首页 > 最新文献

2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks最新文献

英文 中文
Wireless reliability: Rethinking 802.11 packet loss 无线可靠性:重新考虑802.11丢包
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594875
D. Salyers, A. Striegel, C. Poellabauer
Wireless enabled devices are ubiquitous in todaypsilas computing environment. Businesses, universities, and home users alike are taking advantage of the easy deployment of wireless devices to provide network connectivity without the expense associated with wired connections. Unfortunately, the wireless medium is inherently unreliable resulting in significant work having been performed to better understand the characteristics of the wireless environment. Notably, many works attribute the primary source of wireless losses to errors in the physical medium. In contrast, our work shows that the wireless device itself plays a significant role in 802.11 packet loss. In our experiments, we found that the correlation of loss between multiple closely located (within one lambda) receivers is low with the majority of loss instances only occurring at one of the receivers. We conducted extensive experiments on the individual loss characteristics of five common wireless cards, showing that while the cards behave similarly on the macro-level (e.g. similar overall loss rates), the cards perform quite differently on the micro-level (e.g. burstiness, correlation, and consistency).
无线设备在当今的计算环境中无处不在。企业、大学和家庭用户都在利用易于部署的无线设备来提供网络连接,而不需要有线连接的费用。不幸的是,无线介质本质上是不可靠的,因此需要进行大量的工作来更好地理解无线环境的特性。值得注意的是,许多工作将无线损耗的主要来源归因于物理介质中的误差。相反,我们的研究表明,无线设备本身在802.11丢包中起着重要作用。在我们的实验中,我们发现多个紧密位置(在一个lambda内)接收器之间的损失相关性很低,大多数损失实例仅发生在其中一个接收器上。我们对五种常见无线卡的单个损耗特性进行了广泛的实验,结果表明,尽管这些卡在宏观层面上表现相似(例如,相似的总损失率),但它们在微观层面上的表现却截然不同(例如,爆裂性、相关性和一致性)。
{"title":"Wireless reliability: Rethinking 802.11 packet loss","authors":"D. Salyers, A. Striegel, C. Poellabauer","doi":"10.1109/WOWMOM.2008.4594875","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594875","url":null,"abstract":"Wireless enabled devices are ubiquitous in todaypsilas computing environment. Businesses, universities, and home users alike are taking advantage of the easy deployment of wireless devices to provide network connectivity without the expense associated with wired connections. Unfortunately, the wireless medium is inherently unreliable resulting in significant work having been performed to better understand the characteristics of the wireless environment. Notably, many works attribute the primary source of wireless losses to errors in the physical medium. In contrast, our work shows that the wireless device itself plays a significant role in 802.11 packet loss. In our experiments, we found that the correlation of loss between multiple closely located (within one lambda) receivers is low with the majority of loss instances only occurring at one of the receivers. We conducted extensive experiments on the individual loss characteristics of five common wireless cards, showing that while the cards behave similarly on the macro-level (e.g. similar overall loss rates), the cards perform quite differently on the micro-level (e.g. burstiness, correlation, and consistency).","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115633014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Geographical location based RFID tracking system 基于地理位置的RFID跟踪系统
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594880
Sungjun Kim, Doohyun Ko, Sunshin An
A large number of RFID system support location based service. This RFID Location System based on the general purposed geographic location code supports monitoring of the RFID tags in real time effectively. To identify the RFID tags, we allocate the general purposed geographic location code for each region. Throughout this system, the distribution and services related with RFID can easily manage the objects.
