首页 > 最新文献

2014 IEEE Globecom Workshops (GC Wkshps)最新文献

英文 中文
MLFS: A multiple layers share file system for cloud computing MLFS:用于云计算的多层共享文件系统
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOMW.2014.7063413
Xiao Zhang, Wan Guo, Zhanhuai Li, Xiaonan Zhao, X. Qin
Cloud computing systems offer computing and storage resources at a low price. The users only pay for it when the VM(short for Virtual Machine) is running. While after VMs shut down, the vendors also need disk space to store multi-gigabyte VM images. Past studies use deduplication to reduce the space requirements, but it needs to calculate hash values of each block and store them. It also causes performance overhead costs to find identical content. In this paper, We propose a multiple layers file sharing system(MLFS) designed for cloud computing. It stores OS data, Application data, and user data in different layers. Multiple users share OS data layers. Application data are constructed according to users' selection, and they are deleted after VM shut down. We compare our solution with ordinary storage systems, storage systems with deduplication, the results show that MLFS can save more space than others, while achieving reasonable performance in file system I/O operating.
云计算系统以低廉的价格提供计算和存储资源。用户只在虚拟机(Virtual Machine)运行时付费。当虚拟机关闭后,供应商还需要磁盘空间来存储数gb的虚拟机映像。过去的研究使用重复数据删除来减少空间需求,但它需要计算每个块的哈希值并存储它们。它还会导致查找相同内容的性能开销。本文提出了一种面向云计算的多层文件共享系统(MLFS)。它将操作系统数据、应用程序数据和用户数据存储在不同的层。多个用户共享操作系统数据层。应用数据根据用户的选择构建,在虚拟机关闭后删除。将该解决方案与普通存储系统、具有重复数据删除功能的存储系统进行了比较,结果表明MLFS能够比其他存储系统节省更多的空间,同时在文件系统I/O操作方面取得了合理的性能。
{"title":"MLFS: A multiple layers share file system for cloud computing","authors":"Xiao Zhang, Wan Guo, Zhanhuai Li, Xiaonan Zhao, X. Qin","doi":"10.1109/GLOCOMW.2014.7063413","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063413","url":null,"abstract":"Cloud computing systems offer computing and storage resources at a low price. The users only pay for it when the VM(short for Virtual Machine) is running. While after VMs shut down, the vendors also need disk space to store multi-gigabyte VM images. Past studies use deduplication to reduce the space requirements, but it needs to calculate hash values of each block and store them. It also causes performance overhead costs to find identical content. In this paper, We propose a multiple layers file sharing system(MLFS) designed for cloud computing. It stores OS data, Application data, and user data in different layers. Multiple users share OS data layers. Application data are constructed according to users' selection, and they are deleted after VM shut down. We compare our solution with ordinary storage systems, storage systems with deduplication, the results show that MLFS can save more space than others, while achieving reasonable performance in file system I/O operating.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122480598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A unified approach for representing wireless channels using EM-based finite mixture of gamma distributions 使用基于em的有限混合伽马分布表示无线信道的统一方法
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOMW.2014.7063565
Omar Alhussein, S. Muhaidat, Jie Liang, Paul Yoo
We present a unified framework to evaluate the error rate performance of wireless networks over generalized fading channels. In particular, we propose a new approach to represent different fading distributions by mixture of Gamma distributions. The new approach relies on the expectation-maximization (EM) algorithm in conjunction with the so-called Newton-Raphson maximization algorithm. We show that our model provides similar performance to other existing state-of-art models in both accuracy and simplicity, where accuracy is analyzed by means of mean square error (MSE). In addition, we demonstrate that this algorithm may potentially approximate any fading channel, and thus we utilize it to model both composite and non-composite fading models. We derive novel closed form expression of the raw moments of a dual-hop fixed-gain cooperative network. We also study the effective capacity of the end-to-end SNR in such networks. Numerical simulation results are provided to corroborate the analytical findings.
