首页 > 最新文献

2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)最新文献

英文 中文
Synchronization impact on the performance of Data-Timed Sending (DTS) based wireless sensor networks 同步对数据定时发送(DTS)无线传感器网络性能的影响
Konstantin Chomu, L. Gavrilovska
Energy efficiency of Wireless Sensor Networks (WSNs) is highly affected by duration of periods when sensors transmit data. In order to reduce the amount of transmitted bits from each sensor's radio, the basic Data Timed Sending (DTS) method was recently proposed by the authors [1]. Basic DTS addresses the packet size reduction, achieved by eliminating the Data Payload from the data packets or by using the acknowledgment packets. The information about measured values is transferred by choosing appropriate moment (time slot and time window) in the time interval for performing the packet transmission. The position of every time slot corresponds to a particular node and the position of every time window corresponds to a certain value of measured phenomenon. In one time interval each node sends data from one measurement. Since the synchronization is crucial for feasibility of this method, this paper examines the impact of synchronization error. The simulation results show that for the realistic levels of noise, the Linear Regression (LR) synchronization technique offers sufficient accuracy.
无线传感器网络(WSNs)的能量效率受传感器传输数据的周期长短的影响很大。为了减少每个传感器无线电传输的比特量,作者最近提出了基本的数据定时发送(DTS)方法[1]。基本DTS通过消除数据包中的数据有效载荷或使用确认数据包来减小数据包的大小。通过在进行分组传输的时间间隔中选择适当的时刻(时隙和时窗)来传输测量值的信息。每一个时隙的位置对应于一个特定的节点,每一个时间窗口的位置对应于某一测量现象的值。在一个时间间隔内,每个节点发送一次测量的数据。由于同步对该方法的可行性至关重要,因此本文研究了同步误差的影响。仿真结果表明,对于实际噪声水平,线性回归(LR)同步技术具有足够的精度。
{"title":"Synchronization impact on the performance of Data-Timed Sending (DTS) based wireless sensor networks","authors":"Konstantin Chomu, L. Gavrilovska","doi":"10.1109/WOWMOM.2010.5534954","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534954","url":null,"abstract":"Energy efficiency of Wireless Sensor Networks (WSNs) is highly affected by duration of periods when sensors transmit data. In order to reduce the amount of transmitted bits from each sensor's radio, the basic Data Timed Sending (DTS) method was recently proposed by the authors [1]. Basic DTS addresses the packet size reduction, achieved by eliminating the Data Payload from the data packets or by using the acknowledgment packets. The information about measured values is transferred by choosing appropriate moment (time slot and time window) in the time interval for performing the packet transmission. The position of every time slot corresponds to a particular node and the position of every time window corresponds to a certain value of measured phenomenon. In one time interval each node sends data from one measurement. Since the synchronization is crucial for feasibility of this method, this paper examines the impact of synchronization error. The simulation results show that for the realistic levels of noise, the Linear Regression (LR) synchronization technique offers sufficient accuracy.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115095805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Misbehaving router detection in link-state routing for wireless mesh networks 无线网状网络链路状态路由中的错误路由器检测
G. Ács, L. Buttyán, László Dóra
In this paper, we address the problem of detecting misbehaving routers in wireless mesh networks and avoiding them when selecting routes. We assume that link-state routing is used, and we essentially propose a reputation system, where trusted gateway nodes compute Node Trust Values for the routers, which are fed back into the system and used in the route selection procedure. The computation of the Node Trust Values is based on packet counters maintained in association with each route and reported to the gateways by the routers in a regular manner. The feedback mechanism is based on limited scope flooding. The received Node Trust Values concerning a given router are aggregated, and the aggregate trust value of the router determines the probability with which that router is kept in the topology graph used for route computation. Hence, less trusted routers are excluded from the topology graph with higher probability, while the route selection still runs on a weighted graph (where the weights are determined by the announced link qualities), and it does not need to be changed. We evaluated the performance of our solution by means of simulations. The results show that our proposed mechanism can detect misbehaving routers reliably, and thanks to the feedback and the exclusion of the accused nodes from the route selection, we can decrease the number of packets dropped due to router misbehavior considerably. At the same time, our mechanism only slightly increases the average route length.