大量的RFID系统支持基于位置的服务。基于通用地理位置码的RFID定位系统能够有效地支持对RFID标签的实时监控。为了识别RFID标签,我们为每个区域分配通用的地理位置代码。在整个系统中,与RFID相关的分发和服务可以方便地管理对象。
{"title":"Geographical location based RFID tracking system","authors":"Sungjun Kim, Doohyun Ko, Sunshin An","doi":"10.1109/WOWMOM.2008.4594880","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594880","url":null,"abstract":"A large number of RFID system support location based service. This RFID Location System based on the general purposed geographic location code supports monitoring of the RFID tags in real time effectively. To identify the RFID tags, we allocate the general purposed geographic location code for each region. Throughout this system, the distribution and services related with RFID can easily manage the objects.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123947264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Power and performance characteristics of USB flash drives USB闪存驱动器的电源和性能特征
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594868
Kyle O'Brien, D. Salyers, A. Striegel, C. Poellabauer
Even though their capacities are still orders of magnitude lower than those of hard disks, flash storage systems are rapidly gaining importance in energy-constrained systems. This paper focuses on USB flash drives, which can provide portable storage to mobile systems or storage to systems that otherwise do not have persistent storage opportunities (e.g., low-power sensor devices). The paper presents studies relating to power consumption, energy overheads and benefits, and performance impacts of USB flash drives. The key insights obtained from these experiments are that (i) read/write costs are not significantly greater than idle costs and (ii) the size of the flash itself has only limited bearing on energy consumption.
尽管它们的容量仍然比硬盘低几个数量级,但闪存存储系统在能量受限的系统中正迅速变得越来越重要。本文的重点是USB闪存驱动器,它可以为移动系统提供便携式存储,或者为没有持久存储机会的系统提供存储(例如,低功耗传感器设备)。本文介绍了与USB闪存驱动器的功耗,能源开销和效益以及性能影响有关的研究。从这些实验中获得的关键见解是:(i)读/写成本并不明显大于空闲成本,(ii)闪存本身的大小对能量消耗的影响有限。
{"title":"Power and performance characteristics of USB flash drives","authors":"Kyle O'Brien, D. Salyers, A. Striegel, C. Poellabauer","doi":"10.1109/WOWMOM.2008.4594868","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594868","url":null,"abstract":"Even though their capacities are still orders of magnitude lower than those of hard disks, flash storage systems are rapidly gaining importance in energy-constrained systems. This paper focuses on USB flash drives, which can provide portable storage to mobile systems or storage to systems that otherwise do not have persistent storage opportunities (e.g., low-power sensor devices). The paper presents studies relating to power consumption, energy overheads and benefits, and performance impacts of USB flash drives. The key insights obtained from these experiments are that (i) read/write costs are not significantly greater than idle costs and (ii) the size of the flash itself has only limited bearing on energy consumption.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121195060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
FEW-PNets - A framework for emulation of wireless personal networks 一个用于模拟无线个人网络的框架
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594826
R. V. Prasad, Yonghua Li, M. Jacobsson, A. Lo, I. Niemegeers
With the advent of miniaturization and higher computing capabilities of wireless devices, there is an exponential rise in the number of devices such as personal digital assistants, etc. Application development for these devices is the main focus for many device manufacturers and software developers. The applications developed need to be tested and tried before releasing it to the market. There are cross-compilers to produce the binary files of the software applications that can run on these devices. However, it is rather difficult for developers to test it on the actual devices every time a change is made in the program. Further, a wireless network infrastructure should also be in place for testing. To expedite application development FEW-PNets - a Framework for Emulation of Wireless Personal Networks is proposed. It is a networked application to emulate a Personal Network (PN) owned by a person. It supports emulation of the most functions of PNs. We explain our model by emulating simple PN devices. In this article we elucidate the concepts, advantages, application domains and limitations of FEW-PNets.