我们提出了一个统一的框架来评估无线网络在广义衰落信道上的误码率性能。特别地,我们提出了一种用混合伽马分布来表示不同衰落分布的新方法。新方法依赖于期望最大化(EM)算法与所谓的牛顿-拉夫森最大化算法相结合。我们表明,我们的模型在准确性和简单性方面提供了与其他现有最先进模型相似的性能,其中准确性是通过均方误差(MSE)来分析的。此外,我们证明了该算法可以潜在地逼近任何衰落信道,因此我们利用它来建模复合和非复合衰落模型。导出了一种新的双跳固定增益合作网络原始矩的封闭表达式。我们还研究了这种网络中端到端信噪比的有效容量。数值模拟结果证实了分析结果。
{"title":"A unified approach for representing wireless channels using EM-based finite mixture of gamma distributions","authors":"Omar Alhussein, S. Muhaidat, Jie Liang, Paul Yoo","doi":"10.1109/GLOCOMW.2014.7063565","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063565","url":null,"abstract":"We present a unified framework to evaluate the error rate performance of wireless networks over generalized fading channels. In particular, we propose a new approach to represent different fading distributions by mixture of Gamma distributions. The new approach relies on the expectation-maximization (EM) algorithm in conjunction with the so-called Newton-Raphson maximization algorithm. We show that our model provides similar performance to other existing state-of-art models in both accuracy and simplicity, where accuracy is analyzed by means of mean square error (MSE). In addition, we demonstrate that this algorithm may potentially approximate any fading channel, and thus we utilize it to model both composite and non-composite fading models. We derive novel closed form expression of the raw moments of a dual-hop fixed-gain cooperative network. We also study the effective capacity of the end-to-end SNR in such networks. Numerical simulation results are provided to corroborate the analytical findings.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122735542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Dynamic resource allocation for video transcoding with QoS guaranteeing in cloud-based DASH system 基于云的DASH系统中具有QoS保证的视频转码动态资源分配
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOMW.2014.7063421
Yongyi Ran, Youkang Shi, E. Yang, Shuangwu Chen, Jian Yang
Due to diverse network conditions and heterogeneous devices, there may be various video demands with different video qualities and formats from the client side. Compared to keeping all necessary copies for the same video, video transcoding in real-time should be an essential solution. The complex nature of video transcoding enables cloud computing to be uniquely suitable for dynamically providing transcoding resource. However, due to the fluctuation and uncertainty of the future transcoding demand, it is still a challenge to dynamically determine the optimal resource allocation to save cost while guaranteeing the Quality of Service (QoS). Overload may result in the transcoding jitter and increase the lateness which directly affects video freezes while over-provisioning naturally increases the cost. To address this problem, in this paper, by defining the transcoding jitter probability as a metric of QoS, we proposed a dynamic resource allocation algorithm based on the large deviation principle, which is capable of proactive calculating the optimal number of transcoding nodes for the upcoming transcoding demand subject to the transcoding jitter probability below a desired threshold. Finally, the experiments are performed on a cloud-based prototype system to show the attainable performance of the proposed resource allocation algorithm and verify that the proposed algorithm can make a good tradeoff between cost saving and QoS guaranteeing.
由于网络条件的多样化和设备的异构性,客户端可能会有不同的视频需求,不同的视频质量和格式。与保留同一视频的所有必要副本相比,实时视频转码应该是一个必要的解决方案。视频转码的复杂性使得云计算非常适合动态提供转码资源。然而,由于未来转码需求的波动性和不确定性,如何在保证服务质量(QoS)的同时,动态确定最优的资源分配仍然是一个挑战。过载可能会导致转码抖动,增加延迟,直接影响视频死机,而过量自然会增加成本。针对这一问题,本文通过将转码抖动概率定义为QoS的度量,提出了一种基于大偏差原理的动态资源分配算法,该算法能够在转码抖动概率低于期望阈值的情况下,主动计算即将到来的转码需求的最优转码节点数。最后,在基于云的原型系统上进行了实验,验证了所提出的资源分配算法可以达到的性能,并验证了所提出的算法可以很好地在节省成本和保证QoS之间进行权衡。
{"title":"Dynamic resource allocation for video transcoding with QoS guaranteeing in cloud-based DASH system","authors":"Yongyi Ran, Youkang Shi, E. Yang, Shuangwu Chen, Jian Yang","doi":"10.1109/GLOCOMW.2014.7063421","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063421","url":null,"abstract":"Due to diverse network conditions and heterogeneous devices, there may be various video demands with different video qualities and formats from the client side. Compared to keeping all necessary copies for the same video, video transcoding in real-time should be an essential solution. The complex nature of video transcoding enables cloud computing to be uniquely suitable for dynamically providing transcoding resource. However, due to the fluctuation and uncertainty of the future transcoding demand, it is still a challenge to dynamically determine the optimal resource allocation to save cost while guaranteeing the Quality of Service (QoS). Overload may result in the transcoding jitter and increase the lateness which directly affects video freezes while over-provisioning naturally increases the cost. To address this problem, in this paper, by defining the transcoding jitter probability as a metric of QoS, we proposed a dynamic resource allocation algorithm based on the large deviation principle, which is capable of proactive calculating the optimal number of transcoding nodes for the upcoming transcoding demand subject to the transcoding jitter probability below a desired threshold. Finally, the experiments are performed on a cloud-based prototype system to show the attainable performance of the proposed resource allocation algorithm and verify that the proposed algorithm can make a good tradeoff between cost saving and QoS guaranteeing.