在本文中,我们解决了在无线网状网络中检测异常路由器并在选择路由时避免它们的问题。我们假设使用了链路状态路由,并且我们本质上提出了一个信誉系统,其中受信任的网关节点为路由器计算节点信任值,这些值被反馈到系统中并用于路由选择过程。节点信任值的计算基于与每条路由相关联的数据包计数器,并由路由器定期报告给网关。反馈机制是基于有限范围的注水。将接收到的与给定路由器相关的节点信任值进行聚合,路由器的聚合信任值决定了该路由器在用于路由计算的拓扑图中保留的概率。因此,较不可信的路由器更有可能被排除在拓扑图之外,而路由选择仍然在加权图上运行(其中权重由宣布的链路质量决定),不需要更改。我们通过仿真来评估我们的解决方案的性能。结果表明,所提出的机制能够可靠地检测出行为不端的路由器,并且由于路由选择的反馈和排除了被指控的节点,我们可以大大减少由于路由器行为不端的数据包数量。同时,我们的机制只略微增加了平均路由长度。
{"title":"Misbehaving router detection in link-state routing for wireless mesh networks","authors":"G. Ács, L. Buttyán, László Dóra","doi":"10.1109/WOWMOM.2010.5534995","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534995","url":null,"abstract":"In this paper, we address the problem of detecting misbehaving routers in wireless mesh networks and avoiding them when selecting routes. We assume that link-state routing is used, and we essentially propose a reputation system, where trusted gateway nodes compute Node Trust Values for the routers, which are fed back into the system and used in the route selection procedure. The computation of the Node Trust Values is based on packet counters maintained in association with each route and reported to the gateways by the routers in a regular manner. The feedback mechanism is based on limited scope flooding. The received Node Trust Values concerning a given router are aggregated, and the aggregate trust value of the router determines the probability with which that router is kept in the topology graph used for route computation. Hence, less trusted routers are excluded from the topology graph with higher probability, while the route selection still runs on a weighted graph (where the weights are determined by the announced link qualities), and it does not need to be changed. We evaluated the performance of our solution by means of simulations. The results show that our proposed mechanism can detect misbehaving routers reliably, and thanks to the feedback and the exclusion of the accused nodes from the route selection, we can decrease the number of packets dropped due to router misbehavior considerably. At the same time, our mechanism only slightly increases the average route length.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122028423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Estimation and prediction for tracking trajectories in cellular networks using the recursive prediction error method 基于递归预测误差法的蜂窝网络跟踪轨迹估计与预测
R. Milocco, S. Boumerdassi
After considering the intrinsically erratic behavior of nodes in mobile networks, mobility prediction has been extensively used to improve the quality of services. Many methods have been proposed, inherited from technologies developed for signal processing and self-learning techniques and/or stochastic methods. Among the latter the Extended Kalman Filter (EKF), using the received power as a measurement, is the most used. However, because the measure is not linear with distance, the EKF loses stability under certain circumstances and must be reset. Moreover, it requires the a priori knowledge of disturbances and measurement noise covariance matrices which are difficult to obtain. In this work, from the non-linear model, we derive a stable time-variant first order auto-regressive and moving average model (ARMA), and propose a prediction mechanism based on the well-known Recursive Prediction Error Method (RPEM) to predict the mobile location and then compare it with (EKF). Simulation results show that RPEM has a lower prediction error variance in most cases and similar in others to that obtained with EKF with the additional advantages that it has guaranteed stability and does not require the a priori knowledge of disturbances and measurement noise covariance matrices as in EKF.
