首页 > 最新文献

Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems最新文献

英文 中文
Performance modeling and analysis of IEEE 802.11 wireless networks with hidden nodes 具有隐藏节点的IEEE 802.11无线网络性能建模与分析
M. Lee, G. Hwang, Sumit Roy
This work seeks to develop an analytical model for the per-node throughput analysis of IEEE 802.11 WLAN networks with hidden nodes by extending the Bianchi's model. With the analytic model we derive the per-node throughput of each node and quantify the impact of hidden nodes on per-node throughput. Through our analysis, we find that nodes having more hidden nodes are likely to have worse throughput performance than nodes having less hidden nodes, so resulting in unfairness in per-node throughput. We next propose a new algorithm, called the fake collision algorithm, to solve the unfairness due to hidden nodes. The proposed fake collision algorithm allows nodes with poor throughput to acquire more transmission opportunities by slightly modifying the Binary Exponential Backoff algorithm of the IEEE 802.11 Distributed Coordination Function. To this end, the fake collision algorithm uses a new control parameter called the fake collision probability which can be obtained from a computation algorithm that we develop based on our analytic model. We show that the fairness in per-node throughput can be achieved with the fake collision probability for each node through simulation.
这项工作旨在通过扩展Bianchi的模型,为隐藏节点的IEEE 802.11 WLAN网络的每节点吞吐量分析开发一个分析模型。利用分析模型推导出每个节点的每节点吞吐量,并量化隐藏节点对每节点吞吐量的影响。通过我们的分析,我们发现隐藏节点多的节点的吞吐量性能可能比隐藏节点少的节点差,从而导致单节点吞吐量的不公平。接下来,我们提出了一种新的算法,称为假碰撞算法,来解决由于隐藏节点造成的不公平。本文提出的伪碰撞算法通过对IEEE 802.11分布式协调函数的二进制指数回退算法稍加修改,使得吞吐量较差的节点能够获得更多的传输机会。为此,伪碰撞算法使用了一个新的控制参数,称为伪碰撞概率,该参数可以从我们基于分析模型开发的计算算法中获得。我们通过仿真证明了每个节点的假碰撞概率可以实现每个节点吞吐量的公平性。
{"title":"Performance modeling and analysis of IEEE 802.11 wireless networks with hidden nodes","authors":"M. Lee, G. Hwang, Sumit Roy","doi":"10.1145/2507924.2507947","DOIUrl":"https://doi.org/10.1145/2507924.2507947","url":null,"abstract":"This work seeks to develop an analytical model for the per-node throughput analysis of IEEE 802.11 WLAN networks with hidden nodes by extending the Bianchi's model. With the analytic model we derive the per-node throughput of each node and quantify the impact of hidden nodes on per-node throughput. Through our analysis, we find that nodes having more hidden nodes are likely to have worse throughput performance than nodes having less hidden nodes, so resulting in unfairness in per-node throughput. We next propose a new algorithm, called the fake collision algorithm, to solve the unfairness due to hidden nodes. The proposed fake collision algorithm allows nodes with poor throughput to acquire more transmission opportunities by slightly modifying the Binary Exponential Backoff algorithm of the IEEE 802.11 Distributed Coordination Function. To this end, the fake collision algorithm uses a new control parameter called the fake collision probability which can be obtained from a computation algorithm that we develop based on our analytic model. We show that the fairness in per-node throughput can be achieved with the fake collision probability for each node through simulation.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114680015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Wake-up radio as an energy-efficient alternative to conventional wireless sensor networks MAC protocols 唤醒无线电作为传统无线传感器网络MAC协议的节能替代方案
J. Oller, I. Demirkol, J. Casademont, J. Aspas, G. U. Gamm, L. Reindl
The use of duty-cycling in Medium Access Control (MAC) protocols effectively helps improving the energy efficiency of wireless networks. However, while the benefits of these protocols are unquestionable, most of them still suffer from overhearing and idle listening, two issues that prevent duty-cycled systems from achieving optimum energy usage, which is a crucial aspect in specific types of wireless networks such as Wireless Sensor Networks (WSN).Wake-up Radio (WuR) systems have been employed recently to overcome these issues. Under this approach, the nodes' MicroController Unit (MCU) and main radio transceiver are completely switched off and only activated when a secondary, extremely low-power receiver in the node is triggered by a particular wireless transmission. Wake-up Radio systems allow for drastic energy savings since receiver nodes are only activated on-demand, maximizing their battery lifetimes. In this paper, we have modeled and simulated a real, recent and promising WuR hardware platform based on its time and energy consumption characterization. By comparing such WuR approach to B-MAC and IEEE 802.15.4, two well-known and widely employed MAC protocols, we show it effectively out-performs the conventional WSN MAC approaches in terms of energy efficiency. To the best of authors' knowledge, this is the first study to include a comparative analysis for multi-hop networks based on a real WuR platform, which shows WuR systems represent an energy-efficient solution that also provides a good tradeoff between latency, packet delivery ratio and applicability..
