首页 > 最新文献

2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)最新文献

英文 中文
Building a Private Currency Service Using Exonum 使用Exonum构建私人货币服务
Pub Date : 2019-06-01 DOI: 10.1109/BlackSeaCom.2019.8812875
D. Korepanova, Maria Nosyk, A. Ostrovsky, Y. Yanovich
Zero-knowledge proofs are an emerging cryptographic technology that have many potential applications for blockchains. Exonum is an extensible open-source framework for creating blockchain applications. In this article, we describe how zero-knowledge proofs, specifically bulletproofs, can be applied to build a privacy-focused service using Exonum. The token logic is implemented as a platform service and is a proof of concept.
零知识证明是一种新兴的加密技术,对区块链有许多潜在的应用。Exonum是一个用于创建区块链应用程序的可扩展开源框架。在本文中,我们将描述如何将零知识证明(特别是防弹证明)应用于使用Exonum构建以隐私为中心的服务。令牌逻辑是作为平台服务实现的,是概念的证明。
{"title":"Building a Private Currency Service Using Exonum","authors":"D. Korepanova, Maria Nosyk, A. Ostrovsky, Y. Yanovich","doi":"10.1109/BlackSeaCom.2019.8812875","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2019.8812875","url":null,"abstract":"Zero-knowledge proofs are an emerging cryptographic technology that have many potential applications for blockchains. Exonum is an extensible open-source framework for creating blockchain applications. In this article, we describe how zero-knowledge proofs, specifically bulletproofs, can be applied to build a privacy-focused service using Exonum. The token logic is implemented as a platform service and is a proof of concept.","PeriodicalId":359145,"journal":{"name":"2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131681298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Vertical Underwater VLC Links over Cascaded Gamma-Gamma Turbulence Channels with Pointing Errors 具有指向误差的级联伽玛湍流通道上的垂直水下VLC链路
Pub Date : 2019-06-01 DOI: 10.1109/BlackSeaCom.2019.8812811
M. Elamassie, M. Uysal
Underwater visible light communication (UVLC) is a high capacity wireless connectivity solution with low latency, particularly appealing for real-time underwater video and image transmission. While attenuation and geometrical losses determine the average light intensity, underwater optical turbulence introduces fluctuations on the average received intensity, also known as fading. Due to relative movements of source and/or detector in harsh underwater environment, pointing errors further cause additional fading. In this paper, we consider a vertical underwater link modeled as a multi-layer channel where the fading coefficients associated with each layer are modeled as independent but not identically distributed Gamma-Gamma random variables. We model the displacements along the horizontal and elevation axes as independent and identically distributed Gaussian variables. Under these assumptions, we derive a closed-form expression for bit error rate (BER) expression. Based on asymptotical BER analysis, we determine the diversity order as a function of system and channel parameters. We further present Monte-Carlo simulation results to confirm the derived expressions.
水下可见光通信(UVLC)是一种具有低延迟的高容量无线连接解决方案,尤其适用于实时水下视频和图像传输。虽然衰减和几何损耗决定了平均光强,但水下光学湍流引入了平均接收强度的波动,也称为衰落。在恶劣的水下环境中,由于源和/或探测器的相对运动,指向误差进一步导致额外的衰落。在本文中,我们将垂直水下链路建模为多层信道,其中与每层相关的衰落系数建模为独立但不相同分布的Gamma-Gamma随机变量。我们将沿水平和高程轴的位移建模为独立且同分布的高斯变量。在这些假设下,我们推导出误码率(BER)表达式的封闭表达式。基于渐近误码率分析,我们确定了分集顺序作为系统参数和信道参数的函数。我们进一步给出了蒙特卡罗模拟结果来验证推导出的表达式。
{"title":"Vertical Underwater VLC Links over Cascaded Gamma-Gamma Turbulence Channels with Pointing Errors","authors":"M. Elamassie, M. Uysal","doi":"10.1109/BlackSeaCom.2019.8812811","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2019.8812811","url":null,"abstract":"Underwater visible light communication (UVLC) is a high capacity wireless connectivity solution with low latency, particularly appealing for real-time underwater video and image transmission. While attenuation and geometrical losses determine the average light intensity, underwater optical turbulence introduces fluctuations on the average received intensity, also known as fading. Due to relative movements of source and/or detector in harsh underwater environment, pointing errors further cause additional fading. In this paper, we consider a vertical underwater link modeled as a multi-layer channel where the fading coefficients associated with each layer are modeled as independent but not identically distributed Gamma-Gamma random variables. We model the displacements along the horizontal and elevation axes as independent and identically distributed Gaussian variables. Under these assumptions, we derive a closed-form expression for bit error rate (BER) expression. Based on asymptotical BER analysis, we determine the diversity order as a function of system and channel parameters. We further present Monte-Carlo simulation results to confirm the derived expressions.","PeriodicalId":359145,"journal":{"name":"2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128916350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Digital Signage Personalization for Smart City: Major Requirements and Approach 面向智慧城市的数字标牌个性化:主要需求与途径