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127798437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Physical-layer secret key generation with untrusted relays 使用不可信中继生成物理层密钥
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOMW.2014.7063627
C. Thai, Jemin Lee, Chi Cheng, Tony Q. S. Quek
In this paper, we propose a physical-layer secret key generation scheme for multi-antenna legitimate nodes with the help from multiple untrusted relays with single antenna. The relays' actions conform to the rules but they passively eavesdrop the information. Different from most previous key generation schemes, where a key is generated based on a channel coefficient, in the proposed scheme, we use the linear combination of channel coefficients to generate a key. Simulation results show that the rate leaked to the untrusted relays is low and the secret key rate is therefore high. We also point out that the relay communication can achieve higher secret key rate than the direct communication in several distance ranges.
本文提出了一种多天线合法节点的物理层密钥生成方案,该方案借助多个单天线的不可信中继。中继器的行为符合规则,但它们被动地窃听信息。与以往大多数基于信道系数生成密钥的密钥生成方案不同,在该方案中,我们使用信道系数的线性组合来生成密钥。仿真结果表明,该算法对不可信中继的泄漏速率较低,因此密钥速率较高。本文还指出,在若干距离范围内,中继通信比直接通信具有更高的密钥速率。
{"title":"Physical-layer secret key generation with untrusted relays","authors":"C. Thai, Jemin Lee, Chi Cheng, Tony Q. S. Quek","doi":"10.1109/GLOCOMW.2014.7063627","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063627","url":null,"abstract":"In this paper, we propose a physical-layer secret key generation scheme for multi-antenna legitimate nodes with the help from multiple untrusted relays with single antenna. The relays' actions conform to the rules but they passively eavesdrop the information. Different from most previous key generation schemes, where a key is generated based on a channel coefficient, in the proposed scheme, we use the linear combination of channel coefficients to generate a key. Simulation results show that the rate leaked to the untrusted relays is low and the secret key rate is therefore high. We also point out that the relay communication can achieve higher secret key rate than the direct communication in several distance ranges.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133907385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Jammer placement to partition wireless network 干扰器放置分区无线网络
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOMW.2014.7063644
Jixin Feng, Xin Li, E. Pasiliao, J. Shea
Wireless communication systems are susceptible to jamming attacks, and the use of unmanned vehicles brings new opportunities for coordinated jamming attacks. At the same time, systems of autonomous vehicles that coordinate their movements over a wireless network may be particularly vulnerable to jamming attacks that disrupt the control information. Much research has been conducted on how to efficiently jam single communication links and how to protect such links from jamming. However, less research has focused on problems of jamming attacks on the overall network. In this paper, we consider the problem of determining how to efficiently position jammers so as to partition a wireless network. The communication network is represented as a graph with the vertices representing the radios, and the edges representing the communication links. Although there has been extensive research into the problem of efficiently partitioning a graph via edge separators, the action of a jammer in a wireless network is more closely analogous to blocking reception at one or more radios, which may be modeled as partitioning a graph via node separators. We formulate several optimization problems for jammer placement. Since the optimal solution to these problems are computationally complex, we develop suboptimal solutions using spectral partitioning followed by greedy jammer placement and also a harmony search. The results show that these algorithms offer a tradeoff between complexity and performance. In the scenarios where we were able to compare performance with the optimal solution, the harmony search algorithm offered performance close to that of the optimal solution while requiring a much lower complexity.
