilizando computacao pervasiva e agentes de software inteligentes\". Its main goal is to assist network administrators in a great part of their tasks through automatic monitoring of devices. Combining the ideas of pervasive computing and software agents, this work presents a tool for monitoring devices distributed in a network and guided by a well-defined strategy. The tool uses intelligent software agents as the main monitoring mechanism.","PeriodicalId":316094,"journal":{"name":"First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131219190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/CCNC.2004.1286868
S. Taheri
In structure-less (ad-hoc) networks, applying the retransmission rules of a reliable transmission protocol (e.g., TCP) without having a structured rerouting scheme is erroneous. We propose a versatile, virtual infrastructure to stabilize a rerouting scheme where, in essence, the scheme tries to slow down the dynamics of the network from the TTR (time-to-transmit) parameter point of view. Therefore, there is less deviation from the primary settings (set before the start of the session), and, during the session, less updating is required. The proposed virtual infrastructure with the same overhead (initialization and maintenance) enhances the routing protocol and TCP performance. We consider a joint routing and TCP design which is based on a virtual infrastructure. We discuss the necessary modifications on the sender's TCP to turn it to a structure-aware protocol to distinguish physical layer initiated problems from those related to routing. As a result, TCP performs fewer mistakes in recognizing problems within a predefined range of acceptance; meanwhile, less updating is required for TTR.
{"title":"Improving the performance of TCP in structure-less networks with virtual infrastructures","authors":"S. Taheri","doi":"10.1109/CCNC.2004.1286868","DOIUrl":"https://doi.org/10.1109/CCNC.2004.1286868","url":null,"abstract":"In structure-less (ad-hoc) networks, applying the retransmission rules of a reliable transmission protocol (e.g., TCP) without having a structured rerouting scheme is erroneous. We propose a versatile, virtual infrastructure to stabilize a rerouting scheme where, in essence, the scheme tries to slow down the dynamics of the network from the TTR (time-to-transmit) parameter point of view. Therefore, there is less deviation from the primary settings (set before the start of the session), and, during the session, less updating is required. The proposed virtual infrastructure with the same overhead (initialization and maintenance) enhances the routing protocol and TCP performance. We consider a joint routing and TCP design which is based on a virtual infrastructure. We discuss the necessary modifications on the sender's TCP to turn it to a structure-aware protocol to distinguish physical layer initiated problems from those related to routing. As a result, TCP performs fewer mistakes in recognizing problems within a predefined range of acceptance; meanwhile, less updating is required for TTR.","PeriodicalId":316094,"journal":{"name":"First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.","volume":"9 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114147119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/CCNC.2004.1286825
Lior Ophir, Y. Bitran
We address the challenge of a ubiquitous home network for new high-bandwidth applications and services such as video. We present a new concept of a hybrid coax-wireless home network using IEEE 802.11 technology. We further analyze this solution from a technical as well as other aspects and show its superiority by comparing it to alternative solutions. With data rates of up to 54 Mbps, guaranteed QoS, security, and robust whole-home coverage, operators and service providers can deliver and distribute new bandwidth intensive services throughout the home. The usage of the popular 802.11 standard ensures many advantages, such as availability and interoperability of components, low cost, and abundance of complimentary products.
{"title":"802.11 over coax - a hybrid coax-wireless home network using 802.11 technology","authors":"Lior Ophir, Y. Bitran","doi":"10.1109/CCNC.2004.1286825","DOIUrl":"https://doi.org/10.1109/CCNC.2004.1286825","url":null,"abstract":"We address the challenge of a ubiquitous home network for new high-bandwidth applications and services such as video. We present a new concept of a hybrid coax-wireless home network using IEEE 802.11 technology. We further analyze this solution from a technical as well as other aspects and show its superiority by comparing it to alternative solutions. With data rates of up to 54 Mbps, guaranteed QoS, security, and robust whole-home coverage, operators and service providers can deliver and distribute new bandwidth intensive services throughout the home. The usage of the popular 802.11 standard ensures many advantages, such as availability and interoperability of components, low cost, and abundance of complimentary products.","PeriodicalId":316094,"journal":{"name":"First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114207536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/CCNC.2004.1286886
Jian Zhu, B. Bing, Geoffrey Y. Li, Jun Xu
We present a novel, adaptive subchannel allocation algorithm for the downlink channel of a multiuser, OFDM-based wireless home network. Since channel resources are not adaptively allocated in a traditional OFDM system, some of the users with fixed frequency channel allocation may experience deep fading in a frequency-selective multipath environment. This problem can be mitigated using an adaptive algorithm, which can be modeled as an optimization problem that allocates the proper number of subchannels to achieve maximum channel capacity. We employ the classical bipartite matching algorithm to achieve optimal OFDM subchannel allocation. Simulation results show that the total capacity increases remarkably, and that higher channel capacity is achieved when the number of users is increased. In a wireless environment, the reallocation overhead can be large. As such, we propose a hybrid method for subchannel allocation to support more users while reducing the reallocation overhead. We simulated the performance of the hybrid algorithm and compared it with the matching-only algorithm.