随着无线设备的小型化和更高的计算能力的出现,个人数字助理等设备的数量呈指数级增长。这些设备的应用程序开发是许多设备制造商和软件开发人员的主要关注点。开发的应用程序在发布到市场之前需要进行测试和尝试。有交叉编译器生成可以在这些设备上运行的软件应用程序的二进制文件。然而,对于开发人员来说,每次在程序中进行更改时都要在实际设备上进行测试是相当困难的。此外,还应该准备好无线网络基础设施进行测试。为了加快应用开发,提出了一种无线个人网络仿真框架——FEW-PNets。它是一个模拟个人拥有的个人网络(PN)的网络应用程序。它支持对pn的大部分功能进行仿真。我们通过模拟简单的PN器件来解释我们的模型。本文阐述了FEW-PNets的概念、优点、应用领域和局限性。
{"title":"FEW-PNets - A framework for emulation of wireless personal networks","authors":"R. V. Prasad, Yonghua Li, M. Jacobsson, A. Lo, I. Niemegeers","doi":"10.1109/WOWMOM.2008.4594826","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594826","url":null,"abstract":"With the advent of miniaturization and higher computing capabilities of wireless devices, there is an exponential rise in the number of devices such as personal digital assistants, etc. Application development for these devices is the main focus for many device manufacturers and software developers. The applications developed need to be tested and tried before releasing it to the market. There are cross-compilers to produce the binary files of the software applications that can run on these devices. However, it is rather difficult for developers to test it on the actual devices every time a change is made in the program. Further, a wireless network infrastructure should also be in place for testing. To expedite application development FEW-PNets - a Framework for Emulation of Wireless Personal Networks is proposed. It is a networked application to emulate a Personal Network (PN) owned by a person. It supports emulation of the most functions of PNs. We explain our model by emulating simple PN devices. In this article we elucidate the concepts, advantages, application domains and limitations of FEW-PNets.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123466680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneous modulation for trading-off energy balancing with bandwidth efficiency in hierarchical sensor networks 基于异构调制的分层传感器网络能量平衡与带宽效率平衡
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594876
M. Soltan, Inkwon Hwang, Massoud Pedram
With power efficiency and lifetime awareness becoming critical design concerns in wireless sensor networks (WSN), it has become essential to exploit the physical layer characteristics at the system deployment stage. This paper focuses on how certain physical layer attributes can affect both the lifetime and the end-to-end delay in a hierarchical WSN. We present a heterogeneous modulation scheme and report its impact on the spatial distribution of energy dissipation and the resulting network lifetime. Moreover, we study how this heterogeneous modulation scheme affects the end-to-end delay due to inherent trade-offs in power efficiency and bandwidth efficiency of the different modulation schemes.
随着功率效率和寿命感知成为无线传感器网络(WSN)设计中的关键问题,在系统部署阶段利用物理层特性变得至关重要。本文主要研究了分层WSN中某些物理层属性对生存期和端到端时延的影响。我们提出了一种异构调制方案,并报告了它对能量耗散的空间分布和由此产生的网络寿命的影响。此外,我们还研究了由于不同调制方案在功率效率和带宽效率上的固有权衡,这种异构调制方案如何影响端到端延迟。
{"title":"Heterogeneous modulation for trading-off energy balancing with bandwidth efficiency in hierarchical sensor networks","authors":"M. Soltan, Inkwon Hwang, Massoud Pedram","doi":"10.1109/WOWMOM.2008.4594876","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594876","url":null,"abstract":"With power efficiency and lifetime awareness becoming critical design concerns in wireless sensor networks (WSN), it has become essential to exploit the physical layer characteristics at the system deployment stage. This paper focuses on how certain physical layer attributes can affect both the lifetime and the end-to-end delay in a hierarchical WSN. We present a heterogeneous modulation scheme and report its impact on the spatial distribution of energy dissipation and the resulting network lifetime. Moreover, we study how this heterogeneous modulation scheme affects the end-to-end delay due to inherent trade-offs in power efficiency and bandwidth efficiency of the different modulation schemes.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125085372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure data recollection for redundantly deployed wireless sensor networks 冗余部署无线传感器网络的安全数据回收
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594925
Luis E. Palafox, J. A. García-Macías
Monitoring the environment is one of the main applications of wireless sensor networks. Given that these networks are densely populated and that local variations in the environmental variables are small, a large amount of redundant data is generated by sensor nodes. In this paper we present a protocol for data dissemination in hierarchical sensor networks that integrates security and reduces communication overhead by removing data redundancy from the network. Furthermore, we show that by using our protocol we can provide security to the network without spending additional energy resources, particularly when we are dealing with high levels of redundancy.