无线通信系统容易受到干扰攻击,无人驾驶车辆的使用为协同干扰攻击带来了新的机会。与此同时,通过无线网络协调其运动的自动驾驶汽车系统可能特别容易受到干扰攻击,从而破坏控制信息。如何有效地干扰单个通信链路以及如何保护单个通信链路不受干扰已经进行了大量的研究。然而,对整个网络的干扰攻击问题的研究较少。在本文中,我们考虑如何确定有效的位置干扰,以划分无线网络的问题。通信网络用图形表示,顶点表示无线电,边表示通信链路。尽管对通过边缘分隔器有效划分图的问题已经进行了广泛的研究,但无线网络中干扰器的作用更接近于阻塞一个或多个无线电的接收,这可以建模为通过节点分隔器划分图。我们提出了干扰机布置的几个优化问题。由于这些问题的最优解在计算上是复杂的,我们开发了次优解,使用频谱划分,然后是贪婪干扰器放置和和声搜索。结果表明,这些算法在复杂性和性能之间进行了权衡。在我们能够将性能与最优解决方案进行比较的场景中,和声搜索算法提供了接近最优解决方案的性能,同时要求的复杂性要低得多。
{"title":"Jammer placement to partition wireless network","authors":"Jixin Feng, Xin Li, E. Pasiliao, J. Shea","doi":"10.1109/GLOCOMW.2014.7063644","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063644","url":null,"abstract":"Wireless communication systems are susceptible to jamming attacks, and the use of unmanned vehicles brings new opportunities for coordinated jamming attacks. At the same time, systems of autonomous vehicles that coordinate their movements over a wireless network may be particularly vulnerable to jamming attacks that disrupt the control information. Much research has been conducted on how to efficiently jam single communication links and how to protect such links from jamming. However, less research has focused on problems of jamming attacks on the overall network. In this paper, we consider the problem of determining how to efficiently position jammers so as to partition a wireless network. The communication network is represented as a graph with the vertices representing the radios, and the edges representing the communication links. Although there has been extensive research into the problem of efficiently partitioning a graph via edge separators, the action of a jammer in a wireless network is more closely analogous to blocking reception at one or more radios, which may be modeled as partitioning a graph via node separators. We formulate several optimization problems for jammer placement. Since the optimal solution to these problems are computationally complex, we develop suboptimal solutions using spectral partitioning followed by greedy jammer placement and also a harmony search. The results show that these algorithms offer a tradeoff between complexity and performance. In the scenarios where we were able to compare performance with the optimal solution, the harmony search algorithm offered performance close to that of the optimal solution while requiring a much lower complexity.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131787032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Clean relaying in cognitive radio networks with variational distance secrecy constraint 变距离保密约束下认知无线网络中的干净中继
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOMW.2014.7063619
Pin-Hsun Lin, Frederic Gabry, R. Thobaben, Eduard Axel Jorswieck, M. Skoglund
In this paper we investigate the cooperative secure communication in a four-node cognitive channel where the secondary receiver is treated as a potential eavesdropper with respect to the primary transmission with variational distance constraint. And the primary user's secrecy rate is required to be unchanged. We propose the clean relaying with the cooperative jamming scheme to achieve this goal, where the secondary transmitter splits its transmitting phase into two non-overlapped intervals after successfully decoding the primary message. Due to the considered secrecy metric, we resort to the information spectrum method, to derive the achievable secrecy rates for the primary user. Then we formulate the secondary user's rate maximization problem over the power allocation and time splitting at the cognitive transmitter under the constraint that primary user's secrecy rate is unchanged. Numerical results show that the secondary transmitter can choose clean relaying or pure cooperative jamming according to the relative positions of the nodes to achieve better performance than the one without any clean phase.