在介质访问控制(MAC)协议中使用占空循环可以有效地提高无线网络的能源效率。然而,虽然这些协议的好处是毋庸置疑的,但它们中的大多数仍然存在偷听和空闲监听的问题,这两个问题阻碍了占空比系统实现最佳的能源利用,这是无线传感器网络(WSN)等特定类型无线网络的关键方面。唤醒无线电(WuR)系统最近被用于克服这些问题。在这种方法下,节点的微控制器单元(MCU)和主无线电收发器完全关闭,只有当节点中的次级极低功耗接收器被特定的无线传输触发时才会激活。唤醒无线电系统允许大幅节省能源,因为接收器节点只按需激活,最大限度地延长了电池寿命。在本文中,我们基于其时间和能量消耗特性,对一个真实的、最新的、有前途的WuR硬件平台进行了建模和仿真。通过将这种WuR方法与B-MAC和IEEE 802.15.4这两种众所周知且广泛使用的MAC协议进行比较,我们发现它在能效方面有效地优于传统的WSN MAC方法。据作者所知,这是第一项对基于真实WuR平台的多跳网络进行比较分析的研究,该研究表明,WuR系统代表了一种节能的解决方案,该解决方案还提供了延迟,数据包传输率和适用性之间的良好权衡。
{"title":"Wake-up radio as an energy-efficient alternative to conventional wireless sensor networks MAC protocols","authors":"J. Oller, I. Demirkol, J. Casademont, J. Aspas, G. U. Gamm, L. Reindl","doi":"10.1145/2507924.2507955","DOIUrl":"https://doi.org/10.1145/2507924.2507955","url":null,"abstract":"The use of duty-cycling in Medium Access Control (MAC) protocols effectively helps improving the energy efficiency of wireless networks. However, while the benefits of these protocols are unquestionable, most of them still suffer from overhearing and idle listening, two issues that prevent duty-cycled systems from achieving optimum energy usage, which is a crucial aspect in specific types of wireless networks such as Wireless Sensor Networks (WSN).Wake-up Radio (WuR) systems have been employed recently to overcome these issues. Under this approach, the nodes' MicroController Unit (MCU) and main radio transceiver are completely switched off and only activated when a secondary, extremely low-power receiver in the node is triggered by a particular wireless transmission. Wake-up Radio systems allow for drastic energy savings since receiver nodes are only activated on-demand, maximizing their battery lifetimes. In this paper, we have modeled and simulated a real, recent and promising WuR hardware platform based on its time and energy consumption characterization. By comparing such WuR approach to B-MAC and IEEE 802.15.4, two well-known and widely employed MAC protocols, we show it effectively out-performs the conventional WSN MAC approaches in terms of energy efficiency. To the best of authors' knowledge, this is the first study to include a comparative analysis for multi-hop networks based on a real WuR platform, which shows WuR systems represent an energy-efficient solution that also provides a good tradeoff between latency, packet delivery ratio and applicability..","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128478026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Congestion control in reliable CoAP communication 可靠CoAP通信中的拥塞控制
A. Betzler, Carles Gomez, I. Demirkol, J. Aspas
The development of IPv6 stacks for wireless constrained devices that have limited hardware resources has paved the way for many new areas of applications and protocols. The Constrained Application Protocol (CoAP) has been designed by the IETF to enable the manipulation of resources for constrained devices that are capable of connecting to the Internet. Due to the limited radio channel capacities and hardware resources, congestion is a common phenomenon in networks of constrained devices. CoAP implements a basic congestion control mechanism for the transmission of reliable messages. Alternative CoAP congestion control approaches are a recent topic of interest in the IETF CoRE Working Group. New Internet-Drafts discuss the limitations of the default congestion control mechanisms and propose alternative ones, yet, there have been no studies in the literature that compare the original approach to the alternative ones. In this paper, we target this crucial study and perform evaluations that show how the default and alternative congestion control mechanisms compare to each other. We use the Cooja simulation environment, which is part of the Contiki development toolset, to simulate CoAP within a complete protocol stack that uses IETF protocols for constrained networks. Through simulations of different network topologies and varying traffic loads, we demonstrate how the advanced mechanisms proposed in the drafts perform relative to the basic congestion control mechanism.