Pub Date : 2019-06-01 DOI: 10.1109/BlackSeaCom.2019.8812820
N. Shilov, O. Smirnova, P. Morozova, Nikolay Turov, M. Shchekotov, N. Teslya
Providing information in smart cities is possible in various ways. Digital signage is one of such options. However, personalization and contextualization of digital signage is complicated due to both technological and legislative reasons. When providing contextual information to a group of users, consideration of preferences and interests of users is complicated by a number of additional problems, most of which are related to identifying preferences/interests common to this group of users, as well as to their confidentiality. At the moment, such solutions do not exist. The paper presents a methodology of building a personalized digital signage system taking into account confidentiality and using tacit feedback to clarify the information provided, as well as information about users.
在智慧城市中提供信息的方式多种多样。数字标牌就是其中一种选择。然而,由于技术和立法的原因,数字标牌的个性化和情境化是复杂的。当向一组用户提供上下文信息时,考虑用户的偏好和兴趣会因一些额外的问题而变得复杂,其中大多数问题与确定这组用户的共同偏好/兴趣以及它们的保密性有关。目前,这样的解决方案并不存在。本文提出了一种建立个性化数字标牌系统的方法,考虑到保密性,并使用隐性反馈来澄清所提供的信息,以及关于用户的信息。
{"title":"Digital Signage Personalization for Smart City: Major Requirements and Approach","authors":"N. Shilov, O. Smirnova, P. Morozova, Nikolay Turov, M. Shchekotov, N. Teslya","doi":"10.1109/BlackSeaCom.2019.8812820","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2019.8812820","url":null,"abstract":"Providing information in smart cities is possible in various ways. Digital signage is one of such options. However, personalization and contextualization of digital signage is complicated due to both technological and legislative reasons. When providing contextual information to a group of users, consideration of preferences and interests of users is complicated by a number of additional problems, most of which are related to identifying preferences/interests common to this group of users, as well as to their confidentiality. At the moment, such solutions do not exist. The paper presents a methodology of building a personalized digital signage system taking into account confidentiality and using tacit feedback to clarify the information provided, as well as information about users.","PeriodicalId":359145,"journal":{"name":"2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124304003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conservative Link Adaptation for Ultra Reliable Low Latency Communications 超可靠低延迟通信的保守链路自适应
Pub Date : 2019-06-01 DOI: 10.1109/BlackSeaCom.2019.8812824
A. Belogaev, E. Khorov, A. Krasilov, D. Shmelkin, Suwen Tang
Ultra reliable low latency communications (URLLC) is one of the most promising and demanding services in 5G systems. This service requires very low latency of less than 1 − 10 ms and very high transmission reliability: the acceptable packet loss ratio is about 10−5. To satisfy such strict requirements, many issues shall be solved. This paper focuses on the link adaptation problem, i.e., the selection of a modulation and coding scheme (MCS) for transmission based on the received channel quality indicator (CQI) reports. On the one hand, link adaptation should select a robust MCS to provide high reliability. On the other hand, it should select the highest possible MCS to reduce channel resource consumption. The paper shows that even for one URLLC user, link adaptation is still a challenging problem, especially in highly-variant channels. To solve this problem, a conservative link adaptation algorithm is designed. The algorithm estimates the strongest channel degradation at the time moment of the actual packet transmission and selects an MCS taking into account the worst degradation. The obtained results show that the proposed algorithm is efficient in terms of both the packet loss ratio and the channel resource consumption.