环境监测是无线传感器网络的主要应用之一。由于这些网络人口密集,环境变量的局部变化很小,传感器节点会产生大量冗余数据。在本文中,我们提出了一种在分层传感器网络中数据传播的协议,该协议通过消除网络中的数据冗余来集成安全性并降低通信开销。此外,我们表明,通过使用我们的协议,我们可以在不花费额外能源的情况下为网络提供安全性,特别是当我们处理高冗余级别时。
{"title":"Secure data recollection for redundantly deployed wireless sensor networks","authors":"Luis E. Palafox, J. A. García-Macías","doi":"10.1109/WOWMOM.2008.4594925","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594925","url":null,"abstract":"Monitoring the environment is one of the main applications of wireless sensor networks. Given that these networks are densely populated and that local variations in the environmental variables are small, a large amount of redundant data is generated by sensor nodes. In this paper we present a protocol for data dissemination in hierarchical sensor networks that integrates security and reduces communication overhead by removing data redundancy from the network. Furthermore, we show that by using our protocol we can provide security to the network without spending additional energy resources, particularly when we are dealing with high levels of redundancy.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":"40 7 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Camouflaging mobility for itinerary privacy in mobile ad-hoc networks 移动自组织网络中伪装机动性的行程隐私
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594920
Lei Tang, X. Hong, Susan V. Vrbsky
The privacy of wireless communications is becoming an important issue due to the open nature of wireless medium. Much research work has been proposed to address the anonymity of communicating parties, the location privacy of the message source and destination, and the privacy of the network routing paths. However, with the advent of new radio identification and localization techniques, more advanced privacy attacks are possible. We describe a new privacy attack in which the adversary tries to infer the itineraries of the nodes in the network. To protect itinerary privacy, we design an algorithm, called the Delta-mobility camouflaging algorithm, which can be applied upon any mobility model by changing the original motion segments into Delta-shaped camouflaging paths. Our analysis results show that the Delta-mobility camouflaging algorithm is cost-effective, which in most cases decreases the itinerary exposure probability more than 80% at a cost of less than 3% extra travel distance.
由于无线媒体的开放性,无线通信的保密性成为一个重要的问题。为了解决通信方的匿名性、消息源和目的地的位置隐私以及网络路由路径的隐私,已经提出了大量的研究工作。然而,随着新的无线电识别和定位技术的出现,更高级的隐私攻击成为可能。我们描述了一种新的隐私攻击,攻击者试图推断网络中节点的行程。为了保护行程隐私,我们设计了一种算法,称为Delta-mobility伪装算法,该算法通过将原始运动段变为delta形伪装路径,可以应用于任何移动模型。分析结果表明,Delta-mobility伪装算法具有成本效益,在大多数情况下,以不到3%的额外行程距离为代价,将行程暴露概率降低80%以上。
{"title":"Camouflaging mobility for itinerary privacy in mobile ad-hoc networks","authors":"Lei Tang, X. Hong, Susan V. Vrbsky","doi":"10.1109/WOWMOM.2008.4594920","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594920","url":null,"abstract":"The privacy of wireless communications is becoming an important issue due to the open nature of wireless medium. Much research work has been proposed to address the anonymity of communicating parties, the location privacy of the message source and destination, and the privacy of the network routing paths. However, with the advent of new radio identification and localization techniques, more advanced privacy attacks are possible. We describe a new privacy attack in which the adversary tries to infer the itineraries of the nodes in the network. To protect itinerary privacy, we design an algorithm, called the Delta-mobility camouflaging algorithm, which can be applied upon any mobility model by changing the original motion segments into Delta-shaped camouflaging paths. Our analysis results show that the Delta-mobility camouflaging algorithm is cost-effective, which in most cases decreases the itinerary exposure probability more than 80% at a cost of less than 3% extra travel distance.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127348352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance measurement over Mobile WiMAX/IEEE 802.16e network 基于移动WiMAX/IEEE 802.16e网络的性能测量
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594817
Dongmyoung Kim, Hua Cai, Minsoo Na, Sunghyun Choi
