Pub Date : 2017-11-01DOI: 10.23919/PEMWN.2017.8308025
Hager Ben Hafaiedh, I. Korbi, L. Saïdane, A. Kobbane
This paper addresses the channel occupation and the channel selection problem for the Long Term Evolution Unlicensed (LTE-U) technology when coexisting with the WiFi system on the unlicensed spectrum (typically the 5 GHz band). For instance, LTE is a communication standard developed by the 3GPP corporation based on the GSM/EDGE and the UMTP/HSPA technologies and conceived for high-spaced wireless communications. If we focus on LTE-U, it is an extension of the LTE-A (LTE-Advanced) scheme in unlicensed bands. In this paper, we will discuss the coexistence matters between the WiFi and LTE-U technologies. Therefore, we review the different solutions discussed in literature that addressed the coexistence issue. These works are either based on fair spectrum allocation between LTE-U and WiFi technologies or on the game theory paradigm where multi channel access and inter-dependance scenarios are discussed. As a future work, we intend to further investigate the coexistence issues between LTE-U and WiFi systems, especially in the case of inter-dependance scenarios and other configurations including hidden/exposed terminal problem in WiFi networks.
{"title":"LTE-U and WiFi coexistence in the 5 GHz unlicensed spectrum: A survey","authors":"Hager Ben Hafaiedh, I. Korbi, L. Saïdane, A. Kobbane","doi":"10.23919/PEMWN.2017.8308025","DOIUrl":"https://doi.org/10.23919/PEMWN.2017.8308025","url":null,"abstract":"This paper addresses the channel occupation and the channel selection problem for the Long Term Evolution Unlicensed (LTE-U) technology when coexisting with the WiFi system on the unlicensed spectrum (typically the 5 GHz band). For instance, LTE is a communication standard developed by the 3GPP corporation based on the GSM/EDGE and the UMTP/HSPA technologies and conceived for high-spaced wireless communications. If we focus on LTE-U, it is an extension of the LTE-A (LTE-Advanced) scheme in unlicensed bands. In this paper, we will discuss the coexistence matters between the WiFi and LTE-U technologies. Therefore, we review the different solutions discussed in literature that addressed the coexistence issue. These works are either based on fair spectrum allocation between LTE-U and WiFi technologies or on the game theory paradigm where multi channel access and inter-dependance scenarios are discussed. As a future work, we intend to further investigate the coexistence issues between LTE-U and WiFi systems, especially in the case of inter-dependance scenarios and other configurations including hidden/exposed terminal problem in WiFi networks.","PeriodicalId":383978,"journal":{"name":"2017 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)","volume":"12 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123644214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.23919/PEMWN.2017.8308023
D. Burnett, B. Wheeler, F. Maksimovic, O. Khan, A. Niknejad, K. Pister
Ring oscillators have area and power advantages over LC tanks, but conventional wisdom is that rings must be locked to a high-Q external reference to be useful in RF communications. In this paper we explore performance of a 2.4GHz receiver incorporating only a free-running ring as a local oscillator. Using a simple technique to compensate for frequency error, we find that a minimum-size ring fabricated in 65nm CMOS and consuming only 105μW is able to demodulate 75% of received 802.15.4 packets and, if the FSK tone deviation is doubled from 802.15.4 spec, packet receive rate exceeds 99.8%.
{"title":"Narrowband communication with free-running 2.4GHz ring oscillators","authors":"D. Burnett, B. Wheeler, F. Maksimovic, O. Khan, A. Niknejad, K. Pister","doi":"10.23919/PEMWN.2017.8308023","DOIUrl":"https://doi.org/10.23919/PEMWN.2017.8308023","url":null,"abstract":"Ring oscillators have area and power advantages over LC tanks, but conventional wisdom is that rings must be locked to a high-Q external reference to be useful in RF communications. In this paper we explore performance of a 2.4GHz receiver incorporating only a free-running ring as a local oscillator. Using a simple technique to compensate for frequency error, we find that a minimum-size ring fabricated in 65nm CMOS and consuming only 105μW is able to demodulate 75% of received 802.15.4 packets and, if the FSK tone deviation is doubled from 802.15.4 spec, packet receive rate exceeds 99.8%.","PeriodicalId":383978,"journal":{"name":"2017 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.23919/PEMWN.2017.8308031
R. Al-Dabbagh, H. Al-Raweshidy, N. Al-Aboody
Millimetre-wave (mm-wave) bands are considered an interesting candidate in the fifth generation (5G) mobile networks due to the high available bandwidth at these bands. Understanding the propagation performance of different mm-wave frequencies is an important issue to enhance the futuristic cellular networks. This paper investigates and compares the propagation performance of different mm-wave bands with the ultra-high frequency (UHF) by evaluating coverage and rate trends. The proposed scenario applied a map-based model for the base stations (BSs) deployment in university campus with a random distribution of users. The path loss models are determined by specifying the actual buildings' locations within the real campus map. Simulation results showed that the dense deployment of BSs will enhance the coverage of all mm-wave frequency bands and will offer limited noise networks. Comparison results showed that although the 73 GHz bands could provide good coverage with the lowest interference effects, it is still limited to small cell size. Also the 73 GHz bands results showed the higher rate achieved due to the large available bandwidth in this band.