考虑到移动网络中节点固有的不稳定行为,移动性预测已被广泛用于提高服务质量。从信号处理技术、自学习技术和/或随机方法发展而来的许多方法已经被提出。其中,以接收功率为测量指标的扩展卡尔曼滤波(EKF)应用最为广泛。然而,由于测量与距离不是线性的,EKF在某些情况下会失去稳定性,必须重置。此外,它还需要对干扰和测量噪声协方差矩阵的先验知识,而这些知识很难获得。本文从非线性模型出发,推导了稳定的时变一阶自回归移动平均模型(ARMA),提出了一种基于递归预测误差法(RPEM)的移动位置预测机制,并与(EKF)进行了比较。仿真结果表明,RPEM在大多数情况下具有较低的预测误差方差,在其他情况下与EKF相似,并且具有保证稳定性的优点,并且不需要像EKF那样先验地了解干扰和测量噪声协方差矩阵。
{"title":"Estimation and prediction for tracking trajectories in cellular networks using the recursive prediction error method","authors":"R. Milocco, S. Boumerdassi","doi":"10.1109/WOWMOM.2010.5534918","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534918","url":null,"abstract":"After considering the intrinsically erratic behavior of nodes in mobile networks, mobility prediction has been extensively used to improve the quality of services. Many methods have been proposed, inherited from technologies developed for signal processing and self-learning techniques and/or stochastic methods. Among the latter the Extended Kalman Filter (EKF), using the received power as a measurement, is the most used. However, because the measure is not linear with distance, the EKF loses stability under certain circumstances and must be reset. Moreover, it requires the a priori knowledge of disturbances and measurement noise covariance matrices which are difficult to obtain. In this work, from the non-linear model, we derive a stable time-variant first order auto-regressive and moving average model (ARMA), and propose a prediction mechanism based on the well-known Recursive Prediction Error Method (RPEM) to predict the mobile location and then compare it with (EKF). Simulation results show that RPEM has a lower prediction error variance in most cases and similar in others to that obtained with EKF with the additional advantages that it has guaranteed stability and does not require the a priori knowledge of disturbances and measurement noise covariance matrices as in EKF.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116880360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Least attained recent service for packet scheduling over wireless LANs 在无线局域网上用于分组调度的最近最少获得的服务
M. Heusse, G. Urvoy-Keller, A. Duda, T. Brown
Wireless LANs suffer from performance problems caused by insufficient medium access opportunity given to the access point. Consequently, the downlink buffer fills up, which often leads to packet losses. We propose to address this problem by using a size-based scheduling approach, which is known to favor short flows and the start up of new ones-a very appealing property from the user's perspective as interactive applications and new flows are serviced quickly. Still, size-based scheduling policies have a well-known Achilles heel: large flows can block each other for long periods of time and low rate multimedia transfers may end up with a low priority when their accumulated transferred volume becomes large. To solve the above deficiencies, we propose a new packet scheduling scheme called Least Attained Recent Service (LARS) that applies a temporal decay to the volume of data associated with each flow. In this way, its priority depends more on what has happened recently. With this strategy, LARS can bound the impact of a new arriving flow on ongoing flows, thus limiting lock out durations. It can also efficiently protect low rate multimedia transfers irrespectively of the load conditions.