WiBro (Wireless Broadband) is a Korean version of Mobile WiMAX/IEEE 802.16e system, which is designed for mobile broadband wireless access. Being a subset of IEEE 802.16e, WiBro employs orthogonal frequency division multiple access (OFDMA) and time division duplexing (TDD) schemes operating at 2.3 GHz bands. In mid 2006, the world first commercial Mobile WiMAX service, based on WiBro specification, started in Seoul, Korea. In this paper, we analyze the performance of commercial WiBro networks through traffic measurements. Many experiments are conducted in the various environments. We analyze the link capacity when the user datagram protocol (UDP) packets from multiple users fully utilize wireless links. We also analyze goodput performance with transmission control protocol (TCP) as well as round trip time performance. The measured performances are compared with those of HSDPA (High-Speed Downlink Packet Access) which is a competing system of Mobile WiMAX. We found that the RTTs of WiBro and HSDPA are very large compared with conventional data networks, e.g., Ethernet or Wireless LANs. Furthermore, it is shown that the user-perceived performance is limited by such long round trip times when TCP is utilized. It motivates us to improve round trip time performance of WiBro system. Finally, we analyze the VoIP performance and the performance when the user moves around the whole city.
WiBro(无线宽带)是为移动宽带无线接入而设计的移动WiMAX/IEEE 802.16e系统的韩国版。作为IEEE 802.16e的子集,WiBro采用在2.3 GHz频段工作的正交频分多址(OFDMA)和时分双工(TDD)方案。2006年年中,世界上第一个基于WiBro规范的商用移动WiMAX服务在韩国首尔启动。在本文中,我们通过流量测量来分析商用WiBro网络的性能。许多实验是在不同的环境中进行的。我们分析了当来自多个用户的用户数据报协议(UDP)数据包充分利用无线链路时的链路容量。我们还分析了传输控制协议(TCP)的良好性能以及往返时间性能。并与移动WiMAX的竞争对手HSDPA(高速下行分组接入)系统进行了性能比较。我们发现,与传统的数据网络(如以太网或无线局域网)相比,WiBro和HSDPA的rtt非常大。此外,研究表明,当使用TCP时,用户感知的性能受到如此长的往返时间的限制。这激励我们提高WiBro系统的往返时间性能。最后,我们分析了VoIP的性能以及用户在整个城市内移动时的性能。
{"title":"Performance measurement over Mobile WiMAX/IEEE 802.16e network","authors":"Dongmyoung Kim, Hua Cai, Minsoo Na, Sunghyun Choi","doi":"10.1109/WOWMOM.2008.4594817","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594817","url":null,"abstract":"WiBro (Wireless Broadband) is a Korean version of Mobile WiMAX/IEEE 802.16e system, which is designed for mobile broadband wireless access. Being a subset of IEEE 802.16e, WiBro employs orthogonal frequency division multiple access (OFDMA) and time division duplexing (TDD) schemes operating at 2.3 GHz bands. In mid 2006, the world first commercial Mobile WiMAX service, based on WiBro specification, started in Seoul, Korea. In this paper, we analyze the performance of commercial WiBro networks through traffic measurements. Many experiments are conducted in the various environments. We analyze the link capacity when the user datagram protocol (UDP) packets from multiple users fully utilize wireless links. We also analyze goodput performance with transmission control protocol (TCP) as well as round trip time performance. The measured performances are compared with those of HSDPA (High-Speed Downlink Packet Access) which is a competing system of Mobile WiMAX. We found that the RTTs of WiBro and HSDPA are very large compared with conventional data networks, e.g., Ethernet or Wireless LANs. Furthermore, it is shown that the user-perceived performance is limited by such long round trip times when TCP is utilized. It motivates us to improve round trip time performance of WiBro system. Finally, we analyze the VoIP performance and the performance when the user moves around the whole city.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127456801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Adaptive encryption for the realization of real-time transmission of sensitive medical video streams 自适应加密实现敏感医疗视频流的实时传输
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594915
Kai Kamphenkel, M. Blank, Jens Bauer, G. Carle
This paper presents an analysis of the potential of adaptive encryption of streaming video data over 3G networks. The results obtained promote the design of a network component (the so called ldquointelligent networkrdquo) that facilitates the secure real-time transmission of video data. Case studies involving the sensitive area of telemedicine can be implemented by means of this component. The transport layer protocol SCTP is the basis for technical realization, which has interesting features and extensions. The combination of these features and the management of the intelligent network allows the implementation of sensitive applications.