超可靠低延迟通信(URLLC)是5G系统中最有前途和要求最高的服务之一。时延要求非常低,时延小于1 ~ 10ms,传输可靠性要求非常高,可接受的丢包率在10 ~ 5左右。为了满足如此严格的要求,需要解决许多问题。本文主要研究链路自适应问题,即根据接收到的信道质量指标(CQI)报告选择调制和编码方案(MCS)进行传输。一方面,链路自适应应选择鲁棒的MCS以提供高可靠性。另一方面,它应该选择尽可能高的MCS以减少信道资源消耗。本文表明,即使对于一个URLLC用户,链路自适应仍然是一个具有挑战性的问题,特别是在高度变化的信道中。为了解决这一问题,设计了一种保守的链路自适应算法。该算法估计出实际数据包传输时信道退化最严重的时刻,并根据信道退化最严重的时刻选择MCS。实验结果表明,该算法在丢包率和信道资源消耗方面都是有效的。
{"title":"Conservative Link Adaptation for Ultra Reliable Low Latency Communications","authors":"A. Belogaev, E. Khorov, A. Krasilov, D. Shmelkin, Suwen Tang","doi":"10.1109/BlackSeaCom.2019.8812824","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2019.8812824","url":null,"abstract":"Ultra reliable low latency communications (URLLC) is one of the most promising and demanding services in 5G systems. This service requires very low latency of less than 1 − 10 ms and very high transmission reliability: the acceptable packet loss ratio is about 10−5. To satisfy such strict requirements, many issues shall be solved. This paper focuses on the link adaptation problem, i.e., the selection of a modulation and coding scheme (MCS) for transmission based on the received channel quality indicator (CQI) reports. On the one hand, link adaptation should select a robust MCS to provide high reliability. On the other hand, it should select the highest possible MCS to reduce channel resource consumption. The paper shows that even for one URLLC user, link adaptation is still a challenging problem, especially in highly-variant channels. To solve this problem, a conservative link adaptation algorithm is designed. The algorithm estimates the strongest channel degradation at the time moment of the actual packet transmission and selects an MCS taking into account the worst degradation. The obtained results show that the proposed algorithm is efficient in terms of both the packet loss ratio and the channel resource consumption.","PeriodicalId":359145,"journal":{"name":"2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122261594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Analysis of YouTube DASH Traffic YouTube DASH流量分析
Pub Date : 2019-06-01 DOI: 10.1109/BlackSeaCom.2019.8812782
Kamila Ragimova, Vyacheslav Loginov, E. Khorov
To design efficient resource allocation algorithms that satisfy users’ quality of service requirements, it is necessary to know or correctly estimate the traffic characteristics. In recent years, the share of video streams in the overall traffic has reached 70% and continues to grow. Most of this type of traffic is generated by popular video hosting services, such as YouTube, NetFlix, and others, which use the Dynamic Adaptive Streaming over HTTP technology. This paper discusses the results of a study on the properties the most popular videos on YouTube, the world’s largest video hosting service. In addition, it is shown how traffic parameters depend on the application used to watched Youtube videos and operating systems of PCs and mobile devices.