{"title":"An adaptive subchannel allocation algorithm for OFDM-based wireless home networks","authors":"Jian Zhu, B. Bing, Geoffrey Y. Li, Jun Xu","doi":"10.1109/CCNC.2004.1286886","DOIUrl":"https://doi.org/10.1109/CCNC.2004.1286886","url":null,"abstract":"We present a novel, adaptive subchannel allocation algorithm for the downlink channel of a multiuser, OFDM-based wireless home network. Since channel resources are not adaptively allocated in a traditional OFDM system, some of the users with fixed frequency channel allocation may experience deep fading in a frequency-selective multipath environment. This problem can be mitigated using an adaptive algorithm, which can be modeled as an optimization problem that allocates the proper number of subchannels to achieve maximum channel capacity. We employ the classical bipartite matching algorithm to achieve optimal OFDM subchannel allocation. Simulation results show that the total capacity increases remarkably, and that higher channel capacity is achieved when the number of users is increased. In a wireless environment, the reallocation overhead can be large. As such, we propose a hybrid method for subchannel allocation to support more users while reducing the reallocation overhead. We simulated the performance of the hybrid algorithm and compared it with the matching-only algorithm.","PeriodicalId":316094,"journal":{"name":"First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116082480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/CCNC.2004.1286897
H. H. Yu, P. Yin, Xiaolong Yu
Today, multimedia delivery through wireless networks is rapidly gaining popularity. Many cellular phones are already equipped with an extra large full-color display and various multimedia applications and devices. It is challenging to transmit and access multimedia data through wireless communications channels due to device mobility, power constraints, bandwidth limitations, and an error prone environment. We investigate multimedia services in wireless networks. We propose an integrated service approach for authentication and error control (including error detection, recovery and concealment) that potentially reduces bandwidth requirement and power consumption. Authentication is used in secure wireless communications to ensure the integrity of a message, i.e., that it has not been tampered with and that it originated with the presumed transmitter. To combat transmission errors with the least additional bandwidth requirement, error concealment can be used to obtain a close approximation of the original signal at the receiver end. The efficiency and effectiveness of an error recovery technique rely on the system error detection capabilities. Traditionally, those problems are treated separately using different schemes. We investigate the problem at the application layer, and design a joint media authentication and error control scheme to reduce cost and save resources. Simulation results show that the proposed scheme is efficient and effective.
{"title":"Joint content authentication and error control for wireless multimedia communications","authors":"H. H. Yu, P. Yin, Xiaolong Yu","doi":"10.1109/CCNC.2004.1286897","DOIUrl":"https://doi.org/10.1109/CCNC.2004.1286897","url":null,"abstract":"Today, multimedia delivery through wireless networks is rapidly gaining popularity. Many cellular phones are already equipped with an extra large full-color display and various multimedia applications and devices. It is challenging to transmit and access multimedia data through wireless communications channels due to device mobility, power constraints, bandwidth limitations, and an error prone environment. We investigate multimedia services in wireless networks. We propose an integrated service approach for authentication and error control (including error detection, recovery and concealment) that potentially reduces bandwidth requirement and power consumption. Authentication is used in secure wireless communications to ensure the integrity of a message, i.e., that it has not been tampered with and that it originated with the presumed transmitter. To combat transmission errors with the least additional bandwidth requirement, error concealment can be used to obtain a close approximation of the original signal at the receiver end. The efficiency and effectiveness of an error recovery technique rely on the system error detection capabilities. Traditionally, those problems are treated separately using different schemes. We investigate the problem at the application layer, and design a joint media authentication and error control scheme to reduce cost and save resources. Simulation results show that the proposed scheme is efficient and effective.","PeriodicalId":316094,"journal":{"name":"First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121920920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/CCNC.2004.1286939
M. Bodlaender, J. Guidi, L. Heerink
Discovery protocols like SSDP, SLP, Rendezvous and Jini allow fast detection of devices. They are typically less suitable for fast detection of disappearing devices. This paper describes the design of a liveness protocol that quickly detects that devices have left the network. Mechanisms that improve important properties like reliability and efficiency over wireless, scalability and high-dynamics are highlighted. The performance of the liveness protocol is analyzed: it has significantly less message overhead than alternative solutions.
