首页 > 最新文献

2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks最新文献

英文 中文
Reducing handover latency in future IP-based wireless networks: proxy mobile IPv6 with simultaneous bindings 减少未来基于ip的无线网络中的切换延迟:具有同步绑定的代理移动IPv6
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594849
M. Bargh, Bob Hulsebosch, H. Eertink, G. Heijenk, Jeroen Idserda, J. Laganier, A. Prasad, A. Zugenmaier
Handover in future wireless communication systems must be seamless. Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements. At the same time they do not give sufficient control to the network to optimize the handover process and they do not deal well with slow connection setups of some wireless technologies. In this paper we propose an enhancement of Proxy MIPv6 (PMIPv6) with Simultaneous bindings. The result, called SPMIPv6, is a proactive network- controlled handover solution that allows some handover processes to be carried proactively while the mobile node is connected to the serving network. We analyze SPMIPv6 performance and show that the handover latency can be limited to one RTT between the mobile node and the target access router, which is typically below 10ms, and that the packet loss due to handover can be decreased and eliminated by appropriately buffering packets at the target access router. Moreover, our performance evaluation based on a SPMIPv6 implementation shows no TCP and UDP performance degradation during handovers. Two important characteristics of SPMIPv6 are its robustness to incorrect handover predictions and its built-in features to accommodate large network attachment latencies.
未来无线通信系统的切换必须是无缝的。目前的ip级移动协议难以满足严格的切换延迟要求。同时,它们没有给予网络足够的控制来优化切换过程,并且不能很好地处理某些无线技术的慢连接设置。本文提出了一种基于同步绑定的Proxy MIPv6 (PMIPv6)改进方案。其结果被称为SPMIPv6,是一种主动的网络控制切换解决方案,允许在移动节点连接到服务网络时主动进行一些切换过程。通过对SPMIPv6的性能分析,我们发现移动节点和目标接入路由器之间的切换延迟可以限制在1 RTT以内,通常低于10ms,并且通过在目标接入路由器上适当缓冲数据包可以减少和消除由于切换而导致的数据包丢失。此外,我们基于SPMIPv6实现的性能评估显示,在切换期间没有TCP和UDP性能下降。SPMIPv6的两个重要特征是其对错误切换预测的鲁棒性和其适应大网络连接延迟的内置特性。
{"title":"Reducing handover latency in future IP-based wireless networks: proxy mobile IPv6 with simultaneous bindings","authors":"M. Bargh, Bob Hulsebosch, H. Eertink, G. Heijenk, Jeroen Idserda, J. Laganier, A. Prasad, A. Zugenmaier","doi":"10.1109/WOWMOM.2008.4594849","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594849","url":null,"abstract":"Handover in future wireless communication systems must be seamless. Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements. At the same time they do not give sufficient control to the network to optimize the handover process and they do not deal well with slow connection setups of some wireless technologies. In this paper we propose an enhancement of Proxy MIPv6 (PMIPv6) with Simultaneous bindings. The result, called SPMIPv6, is a proactive network- controlled handover solution that allows some handover processes to be carried proactively while the mobile node is connected to the serving network. We analyze SPMIPv6 performance and show that the handover latency can be limited to one RTT between the mobile node and the target access router, which is typically below 10ms, and that the packet loss due to handover can be decreased and eliminated by appropriately buffering packets at the target access router. Moreover, our performance evaluation based on a SPMIPv6 implementation shows no TCP and UDP performance degradation during handovers. Two important characteristics of SPMIPv6 are its robustness to incorrect handover predictions and its built-in features to accommodate large network attachment latencies.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133035248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
BOWL: Design and implementation of a (connectionless) broadcasting system over wireless LAN 在无线局域网上(无连接)广播系统的设计和实现
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594906
Kartik Muralidharan, K. Dhanapal, A. Chowdhury
A truly pervasive computing environment can only be created if ubiquitous computation power can collaborate seamlessly to create superior user experience. With the adoption of mobile computing platforms on the rise, we have explored how the IEEE 802.11 wireless access standards can be used to enable a device to be more aware of the capabilities of the infrastructure in its surroundings. Specifically, we have been able to effectively transfer information to these WiFi enabled devices without explicit connections being established and therefore our solution is proven to be much more scalable. We have also showcased a pilot application using the broadcast over wireless LAN (BOWL) technology.