为了设计满足用户服务质量要求的高效资源分配算法,需要了解或正确估计流量特征。近年来,视频流在整体流量中的份额已经达到70%,并且还在持续增长。这种类型的流量大多数是由流行的视频托管服务(如YouTube、NetFlix等)产生的,这些服务使用基于HTTP的动态自适应流媒体技术。本文讨论了一项关于世界上最大的视频托管服务YouTube上最受欢迎的视频属性的研究结果。此外,还显示了流量参数如何取决于用于观看Youtube视频的应用程序和pc和移动设备的操作系统。
{"title":"Analysis of YouTube DASH Traffic","authors":"Kamila Ragimova, Vyacheslav Loginov, E. Khorov","doi":"10.1109/BlackSeaCom.2019.8812782","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2019.8812782","url":null,"abstract":"To design efficient resource allocation algorithms that satisfy users’ quality of service requirements, it is necessary to know or correctly estimate the traffic characteristics. In recent years, the share of video streams in the overall traffic has reached 70% and continues to grow. Most of this type of traffic is generated by popular video hosting services, such as YouTube, NetFlix, and others, which use the Dynamic Adaptive Streaming over HTTP technology. This paper discusses the results of a study on the properties the most popular videos on YouTube, the world’s largest video hosting service. In addition, it is shown how traffic parameters depend on the application used to watched Youtube videos and operating systems of PCs and mobile devices.","PeriodicalId":359145,"journal":{"name":"2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132851826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Analysis of MM-SPEED Routing Protocol Implemented in 6LoWPAN Environment 6LoWPAN环境下MM-SPEED路由协议性能分析
Pub Date : 2019-06-01 DOI: 10.1109/BlackSeaCom.2019.8812809
R. Beniwal, K. Nikolova, G. Iliev
The communication world will be revolutionized with the advent of Internet of Things (IoT). The major challenge in IoT vision is to integrate to Wireless Sensor Network (WSN) to the Internet world. The communication protocols and IPv6 addressing method adapted in IoT require modification to match the WSN scenario. The standard name IPv6 over Low power Personal Area Network has been adapted for such type of mechanism. The performance analysis of MMSPEED routing algorithm’s adapted in 6LoWPAN network has been shown in this paper. The experimental validation results have been presented as compared with SPEED and HiLoW protocols. Throughput and routing overhead of the protocols in 6LoWPAN scenario are also presented. The simulations have been done in NS-3.
随着物联网(IoT)的出现,通信世界将发生革命性的变化。物联网愿景的主要挑战是将无线传感器网络(WSN)集成到互联网世界。物联网中采用的通信协议和IPv6寻址方法需要修改以匹配WSN场景。标准名称IPv6 over Low power Personal Area Network已经适应了这种类型的机制。本文对适用于6LoWPAN网络的MMSPEED路由算法进行了性能分析。实验验证结果与SPEED和HiLoW协议进行了比较。给出了6LoWPAN场景下各协议的吞吐量和路由开销。模拟已经在ns3中完成。
{"title":"Performance Analysis of MM-SPEED Routing Protocol Implemented in 6LoWPAN Environment","authors":"R. Beniwal, K. Nikolova, G. Iliev","doi":"10.1109/BlackSeaCom.2019.8812809","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2019.8812809","url":null,"abstract":"The communication world will be revolutionized with the advent of Internet of Things (IoT). The major challenge in IoT vision is to integrate to Wireless Sensor Network (WSN) to the Internet world. The communication protocols and IPv6 addressing method adapted in IoT require modification to match the WSN scenario. The standard name IPv6 over Low power Personal Area Network has been adapted for such type of mechanism. The performance analysis of MMSPEED routing algorithm’s adapted in 6LoWPAN network has been shown in this paper. The experimental validation results have been presented as compared with SPEED and HiLoW protocols. Throughput and routing overhead of the protocols in 6LoWPAN scenario are also presented. The simulations have been done in NS-3.","PeriodicalId":359145,"journal":{"name":"2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130542517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications 物理层安全对加密的好处:权衡和应用
Pub Date : 2019-06-01 DOI: 10.1109/BlackSeaCom.2019.8812778
L. Mucchi, Francesca Nizzi, T. Pecorella, R. Fantacci, Flavio Esposito
Physical-layer security (PLS) has raised the attention of the research community in recent years, particularly for Internet of things (IoT) applications. Despite the use of classical cryptography, PLS provides security at physical layer, regardless of the computational power owned by the attacker. The investigations on PLS are numerous in the literature, but one main issue seems to be kept apart: how to measure the benefit that PLS can bring to cryptography? This paper tries to answer this question with an initial performance analysis of PLS in conjunction with typical cryptography of wireless communication protocols. Our results indicate that PLS can help cryptography to harden the attacker job in real operative scenario: PLS can increase the detection errors at the attacker’s receiver, leading to inability to recover the cipher key, even if the plaintext is known.