本文分析了在3G网络上对流视频数据进行自适应加密的潜力。所得结果促进了网络组件(所谓的ldquo智能网络)的设计,促进了视频数据的安全实时传输。涉及远程医疗敏感领域的案例研究可以通过该组件实现。传输层协议SCTP是技术实现的基础,它具有有趣的特性和扩展。这些功能和智能网络管理的结合允许实现敏感的应用程序。
{"title":"Adaptive encryption for the realization of real-time transmission of sensitive medical video streams","authors":"Kai Kamphenkel, M. Blank, Jens Bauer, G. Carle","doi":"10.1109/WOWMOM.2008.4594915","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594915","url":null,"abstract":"This paper presents an analysis of the potential of adaptive encryption of streaming video data over 3G networks. The results obtained promote the design of a network component (the so called ldquointelligent networkrdquo) that facilitates the secure real-time transmission of video data. Case studies involving the sensitive area of telemedicine can be implemented by means of this component. The transport layer protocol SCTP is the basis for technical realization, which has interesting features and extensions. The combination of these features and the management of the intelligent network allows the implementation of sensitive applications.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131643474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A comparative study of data transport protocols in wireless sensor networks 无线传感器网络中数据传输协议的比较研究
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594822
F. Shaikh, Abdelmajid Khelil, N. Suri
Several proposals describing transport layer protocols for sensor networks appear in the literature. As each proposal is typically evaluated in the context of carefully selected parameters and scenarios, the benefits can be subjective. Also, given the limited details available of different proposals, it is difficult for developers of sensor network applications to select from the range of alternative transport protocols. This paper develops a common basis for evaluation of varied proposals. We first classify and review the existing protocols and evaluate them by measuring their performance in terms of responsiveness and efficiency in a conformal simulation environment and for a wide range of operational conditions. Common sources of poor performance are identified. Based on this experience, a set of design principles for the designers of applications and future transport protocols is presented.
文献中出现了几个描述传感器网络传输层协议的建议。由于每个提案通常都是在精心选择的参数和场景的上下文中进行评估的,因此收益可能是主观的。此外,鉴于不同提案的可用细节有限,传感器网络应用程序的开发人员很难从备选传输协议的范围中进行选择。本文为各种提案的评估提供了一个共同的基础。我们首先对现有协议进行分类和审查,并通过在保形模拟环境和广泛的操作条件下测量其响应性和效率方面的性能来评估它们。确定了性能差的常见来源。在此基础上,提出了一套适用于应用程序设计者和未来传输协议设计者的设计原则。
{"title":"A comparative study of data transport protocols in wireless sensor networks","authors":"F. Shaikh, Abdelmajid Khelil, N. Suri","doi":"10.1109/WOWMOM.2008.4594822","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594822","url":null,"abstract":"Several proposals describing transport layer protocols for sensor networks appear in the literature. As each proposal is typically evaluated in the context of carefully selected parameters and scenarios, the benefits can be subjective. Also, given the limited details available of different proposals, it is difficult for developers of sensor network applications to select from the range of alternative transport protocols. This paper develops a common basis for evaluation of varied proposals. We first classify and review the existing protocols and evaluate them by measuring their performance in terms of responsiveness and efficiency in a conformal simulation environment and for a wide range of operational conditions. Common sources of poor performance are identified. Based on this experience, a set of design principles for the designers of applications and future transport protocols is presented.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":"22 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132545474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1