{"title":"Performance comparison of exploiting different millimetre-wave bands in 5G cellular networks","authors":"R. Al-Dabbagh, H. Al-Raweshidy, N. Al-Aboody","doi":"10.23919/PEMWN.2017.8308031","DOIUrl":"https://doi.org/10.23919/PEMWN.2017.8308031","url":null,"abstract":"Millimetre-wave (mm-wave) bands are considered an interesting candidate in the fifth generation (5G) mobile networks due to the high available bandwidth at these bands. Understanding the propagation performance of different mm-wave frequencies is an important issue to enhance the futuristic cellular networks. This paper investigates and compares the propagation performance of different mm-wave bands with the ultra-high frequency (UHF) by evaluating coverage and rate trends. The proposed scenario applied a map-based model for the base stations (BSs) deployment in university campus with a random distribution of users. The path loss models are determined by specifying the actual buildings' locations within the real campus map. Simulation results showed that the dense deployment of BSs will enhance the coverage of all mm-wave frequency bands and will offer limited noise networks. Comparison results showed that although the 73 GHz bands could provide good coverage with the lowest interference effects, it is still limited to small cell size. Also the 73 GHz bands results showed the higher rate achieved due to the large available bandwidth in this band.","PeriodicalId":383978,"journal":{"name":"2017 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127681873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.23919/PEMWN.2017.8308037
E. Atxutegi, J. O. Fajardo, Eva Ibarrola, F. Liberal
The increasing awareness in quality of service (QoS), has brought QoS measuring in Mobile Broadband (MBB) networks to become a key issue. This paper provides with an evaluation of the most significant standardized Internet access measurement methods such as TCP-based and model-based approaches over a controlled testbed and MBB monitoring infrastructure called MONROE. TCP-based measurements reflect the maximum rate over the whole path, whereas, model-based measurements demonstrated to be helpful for the feasibility/suitability-check of rate-limited applications over a certain MBB area.
{"title":"Experimental suitability evaluation of standardized QoS measurements over mobile broadband networks","authors":"E. Atxutegi, J. O. Fajardo, Eva Ibarrola, F. Liberal","doi":"10.23919/PEMWN.2017.8308037","DOIUrl":"https://doi.org/10.23919/PEMWN.2017.8308037","url":null,"abstract":"The increasing awareness in quality of service (QoS), has brought QoS measuring in Mobile Broadband (MBB) networks to become a key issue. This paper provides with an evaluation of the most significant standardized Internet access measurement methods such as TCP-based and model-based approaches over a controlled testbed and MBB monitoring infrastructure called MONROE. TCP-based measurements reflect the maximum rate over the whole path, whereas, model-based measurements demonstrated to be helpful for the feasibility/suitability-check of rate-limited applications over a certain MBB area.","PeriodicalId":383978,"journal":{"name":"2017 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132842113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.23919/PEMWN.2017.8308030
Safae Lhazmir, Ismail El Moudden, A. Kobbane
Over the past 20 years, data has increased in a large scale in various fields. Internet of Things (IoT), for instance, comprises billions of devices and the data streams coming from these devices challenge the traditional approaches to data management and contribute to the emerging paradigm of big data. To be able to handle such data adequately, it is necessary to reduce their dimensionality to a size more compatible with the resolution methods, even if this reduction can lead to a slight loss of information. The aim of this paper is to study the potential of dimensionality reduction in text categorization of a publicly available dataset CNAE-9.