本文研究了一种四节点认知信道中的协作保密通信,在这种信道中,从接收端被视为潜在的窃听者,相对于具有变距离约束的主传输端。并且要求主用户的保密率保持不变。为了实现这一目标,我们提出了配合干扰的干净中继方案,其中二次发射机在成功解码主消息后将其发射相位分成两个不重叠的间隔。由于考虑了保密度量,我们采用信息谱方法,推导出主用户可实现的保密率。然后,在主用户保密率不变的约束下,提出了认知发射机上功率分配和时间分割的次用户保密率最大化问题。数值结果表明,二次发射机可以根据节点的相对位置选择干净中继或纯协同干扰,以获得比无干净相位时更好的性能。
{"title":"Clean relaying in cognitive radio networks with variational distance secrecy constraint","authors":"Pin-Hsun Lin, Frederic Gabry, R. Thobaben, Eduard Axel Jorswieck, M. Skoglund","doi":"10.1109/GLOCOMW.2014.7063619","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063619","url":null,"abstract":"In this paper we investigate the cooperative secure communication in a four-node cognitive channel where the secondary receiver is treated as a potential eavesdropper with respect to the primary transmission with variational distance constraint. And the primary user's secrecy rate is required to be unchanged. We propose the clean relaying with the cooperative jamming scheme to achieve this goal, where the secondary transmitter splits its transmitting phase into two non-overlapped intervals after successfully decoding the primary message. Due to the considered secrecy metric, we resort to the information spectrum method, to derive the achievable secrecy rates for the primary user. Then we formulate the secondary user's rate maximization problem over the power allocation and time splitting at the cognitive transmitter under the constraint that primary user's secrecy rate is unchanged. Numerical results show that the secondary transmitter can choose clean relaying or pure cooperative jamming according to the relative positions of the nodes to achieve better performance than the one without any clean phase.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123178515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhancing the DSRC reliability to allow the coexistence of VANET's applications 增强DSRC的可靠性,使VANET的应用能够共存
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOMW.2014.7063643
K. A. Hafeez, A. Anpalagan, Lian Zhao
The Dedicated Short Range Communication (DSRC) technology has been adopted by the IEEE community to enable safety and non-safety application for Vehicular Ad hoc Networks (VANETs). To better serve these two classes of applications, the DSRC standard divides the bandwidth into seven channels. One channel, called control channel (CCH) to serve safety applications and the other six channels, called service channels (SCHs) to serve non-safety applications. The DSRC standard specifies a channel switching scheme to allow vehicles to alternate between these two classes of application. The standard also recommends that vehicles should visit the CCH every 100ms, called Synchronization Interval (SI), to send and receive their status messages. It is highly desirable that these status messages be delivered to the neighbouring vehicles reliably and within an acceptable delay bound. It is obvious that increasing the time share of the CCH from the SI will increase the reliability of safety applications. In this paper, we will optimize the control channel access such that safety applications have a high successful transmission rate within their share of the SI interval. Moreover, a new algorithm, called Optimal Channel Access (OCA), will be introduced to enhance the performance of the DSRC while keeping the CCH I as small as possible. Hence non-safety applications will have a fair share of the DSRC bandwidth.
专用短距离通信(DSRC)技术已被IEEE社区采用,以实现车辆自组织网络(VANETs)的安全和非安全应用。为了更好地服务于这两类应用,DSRC标准将带宽分为7个通道。一个通道称为控制通道(CCH),服务于安全应用;另外六个通道称为服务通道(SCHs),服务于非安全应用。DSRC标准规定了一种通道切换方案,允许车辆在这两类应用程序之间交替进行。该标准还建议车辆应每100毫秒访问一次CCH,称为同步间隔(SI),以发送和接收状态信息。非常希望这些状态信息能够在可接受的延迟范围内可靠地传递给相邻车辆。显然,从SI中增加CCH的时间份额将提高安全应用的可靠性。在本文中,我们将优化控制通道访问,使安全应用在其SI区间内具有高的成功传输速率。此外,一种称为最优信道接入(OCA)的新算法将被引入,以提高DSRC的性能,同时保持CCH I尽可能小。因此,非安全应用程序将拥有DSRC带宽的公平份额。
{"title":"Enhancing the DSRC reliability to allow the coexistence of VANET's applications","authors":"K. A. Hafeez, A. Anpalagan, Lian Zhao","doi":"10.1109/GLOCOMW.2014.7063643","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063643","url":null,"abstract":"The Dedicated Short Range Communication (DSRC) technology has been adopted by the IEEE community to enable safety and non-safety application for Vehicular Ad hoc Networks (VANETs). To better serve these two classes of applications, the DSRC standard divides the bandwidth into seven channels. One channel, called control channel (CCH) to serve safety applications and the other six channels, called service channels (SCHs) to serve non-safety applications. The DSRC standard specifies a channel switching scheme to allow vehicles to alternate between these two classes of application. The standard also recommends