无线局域网由于给接入点的介质访问机会不足而受到性能问题的困扰。因此,下行链路缓冲区被填满,这通常会导致数据包丢失。我们建议通过使用基于大小的调度方法来解决这个问题,众所周知,这种方法有利于短流和新流的启动——从用户的角度来看,这是一个非常吸引人的特性,因为交互式应用程序和新流可以快速得到服务。但是,基于大小的调度策略有一个众所周知的致命弱点:大的流可能会长时间地相互阻塞,而当累积传输量变大时,低速率的多媒体传输可能会以低优先级结束。为了解决上述不足,我们提出了一种新的分组调度方案,称为最小可达最近服务(LARS),该方案对与每个流相关的数据量应用时间衰减。这样,它的优先级更多地取决于最近发生的事情。使用此策略,LARS可以约束新到达的流对正在进行的流的影响,从而限制锁定持续时间。它还可以有效地保护低速率多媒体传输,而不受负载条件的影响。
{"title":"Least attained recent service for packet scheduling over wireless LANs","authors":"M. Heusse, G. Urvoy-Keller, A. Duda, T. Brown","doi":"10.1109/WOWMOM.2010.5534906","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534906","url":null,"abstract":"Wireless LANs suffer from performance problems caused by insufficient medium access opportunity given to the access point. Consequently, the downlink buffer fills up, which often leads to packet losses. We propose to address this problem by using a size-based scheduling approach, which is known to favor short flows and the start up of new ones-a very appealing property from the user's perspective as interactive applications and new flows are serviced quickly. Still, size-based scheduling policies have a well-known Achilles heel: large flows can block each other for long periods of time and low rate multimedia transfers may end up with a low priority when their accumulated transferred volume becomes large. To solve the above deficiencies, we propose a new packet scheduling scheme called Least Attained Recent Service (LARS) that applies a temporal decay to the volume of data associated with each flow. In this way, its priority depends more on what has happened recently. With this strategy, LARS can bound the impact of a new arriving flow on ongoing flows, thus limiting lock out durations. It can also efficiently protect low rate multimedia transfers irrespectively of the load conditions.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128276055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A social transitivity-based data dissemination scheme for opportunistic networks 机会主义网络中基于社会及物性的数据传播方案
J. Ku, Y. Ko, Jisun An, Dongman Lee
A social-based routing protocol for opportunistic networks considers the direct delivery as forwarding metrics. By ignoring the indirect delivery through intermediate nodes, it misses chances to find paths that are better in terms of delivery ratio and time. To overcome this limitation, we propose to incorporate transitivity, which considers the indirect delivery through intermediate nodes, as one of the forwarding metrics. We also found that some message forwards do not improve the delivery performance. To reduce the number of these useless forwards, the proposed scheme forwards messages to an encountered node when the increase of total utility value is greater than a threshold. Using a simulator with real world trace data sets, we compare the proposed scheme with the existing protocols, epidemic routing and SimBetTS. Compared with SimBetTS, the proposed scheme increases delivery ratio by 1.5 percent and decreases delay time by 2 percent while reducing overhead by 30 percent.
机会网络的基于社会的路由协议将直接交付视为转发指标。由于忽略了通过中间节点的间接传递,它错过了找到在传递率和时间方面更好的路径的机会。为了克服这一限制,我们建议将传递性作为转发指标之一,传递性考虑了通过中间节点的间接传递。我们还发现,一些消息转发并不能提高传递性能。为了减少这些无用转发的数量,当总效用值的增加大于阈值时,该方案将消息转发给遇到的节点。利用具有真实世界跟踪数据集的模拟器,我们将所提出的方案与现有协议、流行病路由和SimBetTS进行了比较。与SimBetTS相比,该方案的传送率提高1.5%,延迟时间减少2%,开销减少30%。
{"title":"A social transitivity-based data dissemination scheme for opportunistic networks","authors":"J. Ku, Y. Ko, Jisun An, Dongman Lee","doi":"10.1109/WOWMOM.2010.5534912","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534912","url":null,"abstract":"A social-based routing protocol for opportunistic networks considers the direct delivery as forwarding metrics. By ignoring the indirect delivery through intermediate nodes, it misses chances to find paths that are better in terms of delivery ratio and time. To overcome this limitation, we propose to incorporate transitivity, which considers the indirect delivery through intermediate nodes, as one of the forwarding metrics. We also found that some message forwards do not improve the delivery performance. To reduce the number of these useless forwards, the proposed scheme forwards messages to an encountered node when the increase of total utility value is greater than a threshold. Using a simulator with real world trace data sets, we compare the proposed scheme with the existing protocols, epidemic routing and SimBetTS. Compared with SimBetTS, the proposed scheme increases delivery ratio by 1.5 percent and decreases delay time by 2 percent while reducing overhead by 30 percent.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129835978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the impact of uplink power control in network MIMO systems with MMSE and SIC receivers 基于MMSE和SIC接收器的网络MIMO系统中上行功率控制的影响