{"title":"Feature extraction based on principal component analysis for text categorization","authors":"Safae Lhazmir, Ismail El Moudden, A. Kobbane","doi":"10.23919/PEMWN.2017.8308030","DOIUrl":"https://doi.org/10.23919/PEMWN.2017.8308030","url":null,"abstract":"Over the past 20 years, data has increased in a large scale in various fields. Internet of Things (IoT), for instance, comprises billions of devices and the data streams coming from these devices challenge the traditional approaches to data management and contribute to the emerging paradigm of big data. To be able to handle such data adequately, it is necessary to reduce their dimensionality to a size more compatible with the resolution methods, even if this reduction can lead to a slight loss of information. The aim of this paper is to study the potential of dimensionality reduction in text categorization of a publicly available dataset CNAE-9.","PeriodicalId":383978,"journal":{"name":"2017 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125873568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.23919/PEMWN.2017.8308019
Quentin Lampin, D. Barthel
Efficiently monitoring a network requires full observability of each node. The main challenge lies in correlating the monitoring logs coming from all the nodes and reconstructing useful network-wide knowledge such as routing topology or end-to-end performance. We propose a monitoring framework in which nodes report events that are significant to the life of the network, following clear specified semantics. Clear semantics allows maintaining a network model, run on a computer on the side of the network, mirroring the state of the real network. The successive states of this model are archived in a database and can be browsed by the investigation tools instead of querying the real physical network. This is especially beneficial in the case of low bandwidth networks or resource-constrained devices encountered in the Internet of Things. With two different examples, LoRaWAN and OpenWSN, we illustrate how this monitoring framework allows using the same generic tool suite to debug, monitor and tweak a diversity of networks.
{"title":"Sensorlab2: A monitoring framework for IoT networks","authors":"Quentin Lampin, D. Barthel","doi":"10.23919/PEMWN.2017.8308019","DOIUrl":"https://doi.org/10.23919/PEMWN.2017.8308019","url":null,"abstract":"Efficiently monitoring a network requires full observability of each node. The main challenge lies in correlating the monitoring logs coming from all the nodes and reconstructing useful network-wide knowledge such as routing topology or end-to-end performance. We propose a monitoring framework in which nodes report events that are significant to the life of the network, following clear specified semantics. Clear semantics allows maintaining a network model, run on a computer on the side of the network, mirroring the state of the real network. The successive states of this model are archived in a database and can be browsed by the investigation tools instead of querying the real physical network. This is especially beneficial in the case of low bandwidth networks or resource-constrained devices encountered in the Internet of Things. With two different examples, LoRaWAN and OpenWSN, we illustrate how this monitoring framework allows using the same generic tool suite to debug, monitor and tweak a diversity of networks.","PeriodicalId":383978,"journal":{"name":"2017 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125609220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.23919/PEMWN.2017.8308022
P. Minet, P. Mühlethaler, I. Khoufi
In this paper we propose an analysis of a slotted based protocol designed for devices of the Internet of Thing (IoT). In contrast to other TDMA-based protocols this scheme uses a random technique to access shared slots which presents similarities with CSMA protocols. In practice the transmissions are scheduled in a given back-off window of slots whose duration allows the transmission of a packet and its acknowledgment. Therefore this protocol can be analyzed according to the methodology introduced by Bianchi for the IEEE 802.11 protocol even if the protocol studied differs in many aspects. The model we use is also particular because we succeed in obtaining a Markov model even if the scheme used to send a packet (in a node) may depend on the transmission of the previous packet. We distinguish two protocols; in the first one, at the initial stage or after a successful transmission, the packets are transmitted without any back-off, whereas in the second protocol each transmission is always preceded by the count down of a random back-off. Extensive simulations validate the models of both protocols and a comparative performance evaluation is carried out.
{"title":"Collision avoidance on shared slots in a wireless slotted network: Models and simulations","authors":"P. Minet, P. Mühlethaler, I. Khoufi","doi":"10.23919/PEMWN.2017.8308022","DOIUrl":"https://doi.org/10.23919/PEMWN.2017.8308022","url":null,"abstract":"In this paper we propose an analysis of a slotted based protocol designed for devices of the Internet of Thing (IoT). In contrast to other TDMA-based protocols this scheme uses a random technique to access shared slots which presents similarities with CSMA protocols. In practice the transmissions are scheduled in a given back-off window of slots whose duration allows the transmission of a packet and its acknowledgment. Therefore this protocol can be analyzed according to the methodology introduced by Bianchi for the IEEE 802.11 protocol even if the protocol studied differs in many aspects. The model we use is also particular because we succeed in obtaining a Markov model even if the scheme used to send a packet (in a node) may depend on the transmission of the previous packet. We distinguish two protocols; in the first one, at the initial stage or after a successful transmission, the packets are transmitted without any back-off, whereas in the second protocol each transmission is always preceded by the count down of a random back-off. Extensive simulations validate the models of both protocols and a comparative performance evaluation is carried out.","PeriodicalId":383978,"journal":{"name":"2017 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124753937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.23919/PEMWN.2017.8308036
Konstantinos A. Lizos, S. A. El-atty
Deployment of uncoordinated small-cell networks are frequent and pose considerable challenges in resource management of macro-cell networks. Proliferation of mobile users and newly introduced applications with variant traffic distribution patterns elevates the probability of interference occurrence, as physical channels can be co-assigned and co-shared simultaneously at the same geographical region, thus degrading experienced QoS and energy efficiency while contributing in greener mobile networking environments. For the purposes of safeguarding the sustainability and viability of future operation for macro and small-cell interplay architectures, it is beneficial to render a mathematical framework that pre-assesses the probability of observed interference for macro users in the downlink for real networks, paving the venue for future studies to derive strategies for remedying such complexities. We demonstrate through extensive simulations the efficiency of the proposed analytical scheme. We proceed with investigating the association of theoretical and simulated results, thus converging on the validity of this measurement.