{"title":"Enhancing discovery with liveness [network device disappearance detection protocol]","authors":"M. Bodlaender, J. Guidi, L. Heerink","doi":"10.1109/CCNC.2004.1286939","DOIUrl":"https://doi.org/10.1109/CCNC.2004.1286939","url":null,"abstract":"Discovery protocols like SSDP, SLP, Rendezvous and Jini allow fast detection of devices. They are typically less suitable for fast detection of disappearing devices. This paper describes the design of a liveness protocol that quickly detects that devices have left the network. Mechanisms that improve important properties like reliability and efficiency over wireless, scalability and high-dynamics are highlighted. The performance of the liveness protocol is analyzed: it has significantly less message overhead than alternative solutions.","PeriodicalId":316094,"journal":{"name":"First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117303477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/CCNC.2004.1286966
S. Zekavat
A novel application of wireless communication in vehicle early warning is introduced. This application establishes an innovative function for mobile handhelds that is the protection of their holders from accidents with cars. Two main components of this vehicle early warning system are a mobile base station (MBS) deployed in vehicles, and a transceiver installed in mobile handhelds that defines mobile handhelds as active targets. The MBS: (a) communicates with all mobiles located in its proximity; (b) discriminates the mobiles via unique codes assigned to each mobile; and (c) locates and tracks those mobiles. An early warning signal is generated in critical conditions that triggers or controls mechanical systems such as brakes, wheels or airbags. This paper discusses the structure and design problems associated with this system. This scheme highly enhances road and pedestrian safety and defines a new application for wireless systems.
{"title":"A novel application for wireless communications in vehicle early warning","authors":"S. Zekavat","doi":"10.1109/CCNC.2004.1286966","DOIUrl":"https://doi.org/10.1109/CCNC.2004.1286966","url":null,"abstract":"A novel application of wireless communication in vehicle early warning is introduced. This application establishes an innovative function for mobile handhelds that is the protection of their holders from accidents with cars. Two main components of this vehicle early warning system are a mobile base station (MBS) deployed in vehicles, and a transceiver installed in mobile handhelds that defines mobile handhelds as active targets. The MBS: (a) communicates with all mobiles located in its proximity; (b) discriminates the mobiles via unique codes assigned to each mobile; and (c) locates and tracks those mobiles. An early warning signal is generated in critical conditions that triggers or controls mechanical systems such as brakes, wheels or airbags. This paper discusses the structure and design problems associated with this system. This scheme highly enhances road and pedestrian safety and defines a new application for wireless systems.","PeriodicalId":316094,"journal":{"name":"First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123055794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/CCNC.2004.1286834
Ajay S. Bhargava, Don M. Gruenbacher
The paper presents techniques to avoid the problem of inter-piconet interference in Bluetooth networks. These techniques aim to reduce the number of piconets created in a Bluetooth networking area. The main advantage of having fewer piconets in a Bluetooth network is the reduction in inter-piconet interference and hence better network performance These techniques are simulated in software called BT-Scatter, which was created specifically to perform Bluetooth scatternet formation simulations. Simulations were run for various randomly generated topologies and the number of piconets created for each of the topologies was collected. Results show that the number of piconets created for a Bluetooth network topology reduces by using the proposed technique.
{"title":"Using piconet avoidance techniques to reduce interference in Bluetooth networks","authors":"Ajay S. Bhargava, Don M. Gruenbacher","doi":"10.1109/CCNC.2004.1286834","DOIUrl":"https://doi.org/10.1109/CCNC.2004.1286834","url":null,"abstract":"The paper presents techniques to avoid the problem of inter-piconet interference in Bluetooth networks. These techniques aim to reduce the number of piconets created in a Bluetooth networking area. The main advantage of having fewer piconets in a Bluetooth network is the reduction in inter-piconet interference and hence better network performance These techniques are simulated in software called BT-Scatter, which was created specifically to perform Bluetooth scatternet formation simulations. Simulations were run for various randomly generated topologies and the number of piconets created for each of the topologies was collected. Results show that the number of piconets created for a Bluetooth network topology reduces by using the proposed technique.","PeriodicalId":316094,"journal":{"name":"First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129864832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/CCNC.2004.1286891
Patrick Nguyen, David Kryze, R. Kuhn, M. Kobayashi, M. Yasukata
Multimedia content cannot be retrieved effectively unless metadata describing it is generated. However, metadata generation tends to be time-consuming and expensive, since it typically involves human beings going through the content and manually tagging it. The paper shows how automatic speech recognition (ASR) technology can be used to carry out metadata generation with significantly less expenditure of human effort. The paper describes two different approaches: voice tagging, whereby human beings tag the data but this process is speeded up by applying ASR to the tagging process; audio indexing, whereby much of the tagging process is automated by applying ASR to the content itself.
{"title":"Speech technology for multimedia content management","authors":"Patrick Nguyen, David Kryze, R. Kuhn, M. Kobayashi, M. Yasukata","doi":"10.1109/CCNC.2004.1286891","DOIUrl":"https://doi.org/10.1109/CCNC.2004.1286891","url":null,"abstract":"Multimedia content cannot be retrieved effectively unless metadata describing it is generated. However, metadata generation tends to be time-consuming and expensive, since it typically involves human beings going through the content and manually tagging it. The paper shows how automatic speech recognition (ASR) technology can be used to carry out metadata generation with significantly less expenditure of human effort. The paper describes two different approaches: voice tagging, whereby human beings tag the data but this process is speeded up by applying ASR to the tagging process; audio indexing, whereby much of the tagging process is automated by applying ASR to the content itself.","PeriodicalId":316094,"journal":{"name":"First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117190800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}