Gábor Fodor, S. Sorrentino, M. Johansson, Pablo Soldati
Network multiple input, multiple output (MIMO) systems are built around a broadband backbone network that allows for the fast communication of channel state information (CSI) as well as user data between different base stations. Previous works have shown that multicell channel adaptive (opportunistic) power control can minimize the sum power or maximize the sum rate when the backbone is used for the exchange of CSI in network MIMO systems. In this work we investigate the gains of multicell opportunistic power control under per user fairness constraints when both CSI and user data are shared between multiple sites. We find that multicell opportunistic power control working in concert with uplink joint signal detection is an efficient means both for the capacity and the power control problems that not only minimizes sum power or maximizes overall capacity, but is also able to provide arbitrary level of fairness.
网络多输入多输出(MIMO)系统是围绕宽带骨干网构建的,该骨干网允许信道状态信息(CSI)以及不同基站之间的用户数据的快速通信。先前的研究表明,当主干网用于网络MIMO系统的CSI交换时,多小区信道自适应(机会)功率控制可以使总功率最小化或使和速率最大化。在这项工作中,我们研究了在每个用户公平约束下,当CSI和用户数据在多个站点之间共享时,多单元机会功率控制的收益。我们发现,与上行联合信号检测协同工作的多小区机会功率控制是容量和功率控制问题的有效手段,不仅可以最小化总功率或最大化总容量,而且还可以提供任意程度的公平性。
{"title":"On the impact of uplink power control in network MIMO systems with MMSE and SIC receivers","authors":"Gábor Fodor, S. Sorrentino, M. Johansson, Pablo Soldati","doi":"10.1109/WOWMOM.2010.5534921","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534921","url":null,"abstract":"Network multiple input, multiple output (MIMO) systems are built around a broadband backbone network that allows for the fast communication of channel state information (CSI) as well as user data between different base stations. Previous works have shown that multicell channel adaptive (opportunistic) power control can minimize the sum power or maximize the sum rate when the backbone is used for the exchange of CSI in network MIMO systems. In this work we investigate the gains of multicell opportunistic power control under per user fairness constraints when both CSI and user data are shared between multiple sites. We find that multicell opportunistic power control working in concert with uplink joint signal detection is an efficient means both for the capacity and the power control problems that not only minimizes sum power or maximizes overall capacity, but is also able to provide arbitrary level of fairness.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130103111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Conditional shortest path routing in delay tolerant networks 延迟容忍网络中的条件最短路径路由
E. Bulut, S. Geyik, B. Szymanski
Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since the future node connections are mostly unknown in these networks, opportunistic forwarding is used to deliver messages. However, making effective forwarding decisions using only the network characteristics (i.e. average intermeeting time between nodes) extracted from contact history is a challenging problem. Based on the observations about human mobility traces and the findings of previous work, we introduce a new metric called conditional intermeeting time, which computes the average intermeeting time between two nodes relative to a meeting with a third node using only the local knowledge of the past contacts. We then look at the effects of the proposed metric on the shortest path based routing designed for delay tolerant networks. We propose Conditional Shortest Path Routing (CSPR) protocol that routes the messages over conditional shortest paths in which the cost of links between nodes is defined by conditional intermeeting times rather than the conventional intermeeting times. Through trace-driven simulations, we demonstrate that CSPR achieves higher delivery rate and lower end-to-end delay compared to the shortest path based routing protocols that use the conventional intermeeting time as the link metric.