{"title":"Interference prediction framework for jointed macro/small-cell network interplay performance analysis under heterogeneous scope","authors":"Konstantinos A. Lizos, S. A. El-atty","doi":"10.23919/PEMWN.2017.8308036","DOIUrl":"https://doi.org/10.23919/PEMWN.2017.8308036","url":null,"abstract":"Deployment of uncoordinated small-cell networks are frequent and pose considerable challenges in resource management of macro-cell networks. Proliferation of mobile users and newly introduced applications with variant traffic distribution patterns elevates the probability of interference occurrence, as physical channels can be co-assigned and co-shared simultaneously at the same geographical region, thus degrading experienced QoS and energy efficiency while contributing in greener mobile networking environments. For the purposes of safeguarding the sustainability and viability of future operation for macro and small-cell interplay architectures, it is beneficial to render a mathematical framework that pre-assesses the probability of observed interference for macro users in the downlink for real networks, paving the venue for future studies to derive strategies for remedying such complexities. We demonstrate through extensive simulations the efficiency of the proposed analytical scheme. We proceed with investigating the association of theoretical and simulated results, thus converging on the validity of this measurement.","PeriodicalId":383978,"journal":{"name":"2017 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131466324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.23919/PEMWN.2017.8308034
Jeesung Lee, Mirim Park, Young-sik Kim, Pyoung-soo Park, Junho Jeong
Recently underground subways are often constructed to accommodate more pleasant public transportation conditions in metropolitan areas. For mobile operators, it is required to provide proper cellular coverage in the underground subway tunnels with certain coverage requirement. In this paper, we propose a novel LTE cell design approach for underground tunnels based on minimum data throughput requirement over the certain percentage of coverage. The feasibility of the design approach is verified by actual measurement. We also provide a simple two-slope propagation model for tunnel environment.
{"title":"A novel cell design approach for LTE underground tunnels coverage","authors":"Jeesung Lee, Mirim Park, Young-sik Kim, Pyoung-soo Park, Junho Jeong","doi":"10.23919/PEMWN.2017.8308034","DOIUrl":"https://doi.org/10.23919/PEMWN.2017.8308034","url":null,"abstract":"Recently underground subways are often constructed to accommodate more pleasant public transportation conditions in metropolitan areas. For mobile operators, it is required to provide proper cellular coverage in the underground subway tunnels with certain coverage requirement. In this paper, we propose a novel LTE cell design approach for underground tunnels based on minimum data throughput requirement over the certain percentage of coverage. The feasibility of the design approach is verified by actual measurement. We also provide a simple two-slope propagation model for tunnel environment.","PeriodicalId":383978,"journal":{"name":"2017 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127236653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.23919/PEMWN.2017.8308029
Imen Riabi, L. Saïdane, Hella Kaffel Ben Ayed
Internet of Things (IoT) raises many security challenges in relation with the different applications that can be deployed over these environments. IoT access control systems must respond to the new IoT requirements such as scalability, dynamicity, real-time interaction and resources constraint. The goal of this paper is to propose an approach based on Fog and Distributed Hash Table (DHT) toward access control for the Internet of Things. To evaluate the performances of our access solution, we used NS-3 and SUMO. The preliminary obtained results show acceptable overhead for the considered Intelligent Transport System (ITS) scenario.
{"title":"A proposal of a distributed access control over Fog computing: The ITS use case","authors":"Imen Riabi, L. Saïdane, Hella Kaffel Ben Ayed","doi":"10.23919/PEMWN.2017.8308029","DOIUrl":"https://doi.org/10.23919/PEMWN.2017.8308029","url":null,"abstract":"Internet of Things (IoT) raises many security challenges in relation with the different applications that can be deployed over these environments. IoT access control systems must respond to the new IoT requirements such as scalability, dynamicity, real-time interaction and resources constraint. The goal of this paper is to propose an approach based on Fog and Distributed Hash Table (DHT) toward access control for the Internet of Things. To evaluate the performances of our access solution, we used NS-3 and SUMO. The preliminary obtained results show acceptable overhead for the considered Intelligent Transport System (ITS) scenario.","PeriodicalId":383978,"journal":{"name":"2017 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125334914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}