that vehicles should visit the CCH every 100ms, called Synchronization Interval (SI), to send and receive their status messages. It is highly desirable that these status messages be delivered to the neighbouring vehicles reliably and within an acceptable delay bound. It is obvious that increasing the time share of the CCH from the SI will increase the reliability of safety applications. In this paper, we will optimize the control channel access such that safety applications have a high successful transmission rate within their share of the SI interval. Moreover, a new algorithm, called Optimal Channel Access (OCA), will be introduced to enhance the performance of the DSRC while keeping the CCH I as small as possible. Hence non-safety applications will have a fair share of the DSRC bandwidth.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134560675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic resource optimization with congestion control in heterogeneous cloud radio access networks 异构云无线接入网络中具有拥塞控制的动态资源优化
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOMW.2014.7063548
Jian Li, M. Peng, Y. Yu, Aolin Cheng
The heterogeneous cloud radio access networks (H-CRANs) are presented in this paper as a promising new paradigm for future heterogeneous converged networks. To maintain low traffic queue congestion and make the sum utility of average throughput arbitrarily close to the optimum, the dynamic optimization problem of traffic admission control, heterogeneous processing node (HPN)/remote radio head (RRH) association, resource block (RB) and power allocation subject to the average power consumption constraints of RRHs is formulated using the general framework of Lyapunov optimization. The optimization problem can be decomposed into three subproblems. To solve the third mixed-integer subproblem, the continuity relaxation is utilized and the optimality can be still preserved. Finally, the simulation results validate the out-performances of the proposed solution with appropriate control parameter.
本文提出了异构云无线接入网(H-CRANs)作为未来异构融合网络的新范式。为了保持低流量队列拥塞,并使平均吞吐量的总效用任意接近最优,采用Lyapunov优化的一般框架,建立了受RRH平均功耗约束的流量接纳控制、异构处理节点(HPN)/远程无线电头(RRH)关联、资源块(RB)和功率分配的动态优化问题。优化问题可分解为三个子问题。在求解混合整数子问题时,利用了连续松弛,保证了最优性。最后,仿真结果验证了该方法在适当控制参数下的优越性能。
{"title":"Dynamic resource optimization with congestion control in heterogeneous cloud radio access networks","authors":"Jian Li, M. Peng, Y. Yu, Aolin Cheng","doi":"10.1109/GLOCOMW.2014.7063548","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063548","url":null,"abstract":"The heterogeneous cloud radio access networks (H-CRANs) are presented in this paper as a promising new paradigm for future heterogeneous converged networks. To maintain low traffic queue congestion and make the sum utility of average throughput arbitrarily close to the optimum, the dynamic optimization problem of traffic admission control, heterogeneous processing node (HPN)/remote radio head (RRH) association, resource block (RB) and power allocation subject to the average power consumption constraints of RRHs is formulated using the general framework of Lyapunov optimization. The optimization problem can be decomposed into three subproblems. To solve the third mixed-integer subproblem, the continuity relaxation is utilized and the optimality can be still preserved. Finally, the simulation results validate the out-performances of the proposed solution with appropriate control parameter.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134321483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Coordinated multi-robot exploration: Out of the box packages for ROS 协调的多机器人探索:ROS的开箱即用包
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOMW.2014.7063639
Torsten Andre, Daniel Neuhold, C. Bettstetter
We present and evaluate new ROS packages for coordinated multi-robot exploration, namely communication, global map construction, and exploration. The packages allow completely distributed control and do not rely on (but allow) central controllers. Their integration including application layer protocols allows out of the box installation and execution. The communication package enables reliable ad hoc communication allowing to exchange local maps between robots which are merged to a global map. Exploration uses the global map to spatially spread robots and decrease exploration time. The intention of the implementation is to offer basic functionality for coordinated multi-robot systems and to enable other research groups to experimentally work on multi-robot systems. The packages are tested in real-world experiments using Turtlebot and Pioneer robots. Further, we analyze their performance using simulations and verify their correct working.