只有当无处不在的计算能力能够无缝协作以创建卓越的用户体验时,才能创建真正的普适计算环境。随着移动计算平台的普及,我们探讨了如何使用IEEE 802.11无线接入标准使设备能够更好地了解其周围基础设施的功能。具体来说,我们已经能够有效地将信息传输到这些支持WiFi的设备,而无需建立明确的连接,因此我们的解决方案被证明具有更高的可扩展性。我们还展示了一个使用无线局域网广播(BOWL)技术的试点应用程序。
{"title":"BOWL: Design and implementation of a (connectionless) broadcasting system over wireless LAN","authors":"Kartik Muralidharan, K. Dhanapal, A. Chowdhury","doi":"10.1109/WOWMOM.2008.4594906","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594906","url":null,"abstract":"A truly pervasive computing environment can only be created if ubiquitous computation power can collaborate seamlessly to create superior user experience. With the adoption of mobile computing platforms on the rise, we have explored how the IEEE 802.11 wireless access standards can be used to enable a device to be more aware of the capabilities of the infrastructure in its surroundings. Specifically, we have been able to effectively transfer information to these WiFi enabled devices without explicit connections being established and therefore our solution is proven to be much more scalable. We have also showcased a pilot application using the broadcast over wireless LAN (BOWL) technology.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115428672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimizations for charged service provision in Mobile Ad Hoc Networks 移动自组织网络中收费服务提供的优化
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594863
C. Ververidis, George C. Polyzos
Optimized service provisioning is a challenging problem in dynamic environments such as mobile ad hoc networks (MANETs). Most of the existing approaches assume an environment, where service provision is free (and dictated) and servers do not have an incentive to maximize their benefit. In this paper we consider the nodes in MANETs to be independent, rational agents trying to maximize their profits through service provision. We model this problem as a generalized assignment problem (GAP). We adopt a pay-as-you-go model and introduce into the proposed profit maximization algorithm expected payoffs based on estimates of server-to-client connectivity. We define connectivity as the lifetime of the network connection between a client and a server. We experimentally study cases with non-cooperative and cooperative servers and investigate the gain of the estimate based maximization algorithm versus a classic maximization algorithm, which does not take into account the networkpsilas dynamics that affect server-to-client connectivity. The results show that our approach achieves up to three-fold improved server profits compared to the classical one and is especially suited for MANETs with high-mobility.
在移动自组织网络(manet)等动态环境中,优化服务供应是一个具有挑战性的问题。大多数现有的方法都假设一个环境,其中服务提供是免费的(并且是指定的),服务器没有动机最大化其利益。在本文中,我们认为manet中的节点是独立的,理性的代理,试图通过服务提供最大化他们的利润。我们将此问题建模为广义分配问题(GAP)。我们采用量入为出的模型,并在提出的利润最大化算法中引入基于服务器到客户端连接估计的预期收益。我们将连通性定义为客户机和服务器之间网络连接的生命周期。我们通过实验研究了非合作和合作服务器的情况,并研究了基于估计的最大化算法与经典最大化算法的增益,后者没有考虑影响服务器到客户端连接的网络动态。结果表明,与传统方法相比,我们的方法实现了高达三倍的服务器利润提高,特别适合具有高移动性的manet。
{"title":"Optimizations for charged service provision in Mobile Ad Hoc Networks","authors":"C. Ververidis, George C. Polyzos","doi":"10.1109/WOWMOM.2008.4594863","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594863","url":null,"abstract":"Optimized service provisioning is a challenging problem in dynamic environments such as mobile ad hoc networks (MANETs). Most of the existing approaches assume an environment, where service provision is free (and dictated) and servers do not have an incentive to maximize their benefit. In this paper we consider the nodes in MANETs to be independent, rational agents trying to maximize their profits through service provision. We model this problem as a generalized assignment problem (GAP). We adopt a pay-as-you-go model and introduce into the proposed profit maximization algorithm expected payoffs based on estimates of server-to-client connectivity. We define connectivity as the lifetime of the network connection between a client and a server. We experimentally study cases with non-cooperative and cooperative servers and investigate the gain of the estimate based maximization algorithm versus a classic maximization algorithm, which does not take into account the networkpsilas dynamics that affect server-to-client connectivity. The results show that our approach achieves up to three-fold improved server profits compared to the classical one and is especially suited for MANETs with high-mobility.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125176089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless networks security: Proof of chopchop attack 无线网络安全:短刀攻击的证明
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594924
M. Guennoun, A. Lbekkouri, Amine Benamrane, Mohamed Ben-Tahir, K. El-Khatib
An encryption protocol is the first line of defense against network attacks. The wired equivalent privacy (WEP), used to secure 802.11 based networks, suffers from many weaknesses that were exploited in order to compromise the security of the network, data confidentiality and integrity. An attack named chopchop can decrypt the content of a frame without knowing the encryption key. There has been no theoretical proof of the functionality of the attack. In this paper, we will give a review of the attack and build a mathematical model to prove theoretically that the attack is capable of decrypting messages in WEP enabled wireless networks without requiring the knowledge of the encryption key.