物理层安全(PLS)近年来引起了研究界的关注,特别是在物联网(IoT)应用中。尽管使用了经典的加密技术,但无论攻击者拥有多少计算能力,PLS都提供了物理层的安全性。关于PLS的研究在文献中有很多,但一个主要问题似乎被分开了:如何衡量PLS可以给密码学带来的好处?本文结合典型的无线通信协议的密码学,试图通过对PLS的初步性能分析来回答这个问题。我们的研究结果表明,PLS可以帮助密码学在实际操作场景中加强攻击者的工作:PLS可以增加攻击者接收端的检测错误,导致无法恢复密钥,即使明文是已知的。
{"title":"Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications","authors":"L. Mucchi, Francesca Nizzi, T. Pecorella, R. Fantacci, Flavio Esposito","doi":"10.1109/BlackSeaCom.2019.8812778","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2019.8812778","url":null,"abstract":"Physical-layer security (PLS) has raised the attention of the research community in recent years, particularly for Internet of things (IoT) applications. Despite the use of classical cryptography, PLS provides security at physical layer, regardless of the computational power owned by the attacker. The investigations on PLS are numerous in the literature, but one main issue seems to be kept apart: how to measure the benefit that PLS can bring to cryptography? This paper tries to answer this question with an initial performance analysis of PLS in conjunction with typical cryptography of wireless communication protocols. Our results indicate that PLS can help cryptography to harden the attacker job in real operative scenario: PLS can increase the detection errors at the attacker’s receiver, leading to inability to recover the cipher key, even if the plaintext is known.","PeriodicalId":359145,"journal":{"name":"2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
BlackSeaCom 2019 Welcome Message from the General Chairs BlackSeaCom 2019大会主席欢迎辞
Pub Date : 2019-06-01 DOI: 10.1109/blackseacom.2019.8812866
{"title":"BlackSeaCom 2019 Welcome Message from the General Chairs","authors":"","doi":"10.1109/blackseacom.2019.8812866","DOIUrl":"https://doi.org/10.1109/blackseacom.2019.8812866","url":null,"abstract":"","PeriodicalId":359145,"journal":{"name":"2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125448564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud-based Management of Energy-Efficient Dense IEEE 802.11ax Networks 基于云的节能密集IEEE 802.11ax网络管理
Pub Date : 2019-06-01 DOI: 10.1109/BlackSeaCom.2019.8812787
E. Khorov, A. Kiryanov, A. Krotov
During the last decade, the number of devices connected to the Internet by Wi-Fi has grown significantly. A high density of both the client devices and the hot spots posed new challenges related to providing the desired quality of service in the current and emerging scenarios. To cope with the negative effects caused by network densification, modern Wi-Fi is becoming more and more centralized. To improve network efficiency, today many new Wi-Fi deployments are under control of management systems that optimize network parameters in a centralized manner. In the paper, for such a cloud management system, we develop an algorithm which aims at maximizing energy efficiency and also keeps fairness among clients. For that, we design an objective function and solve an optimization problem using the branch and bound approach. To evaluate the efficiency of the developed solution, we implement it in the NS-3 simulator and compare with existing solutions and legacy behavior.