延迟容忍网络的特点是其节点之间的零星连接,因此缺乏从源到目的的稳定的端到端路径。由于未来的节点连接在这些网络中大多是未知的,因此使用机会转发来传递消息。然而,仅使用从接触历史中提取的网络特征(即节点之间的平均交会时间)进行有效的转发决策是一个具有挑战性的问题。基于对人类移动轨迹的观察和先前工作的发现,我们引入了一个新的度量,称为条件交会时间,它计算两个节点之间相对于与第三个节点相遇的平均交会时间,只使用过去接触的局部知识。然后,我们研究了所提出的度量对设计用于容忍延迟网络的基于最短路径的路由的影响。我们提出了条件最短路径路由(CSPR)协议,该协议通过条件最短路径路由消息,其中节点之间的链路成本由条件间会议时间而不是传统的间会议时间定义。通过跟踪驱动的仿真,我们证明了CSPR实现了更高的传输速率和更低的端到端延迟,相比之下,基于最短路径的路由协议使用传统的会议间时间作为链路度量。
{"title":"Conditional shortest path routing in delay tolerant networks","authors":"E. Bulut, S. Geyik, B. Szymanski","doi":"10.1109/WOWMOM.2010.5534960","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534960","url":null,"abstract":"Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since the future node connections are mostly unknown in these networks, opportunistic forwarding is used to deliver messages. However, making effective forwarding decisions using only the network characteristics (i.e. average intermeeting time between nodes) extracted from contact history is a challenging problem. Based on the observations about human mobility traces and the findings of previous work, we introduce a new metric called conditional intermeeting time, which computes the average intermeeting time between two nodes relative to a meeting with a third node using only the local knowledge of the past contacts. We then look at the effects of the proposed metric on the shortest path based routing designed for delay tolerant networks. We propose Conditional Shortest Path Routing (CSPR) protocol that routes the messages over conditional shortest paths in which the cost of links between nodes is defined by conditional intermeeting times rather than the conventional intermeeting times. Through trace-driven simulations, we demonstrate that CSPR achieves higher delivery rate and lower end-to-end delay compared to the shortest path based routing protocols that use the conventional intermeeting time as the link metric.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132480137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Trade-off between exploration and reporting victim locations in USAR 在USAR探索和报告受害者地点之间的权衡
Sion Scone, I. Phillips
In urban search and rescue (USAR) operations, there is a considerable amount of danger faced by rescuers. The use of mobile robots can alleviate this issue. Coordinating the search effort is made more difficult by the communication issues typically faced in these environments, such that communication is often restricted to line of sight. Since the rescue workers outside of the structure need to know the location of any victims, the task is two parted: 1) to locate the victims (Search Time), and 2) to get this data outside the structure (Delay Time). Communication with the outside is assumed to be performed by a static robot designated as the Command Station. Since it is unlikely that there will be sufficient robots to provide full communications coverage of the area, robots that discover victims are faced with the difficult decision of whether they should continue searching or return with the victim data. We investigate a variety of search techniques and see how the application of biological foraging models can help to streamline the search process, while we have also implemented an opportunistic network to ensure that data are shared whenever robots come within line of sight of each other or the Command Station. We examine this trade-off between performing a search and communicating the results.