加密协议是抵御网络攻击的第一道防线。用于保护基于802.11的网络的有线等效隐私(WEP)存在许多弱点,这些弱点被利用来破坏网络的安全性、数据机密性和完整性。一种名为chopchop的攻击可以在不知道加密密钥的情况下解密帧的内容。目前还没有理论上的证据证明该攻击的功能。在本文中,我们将对这种攻击进行回顾,并建立一个数学模型,从理论上证明这种攻击能够在不需要知道加密密钥的情况下解密启用WEP的无线网络中的消息。
{"title":"Wireless networks security: Proof of chopchop attack","authors":"M. Guennoun, A. Lbekkouri, Amine Benamrane, Mohamed Ben-Tahir, K. El-Khatib","doi":"10.1109/WOWMOM.2008.4594924","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594924","url":null,"abstract":"An encryption protocol is the first line of defense against network attacks. The wired equivalent privacy (WEP), used to secure 802.11 based networks, suffers from many weaknesses that were exploited in order to compromise the security of the network, data confidentiality and integrity. An attack named chopchop can decrypt the content of a frame without knowing the encryption key. There has been no theoretical proof of the functionality of the attack. In this paper, we will give a review of the attack and build a mathematical model to prove theoretically that the attack is capable of decrypting messages in WEP enabled wireless networks without requiring the knowledge of the encryption key.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129926751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The EXC toolkit for real-world experiments with wireless multihop networks EXC工具包用于无线多跳网络的实际实验
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594901
W. Kiess, T. Ogilvie, M. Mauve
In this paper, we present a methodology and a toolkit to conduct tightly controlled real-world experiments in wireless multihop networks. The main features of our EXC toolkit are a plug-in architecture for easy integration of new functionality, simple scheduling of experiment runs, direct monitoring of experiments, easy management of node mobility, and high portability. EXC does not require specific hardware and can be used for investigating applications and algorithms in real-world environments. We explain the basic features of the toolkit and examine these by means of an experiment with a special focus on repeatability.
在本文中,我们提出了一种方法和工具包,用于在无线多跳网络中进行严格控制的真实世界实验。我们的EXC工具包的主要特点是插件架构,易于集成新功能、简单的实验运行调度、直接监控实验、易于管理节点移动性和高可移植性。EXC不需要特定的硬件,可以用于研究现实环境中的应用程序和算法。我们将解释该工具包的基本特性,并通过一个特别关注可重复性的实验来检验这些特性。
{"title":"The EXC toolkit for real-world experiments with wireless multihop networks","authors":"W. Kiess, T. Ogilvie, M. Mauve","doi":"10.1109/WOWMOM.2008.4594901","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594901","url":null,"abstract":"In this paper, we present a methodology and a toolkit to conduct tightly controlled real-world experiments in wireless multihop networks. The main features of our EXC toolkit are a plug-in architecture for easy integration of new functionality, simple scheduling of experiment runs, direct monitoring of experiments, easy management of node mobility, and high portability. EXC does not require specific hardware and can be used for investigating applications and algorithms in real-world environments. We explain the basic features of the toolkit and examine these by means of an experiment with a special focus on repeatability.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120882361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Motion vector processing using bidirectional frame difference in motion compensated frame interpolation 运动矢量处理中利用双向帧差进行运动补偿帧插值
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594914
Ai-Mei Huang, Truong Q. Nguyen
In this paper, we address the potential issues in bidirectional motion compensated frame interpolation when the received motion vector field is directly used. Based on this motion vector analysis, we therefore propose using bidirectional motion vector processing method to eliminate the ghost artifacts around the moving objects. The artifacts caused by large motion vector magnitude can be effectively removed by correcting motion vectors bidirectionally. Moreover, since the proposed motion vector selection process chooses the best motion vector from adjacent motion vectors, the computational complexity can be greatly reduced comparing to motion estimation. We also demonstrate how to obtain clearer object edges by allowing displacement adjustment during the bidirectional motion vector processing. Experimental results show that the proposed algorithm outperforms other methods in terms of visual quality.