我们提出并评估了用于协调多机器人探索的新的ROS包,即通信,全球地图构建和探索。这些包允许完全分布式控制,不依赖(但允许)中央控制器。它们的集成(包括应用层协议)允许开箱即用的安装和执行。通信包可以实现可靠的临时通信,允许在机器人之间交换合并到全局地图的本地地图。探索使用全局地图在空间上分散机器人,减少探索时间。实现的目的是为协调多机器人系统提供基本功能,并使其他研究小组能够在多机器人系统上进行实验工作。这些包装在现实世界的实验中使用了Turtlebot和Pioneer机器人进行测试。进一步,我们用仿真分析了它们的性能,验证了它们的正确工作。
{"title":"Coordinated multi-robot exploration: Out of the box packages for ROS","authors":"Torsten Andre, Daniel Neuhold, C. Bettstetter","doi":"10.1109/GLOCOMW.2014.7063639","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063639","url":null,"abstract":"We present and evaluate new ROS packages for coordinated multi-robot exploration, namely communication, global map construction, and exploration. The packages allow completely distributed control and do not rely on (but allow) central controllers. Their integration including application layer protocols allows out of the box installation and execution. The communication package enables reliable ad hoc communication allowing to exchange local maps between robots which are merged to a global map. Exploration uses the global map to spatially spread robots and decrease exploration time. The intention of the implementation is to offer basic functionality for coordinated multi-robot systems and to enable other research groups to experimentally work on multi-robot systems. The packages are tested in real-world experiments using Turtlebot and Pioneer robots. Further, we analyze their performance using simulations and verify their correct working.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132692521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Wavelength dependence of a fiber-bundle based FSO link 基于光纤束的FSO链路的波长依赖性
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOMW.2014.7063480
P. Lopresti, N. Hutchins, Steven Kohrmann, M. F. Babelli, H. Refai
A transmitter and receiver design based on the use of fiber optic bundles have been proposed and studied both experimentally in the laboratory and theoretically through simulation, and have shown promise for providing enhanced functionality in mitigating the effects of turbulence and weather on the pointing, acquisition and tracking problem. In this paper, the operation of an FSO link constructed from these designs is analyzed under similar environmental conditions but transmitting at two different wavelengths. A transmitter with a linear fiber array transmitted over a brick surface at either 1310 nm or 1550 nm wavelength to a receiver constructed using a hexagonal array of 19 fibers located 15 feet away. Data at 100 kb/s was transmitted across the link and the collected signal was recorded for off-line statistical analysis, including achieved bit-error rate. The investigation finds that, when eliminating effects due to artifacts in source operation, dependence of link operation on wavelength is minimal, even though the optical alignment was optimized for only 1550 nm.
提出了一种基于光纤束的发射器和接收器设计,并通过实验室实验和理论模拟进行了研究,并显示出在减轻湍流和天气对指向、获取和跟踪问题的影响方面提供增强功能的希望。在本文中,分析了在相似的环境条件下,由这些设计构成的FSO链路在两个不同波长下的运行情况。一种具有线性光纤阵列的发射器,以1310nm或1550nm波长在砖表面上传输到位于15英尺远的由19根光纤组成的六角形阵列的接收器。以100kb /s的速度在链路上传输数据,并将采集到的信号记录下来进行离线统计分析,包括实现的误码率。研究发现,当消除源操作中的伪影影响时,链路操作对波长的依赖最小,即使光学对准仅优化为1550 nm。
{"title":"Wavelength dependence of a fiber-bundle based FSO link","authors":"P. Lopresti, N. Hutchins, Steven Kohrmann, M. F. Babelli, H. Refai","doi":"10.1109/GLOCOMW.2014.7063480","DOIUrl":"https://doi.org/10.1109/GLOCOMW.2014.7063480","url":null,"abstract":"A transmitter and receiver design based on the use of fiber optic bundles have been proposed and studied both experimentally in the laboratory and theoretically through simulation, and have shown promise for providing enhanced functionality in mitigating the effects of turbulence and weather on the pointing, acquisition and tracking problem. In this paper, the operation of an FSO link constructed from these designs is analyzed under similar environmental conditions but transmitting at two different wavelengths. A transmitter with a linear fiber array transmitted over a brick surface at either 1310 nm or 1550 nm wavelength to a receiver constructed using a hexagonal array of 19 fibers located 15 feet away. Data at 100 kb/s was transmitted across the link and the collected signal was recorded for off-line statistical analysis, including achieved bit-error rate. The investigation finds that, when eliminating effects due to artifacts in source operation, dependence of link operation on wavelength is minimal, even though the optical alignment was optimized for only 1550 nm.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2014 IEEE Globecom Workshops (GC Wkshps)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1