在城市搜救(USAR)行动中,救援人员面临着相当多的危险。移动机器人的使用可以缓解这个问题。在这些环境中通常面临的通信问题使协调搜索工作变得更加困难,例如通信通常仅限于视线范围内。由于结构外的救援人员需要知道任何受害者的位置,因此任务分为两部分:1)定位受害者(搜索时间),2)获取结构外的这些数据(延迟时间)。与外界的通信假定由指定为指挥站的静态机器人执行。由于不太可能有足够的机器人来提供该地区的全面通信覆盖,发现受害者的机器人面临着一个艰难的决定,即是继续搜索还是带着受害者的数据返回。我们研究了各种搜索技术,看看生物觅食模型的应用如何帮助简化搜索过程,同时我们也实施了一个机会主义网络,以确保每当机器人进入彼此或指挥站的视线范围时,数据都是共享的。我们将研究执行搜索和传递结果之间的权衡。
{"title":"Trade-off between exploration and reporting victim locations in USAR","authors":"Sion Scone, I. Phillips","doi":"10.1109/WOWMOM.2010.5534926","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534926","url":null,"abstract":"In urban search and rescue (USAR) operations, there is a considerable amount of danger faced by rescuers. The use of mobile robots can alleviate this issue. Coordinating the search effort is made more difficult by the communication issues typically faced in these environments, such that communication is often restricted to line of sight. Since the rescue workers outside of the structure need to know the location of any victims, the task is two parted: 1) to locate the victims (Search Time), and 2) to get this data outside the structure (Delay Time). Communication with the outside is assumed to be performed by a static robot designated as the Command Station. Since it is unlikely that there will be sufficient robots to provide full communications coverage of the area, robots that discover victims are faced with the difficult decision of whether they should continue searching or return with the victim data. We investigate a variety of search techniques and see how the application of biological foraging models can help to streamline the search process, while we have also implemented an opportunistic network to ensure that data are shared whenever robots come within line of sight of each other or the Command Station. We examine this trade-off between performing a search and communicating the results.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130469812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cross-layer H.264 scalable video downstream delivery over WLANs 跨层H.264可扩展视频下行传输在wlan上
G. Bianchi, A. Detti, P. Loreti, Claudio Pisa, Srisakul Thakolsri, W. Kellerer, J. Widmer
Thanks to its in-network drop-based adaptation capabilities, H.264 Scalable Video Coding is perceived as an effective approach for delivering video over networks characterized by sudden large bandwidth fluctuations, such as Wireless LANs. Performance may be boosted by the adoption of application-aware/cross-layer schedulers devised to intelligently drop video data units (NALUs), so that i) decoding dependencies are preserved, and ii) the quality perceived by the end users is maximized. In this paper, we provide a theoretical formulation of a QoE utility-optimal cross-layer scheduling problem for H.264 SVC downlink delivery over WLANs. We show that, because of the unique characteristics of the WLAN MAC operation, this problem significantly differs from related approaches proposed for scheduled wireless technologies, especially when the WLAN carries background traffic in the uplink direction. From these theoretical insights, we derive, design, implement and experimentally assess a simple practical scheduling algorithm, whose performance is very close to the optimal solution.
H.264可扩展视频编码由于其基于网络的自适应能力,被认为是在无线局域网等带宽突然波动的网络上传输视频的有效方法。性能可以通过采用应用程序感知/跨层调度器来提高,这些调度器设计用于智能地丢弃视频数据单元(nalu),以便i)保留解码依赖,ii)最终用户感知的质量最大化。在本文中,我们提供了一个理论公式的QoE效用最优跨层调度问题的H.264 SVC下行传输在wlan上。我们表明,由于WLAN MAC操作的独特特性,该问题与针对预定无线技术提出的相关方法有很大不同,特别是当WLAN在上行方向上承载背景流量时。根据这些理论见解,我们推导、设计、实现和实验评估了一个简单实用的调度算法,其性能非常接近最优解。
{"title":"Cross-layer H.264 scalable video downstream delivery over WLANs","authors":"G. Bianchi, A. Detti, P. Loreti, Claudio Pisa, Srisakul Thakolsri, W. Kellerer, J. Widmer","doi":"10.1109/WOWMOM.2010.5534890","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534890","url":null,"abstract":"Thanks to its in-network drop-based adaptation capabilities, H.264 Scalable Video Coding is perceived as an effective approach for delivering video over networks characterized by sudden large bandwidth fluctuations, such as Wireless LANs. Performance may be boosted by the adoption of application-aware/cross-layer schedulers devised to intelligently drop video data units (NALUs), so that i) decoding dependencies are preserved, and ii) the quality perceived by the end users is maximized. In this paper, we provide a theoretical formulation of a QoE utility-optimal cross-layer scheduling problem for H.264 SVC downlink delivery over WLANs. We show that, because of the unique characteristics of the WLAN MAC operation, this problem significantly differs from related approaches proposed for scheduled wireless technologies, especially when the WLAN carries background traffic in the uplink direction. From these theoretical insights, we derive, design, implement and experimentally assess a simple practical scheduling algorithm, whose performance is very close to the optimal solution.