在本文中,我们解决了当直接使用接收到的运动矢量场时双向运动补偿帧插值的潜在问题。基于这种运动矢量分析,我们提出了双向运动矢量处理方法来消除运动物体周围的伪影。通过对运动矢量进行双向校正,可以有效地去除运动矢量大的伪影。此外,由于所提出的运动矢量选择过程从相邻的运动矢量中选择最佳的运动矢量,与运动估计相比,可以大大降低计算复杂度。我们还演示了如何通过允许在双向运动矢量处理期间进行位移调整来获得更清晰的对象边缘。实验结果表明,该算法在视觉质量方面优于其他方法。
{"title":"Motion vector processing using bidirectional frame difference in motion compensated frame interpolation","authors":"Ai-Mei Huang, Truong Q. Nguyen","doi":"10.1109/WOWMOM.2008.4594914","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594914","url":null,"abstract":"In this paper, we address the potential issues in bidirectional motion compensated frame interpolation when the received motion vector field is directly used. Based on this motion vector analysis, we therefore propose using bidirectional motion vector processing method to eliminate the ghost artifacts around the moving objects. The artifacts caused by large motion vector magnitude can be effectively removed by correcting motion vectors bidirectionally. Moreover, since the proposed motion vector selection process chooses the best motion vector from adjacent motion vectors, the computational complexity can be greatly reduced comparing to motion estimation. We also demonstrate how to obtain clearer object edges by allowing displacement adjustment during the bidirectional motion vector processing. Experimental results show that the proposed algorithm outperforms other methods in terms of visual quality.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127231343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Scheduling aware network flow models for multi-hop wireless networks 多跳无线网络的调度感知网络流模型
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594866
Vinay Kolar, N. Abu-Ghazaleh
Network flow models have proven to be an effective tool in the analysis, optimization and design of network protocols. Critical to the success of these models in general multi-hop wireless networks (MHWNs) is an accurate estimation of the effect of CSMA scheduling. While the existing models capture coarse grained estimates of interference, they do not account for the substantial impact of MAC scheduling. On the other hand, accurate models of throughput in CSMA networks exist. However, they are unsuitable for use as a part of a network flow formulation because of their complexity and some of their underlying assumptions. This paper contributes an efficient and constructive model to estimate the effect of scheduling on interfering links in general MHWN settings. We integrate this approach with a network flow routing model which works with aggregate estimates of capacity to improve the quality of the solution. Simulation results show that accounting for scheduling effects leads to large improvements in the quality of the solution.