在过去十年中,通过Wi-Fi连接到互联网的设备数量显著增长。客户机设备和热点的高密度对在当前和新兴场景中提供所需的服务质量提出了新的挑战。为了应对网络致密化带来的负面影响,现代Wi-Fi正变得越来越集中。为了提高网络效率,如今许多新的Wi-Fi部署都是在集中优化网络参数的管理系统的控制下进行的。在本文中,针对这样一个云管理系统,我们开发了一种算法,旨在最大限度地提高能源效率,同时保持客户之间的公平。为此,我们设计了一个目标函数,并利用分支定界法求解了一个优化问题。为了评估开发的解决方案的效率,我们在NS-3模拟器中实现了它,并与现有解决方案和遗留行为进行了比较。
{"title":"Cloud-based Management of Energy-Efficient Dense IEEE 802.11ax Networks","authors":"E. Khorov, A. Kiryanov, A. Krotov","doi":"10.1109/BlackSeaCom.2019.8812787","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2019.8812787","url":null,"abstract":"During the last decade, the number of devices connected to the Internet by Wi-Fi has grown significantly. A high density of both the client devices and the hot spots posed new challenges related to providing the desired quality of service in the current and emerging scenarios. To cope with the negative effects caused by network densification, modern Wi-Fi is becoming more and more centralized. To improve network efficiency, today many new Wi-Fi deployments are under control of management systems that optimize network parameters in a centralized manner. In the paper, for such a cloud management system, we develop an algorithm which aims at maximizing energy efficiency and also keeps fairness among clients. For that, we design an objective function and solve an optimization problem using the branch and bound approach. To evaluate the efficiency of the developed solution, we implement it in the NS-3 simulator and compare with existing solutions and legacy behavior.","PeriodicalId":359145,"journal":{"name":"2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130185970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Drone Base Station Trajectory Planning for Optimal Resource Scheduling in LTE Sparse M2M Networks LTE稀疏M2M网络中无人机基站轨迹规划最优资源调度
Pub Date : 2019-06-01 DOI: 10.1109/BlackSeaCom.2019.8812812
Z. Sayed, Y. Gadallah
Providing communication services connectivity in areas out of reach of the cellular infrastructure is a very active area of research. This connectivity is particularly needed in case of deploying machine type communication devices (MTCDs) for critical purposes such as homeland security. In such applications, MTCDs may be deployed in areas that are hard to reach through regular communications infrastructure while the collected data are timely critical. Drone-supported communications constitute a new trend in complementing the reach of the terrestrial communication infrastructure. In this study, drones are used as complementary base stations to provide real-time communication services to gather critical data out of a group of MTCDs that are sparsely deployed in a marine environment. Therefore, the drone movements among the different MTCDs are to be optimized to minimize data deadline missing. We therefore compare between an ant colony-based technique that aims at optimizing the drone movements among the different MTCDs to achieve this goal, with a genetic algorithm based one. We present the results of several simulation experiments that validate the different performance aspects of both techniques.
在蜂窝基础设施无法到达的区域提供通信服务连接是一个非常活跃的研究领域。在为国土安全等关键目的部署机器类型通信设备(mtcd)时,特别需要这种连接。在这种应用中,mtcd可能部署在常规通信基础设施难以到达的地区,而收集的数据是及时的关键。无人机支持的通信构成了补充地面通信基础设施覆盖范围的新趋势。在这项研究中,无人机被用作补充基站,提供实时通信服务,从一组稀疏部署在海洋环境中的mtcd中收集关键数据。因此,需要优化无人机在不同mtcd之间的运动,以最大限度地减少数据截止日期丢失。因此,我们比较了基于蚁群的技术,该技术旨在优化不同mtcd之间的无人机运动,以实现这一目标,与基于遗传算法的技术。我们提出了几个模拟实验的结果,验证了这两种技术的不同性能方面。
{"title":"Drone Base Station Trajectory Planning for Optimal Resource Scheduling in LTE Sparse M2M Networks","authors":"Z. Sayed, Y. Gadallah","doi":"10.1109/BlackSeaCom.2019.8812812","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2019.8812812","url":null,"abstract":"Providing communication services connectivity in areas out of reach of the cellular infrastructure is a very active area of research. This connectivity is particularly needed in case of deploying machine type communication devices (MTCDs) for critical purposes such as homeland security. In such applications, MTCDs may be deployed in areas that are hard to reach through regular communications infrastructure while the collected data are timely critical. Drone-supported communications constitute a new trend in complementing the reach of the terrestrial communication infrastructure. In this study, drones are used as complementary base stations to provide real-time communication services to gather critical data out of a group of MTCDs that are sparsely deployed in a marine environment. Therefore, the drone movements among the different MTCDs are to be optimized to minimize data deadline missing. We therefore compare between an ant colony-based technique that aims at optimizing the drone movements among the different MTCDs to achieve this goal, with a genetic algorithm based one. We present the results of several simulation experiments that validate the different performance aspects of both techniques.","PeriodicalId":359145,"journal":{"name":"2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127534262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1