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123344269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Evaluation of quality of experience for video streaming over dynamic spectrum access systems 动态频谱接入系统视频流体验质量评价
C. Ververidis, Janne Riihijärvi, P. Mähönen
In this paper we study the problem of quantifying the value of spectrum opportunities to secondary users in Dynamic Spectrum Access (DSA) systems. We especially focus on estimating the impact of key channel parameters, namely the activity patterns of the primary users on the expected quality of experience for secondary users accessing video streams over a DSA system. In our study we consider three basic types of video representing typical video content categorized according to scene change rate ranging from low-activity newscast to high-activity sports video. Through extensive simulations we show that given some information on the expected level of activity in the video, the duty cycle of the primary user alone can yield good predictors for the expected quality of experience of secondary users. Knowledge of the precise distributions of the primary user ON and OFF periods can be used to further enhance the precision of the prediction, but at least for exponential and log-normal channel access patterns the differences are rather small. Finally, we study the problem of determining the channel statistics that are needed to apply the predictor in an optimization setting. Our simulations show that high accuracy can be achieved in matter of minutes of estimation time, which is more than enough for practical deployments in typical urban environments.
本文研究了动态频谱接入(DSA)系统中二次用户频谱机会价值的量化问题。我们特别关注评估关键通道参数的影响,即主要用户的活动模式对通过DSA系统访问视频流的次要用户的预期体验质量的影响。在我们的研究中,我们考虑了代表典型视频内容的三种基本类型的视频,根据场景变化率进行分类,从低活动的新闻广播到高活动的体育视频。通过广泛的模拟,我们表明,给定视频中预期活动水平的一些信息,仅主要用户的占空比就可以很好地预测次要用户的预期体验质量。了解主用户ON和OFF周期的精确分布可用于进一步提高预测的精度,但至少对于指数和对数正态信道访问模式,差异相当小。最后,我们研究了在优化设置中应用预测器所需的信道统计信息的确定问题。我们的模拟表明,在几分钟的估计时间内就可以实现高精度,这对于典型城市环境中的实际部署来说绰绰有余。
{"title":"Evaluation of quality of experience for video streaming over dynamic spectrum access systems","authors":"C. Ververidis, Janne Riihijärvi, P. Mähönen","doi":"10.1109/WOWMOM.2010.5534892","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534892","url":null,"abstract":"In this paper we study the problem of quantifying the value of spectrum opportunities to secondary users in Dynamic Spectrum Access (DSA) systems. We especially focus on estimating the impact of key channel parameters, namely the activity patterns of the primary users on the expected quality of experience for secondary users accessing video streams over a DSA system. In our study we consider three basic types of video representing typical video content categorized according to scene change rate ranging from low-activity newscast to high-activity sports video. Through extensive simulations we show that given some information on the expected level of activity in the video, the duty cycle of the primary user alone can yield good predictors for the expected quality of experience of secondary users. Knowledge of the precise distributions of the primary user ON and OFF periods can be used to further enhance the precision of the prediction, but at least for exponential and log-normal channel access patterns the differences are rather small. Finally, we study the problem of determining the channel statistics that are needed to apply the predictor in an optimization setting. Our simulations show that high accuracy can be achieved in matter of minutes of estimation time, which is more than enough for practical deployments in typical urban environments.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"462 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123373338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1