网络流模型已被证明是分析、优化和设计网络协议的有效工具。这些模型在一般多跳无线网络(MHWNs)中成功的关键是对CSMA调度效果的准确估计。虽然现有的模型捕获了粗粒度的干扰估计,但它们没有考虑到MAC调度的实质性影响。另一方面,CSMA网络中存在精确的吞吐量模型。然而,由于它们的复杂性和一些潜在的假设,它们不适合用作网络流公式的一部分。本文提出了一种有效的、建设性的模型来估计在一般的MHWN设置下调度对干扰链路的影响。我们将这种方法与网络流路由模型集成在一起,该模型与容量的总体估计一起工作,以提高解决方案的质量。仿真结果表明,考虑调度效应可以大大提高求解质量。
{"title":"Scheduling aware network flow models for multi-hop wireless networks","authors":"Vinay Kolar, N. Abu-Ghazaleh","doi":"10.1109/WOWMOM.2008.4594866","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594866","url":null,"abstract":"Network flow models have proven to be an effective tool in the analysis, optimization and design of network protocols. Critical to the success of these models in general multi-hop wireless networks (MHWNs) is an accurate estimation of the effect of CSMA scheduling. While the existing models capture coarse grained estimates of interference, they do not account for the substantial impact of MAC scheduling. On the other hand, accurate models of throughput in CSMA networks exist. However, they are unsuitable for use as a part of a network flow formulation because of their complexity and some of their underlying assumptions. This paper contributes an efficient and constructive model to estimate the effect of scheduling on interfering links in general MHWN settings. We integrate this approach with a network flow routing model which works with aggregate estimates of capacity to improve the quality of the solution. Simulation results show that accounting for scheduling effects leads to large improvements in the quality of the solution.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
C/I gains in a single frequency network using TD-CDMA over a unicast network 在单播网络上使用TD-CDMA的单频网络中的C/I增益
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594907
S. Wong, T. Wilkinson, S. Stoker
This paper investigates the C/I gain of a single frequency network for an MBSFN network using TD-CDMA over an equivalent unicast network based on measurements from a trial network and simulations. It is shown that a cell edge C/I gain of 14.4 dB can be achieved in the trial network giving an increase of 59% in coverage by using a SFN over a unicast network.
本文在试验网络和仿真的基础上,研究了使用TD-CDMA的MBSFN网络在等效单播网络上的单频网络的C/I增益。结果表明,通过在单播网络上使用SFN,可以在试验网络中实现14.4 dB的小区边缘C/I增益,从而使覆盖范围增加59%。
{"title":"C/I gains in a single frequency network using TD-CDMA over a unicast network","authors":"S. Wong, T. Wilkinson, S. Stoker","doi":"10.1109/WOWMOM.2008.4594907","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594907","url":null,"abstract":"This paper investigates the C/I gain of a single frequency network for an MBSFN network using TD-CDMA over an equivalent unicast network based on measurements from a trial network and simulations. It is shown that a cell edge C/I gain of 14.4 dB can be achieved in the trial network giving an increase of 59% in coverage by using a SFN over a unicast network.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131164099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EMO: A statistical encounter-based mobility model for simulating delay tolerant networks EMO:一种用于模拟延迟容忍网络的基于统计遭遇的移动性模型
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594848
F. Tan, Youmna Borghol, S. Ardon
We propose EMO, a model to evaluate delay tolerant networks (DTN) and opportunistic systems, which focuses on simulating encounter events between mobile radios, rather than node locations as done in existing models and simulators. Our approach introduces a more accurate simulation of DTNs on the main system timescale (the encounter timescale), while trading off some accuracy at the bit-level, through an abstraction of radio propagation simulation. To design EMO, we extract and characterize the necessary parameters from experimental data and propose a method to generate synthetic node encounter traces based on this characterization. The output of the model is validated using hold-out cross-validation method. Our validation results indicate that EMO is able to maintain the statistical properties of experimental data over a wide range of time (simulation duration) and space (number of nodes) scales, with mean square errors of less than 3% for the main system parameters.
我们提出了EMO,一个评估延迟容忍网络(DTN)和机会系统的模型,它侧重于模拟移动无线电之间的遭遇事件,而不是像现有模型和模拟器那样模拟节点位置。我们的方法在主系统时间尺度(遭遇时间尺度)上引入了更精确的ddn模拟,同时通过无线电传播模拟的抽象,在比特级上权衡了一些精度。为了设计EMO,我们从实验数据中提取和表征必要的参数,并提出了一种基于此表征生成合成节点相遇轨迹的方法。模型的输出使用hold-out交叉验证方法进行验证。我们的验证结果表明,EMO能够在大范围的时间(模拟持续时间)和空间(节点数)尺度上保持实验数据的统计特性,主要系统参数的均方误差小于3%。
{"title":"EMO: A statistical encounter-based mobility model for simulating delay tolerant networks","authors":"F. Tan, Youmna Borghol, S. Ardon","doi":"10.1109/WOWMOM.2008.4594848","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594848","url":null,"abstract":"We propose EMO, a model to evaluate delay tolerant networks (DTN) and opportunistic systems, which focuses on simulating encounter events between mobile radios, rather than node locations as done in existing models and simulators. Our approach introduces a more accurate simulation of DTNs on the main system timescale (the encounter timescale), while trading off some accuracy at the bit-level, through an abstraction of radio propagation simulation. To design EMO, we extract and characterize the necessary parameters from experimental data and propose a method to generate synthetic node encounter traces based on this characterization. The output of the model is validated using hold-out cross-validation method. Our validation results indicate that EMO is able to maintain the statistical properties of experimental data over a wide range of time (simulation duration) and space (number of nodes) scales, with mean square errors of less than 3% for the main system parameters.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133301177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A method for minimizing unnecessary handovers in heterogeneous wireless networks 一种在异构无线网络中最小化不必要的切换的方法
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594871
Xiaohuan Yan, Y. Sekercioglu, N. Mani
In near future, various wireless access technologies will be used together to provide seamless and cost effective connectivity to mobile users. Multiple wireless access systems with overlapping coverage fields will be accessible to a mobile terminal with multiple interfaces. One problem arising from the availability of alternatives is the unnecessary occurrences of handovers (especially vertical ones) that lead to excessive resource consumption. To avoid this, a suite of algorithms need to be deployed to limit the number of handovers. In this paper, we present an algorithm which is run in the mobile terminal and minimizes the number of handovers when the device detects the presence of wireless local area network (WLAN) signals. Conventionally, a mobile terminal should switch from cellular to WLAN whenever WLAN connectivity is available, to make use of the WLAN's high speed and low cost as much as possible. However, a considerable proportion of these handovers will be detrimental to the call quality due to potential failures. Our algorithm reduces the number of handovers whenever the predicted traveling distance inside the WLAN cell is smaller than a threshold value. Through performance analysis we show that our algorithm successfully minimizes the probability of unnecessary handovers, and through simulation we discuss about the accuracy of the distance prediction based on the received signal strength measurements.
在不久的将来,各种无线接入技术将共同使用,为移动用户提供无缝和经济有效的连接。具有多个接口的移动终端将可以访问具有重叠覆盖域的多个无线接入系统。可获得替代方案所产生的一个问题是不必要的移交(特别是垂直移交),导致过度消耗资源。为了避免这种情况,需要部署一套算法来限制移交的数量。在本文中,我们提出了一种在移动终端上运行的算法,当设备检测到无线局域网(WLAN)信号时,该算法可以最大限度地减少切换次数。通常情况下,只要有无线局域网连接,移动终端就应该从蜂窝网络切换到无线局域网,以尽可能地利用无线局域网的高速和低成本。然而,由于潜在的故障,这些切换中的相当一部分将损害呼叫质量。我们的算法减少了当WLAN小区内的预测移动距离小于阈值时的切换次数。通过性能分析,我们表明我们的算法成功地最小化了不必要的切换概率,并通过仿真讨论了基于接收信号强度测量的距离预测的准确性。
{"title":"A method for minimizing unnecessary handovers in heterogeneous wireless networks","authors":"Xiaohuan Yan, Y. Sekercioglu, N. Mani","doi":"10.1109/WOWMOM.2008.4594871","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594871","url":null,"abstract":"In near future, various wireless access technologies will be used together to provide seamless and cost effective connectivity to mobile users. Multiple wireless access systems with overlapping coverage fields will be accessible to a mobile terminal with multiple interfaces. One problem arising from the availability of alternatives is the unnecessary occurrences of handovers (especially vertical ones) that lead to excessive resource consumption. To avoid this, a suite of algorithms need to be deployed to limit the number of handovers. In this paper, we present an algorithm which is run in the mobile terminal and minimizes the number of handovers when the device detects the presence of wireless local area network (WLAN) signals. Conventionally, a mobile terminal should switch from cellular to WLAN whenever WLAN connectivity is available, to make use of the WLAN's high speed and low cost as much as possible. However, a considerable proportion of these handovers will be detrimental to the call quality due to potential failures. Our algorithm reduces the number of handovers whenever the predicted traveling distance inside the WLAN cell is smaller than a threshold value. Through performance analysis we show that our algorithm successfully minimizes the probability of unnecessary handovers, and through simulation we discuss about the accuracy of the distance prediction based on the received signal strength measurements.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133974862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1