针对硬件资源有限的无线受限设备的IPv6栈的开发为许多新的应用程序和协议领域铺平了道路。受约束的应用协议(CoAP)是由IETF设计的,以便能够对能够连接到Internet的受约束设备的资源进行操作。由于无线信道容量和硬件资源的限制,拥塞是受限设备网络中的常见现象。CoAP为可靠消息的传输实现了基本的拥塞控制机制。可选的CoAP拥塞控制方法是IETF核心工作组最近感兴趣的一个主题。新的互联网草案讨论了默认拥塞控制机制的局限性,并提出了替代机制,然而,在文献中还没有研究将原始方法与替代方法进行比较。在本文中,我们针对这一关键研究并执行评估,以显示默认和替代拥塞控制机制如何相互比较。我们使用Cooja模拟环境,它是Contiki开发工具集的一部分,在一个完整的协议栈中模拟CoAP,该协议栈在受限网络中使用IETF协议。通过对不同网络拓扑和不同流量负载的模拟,我们展示了草案中提出的高级机制相对于基本拥塞控制机制的表现。
{"title":"Congestion control in reliable CoAP communication","authors":"A. Betzler, Carles Gomez, I. Demirkol, J. Aspas","doi":"10.1145/2507924.2507954","DOIUrl":"https://doi.org/10.1145/2507924.2507954","url":null,"abstract":"The development of IPv6 stacks for wireless constrained devices that have limited hardware resources has paved the way for many new areas of applications and protocols. The Constrained Application Protocol (CoAP) has been designed by the IETF to enable the manipulation of resources for constrained devices that are capable of connecting to the Internet. Due to the limited radio channel capacities and hardware resources, congestion is a common phenomenon in networks of constrained devices. CoAP implements a basic congestion control mechanism for the transmission of reliable messages. Alternative CoAP congestion control approaches are a recent topic of interest in the IETF CoRE Working Group. New Internet-Drafts discuss the limitations of the default congestion control mechanisms and propose alternative ones, yet, there have been no studies in the literature that compare the original approach to the alternative ones. In this paper, we target this crucial study and perform evaluations that show how the default and alternative congestion control mechanisms compare to each other. We use the Cooja simulation environment, which is part of the Contiki development toolset, to simulate CoAP within a complete protocol stack that uses IETF protocols for constrained networks. Through simulations of different network topologies and varying traffic loads, we demonstrate how the advanced mechanisms proposed in the drafts perform relative to the basic congestion control mechanism.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126270427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Movement assisted-topology control and geographic routing protocol for underwater sensor networks 水下传感器网络的运动辅助拓扑控制和地理路由协议
Rodolfo W. L. Coutinho, L. Vieira, A. Loureiro
Underwater sensor networks have recently been proposed as a way to observe and to explore the lakes, rivers, seas, and oceans. A challenging issue in these networks is the communication, mainly due to the impairments of the acoustic transmission. Thus, efficient mechanisms to improve the data delivery must be proposed. In this work we present a novel anycast greedy geographic forwarding protocol and two topology control mechanisms. The proposed geo-routing protocol considers the anycast network architecture in the data forwarding process. The proposed centralized topology control (CTC) and distributed topology control (DTC) mechanisms organize the network via depth adjustment of some nodes. The simulation results show that with these mechanisms, the data packet delivery ratio achieves more than 90% even in hard and difficult scenarios of very sparse or very dense networks, the end-to-end delay and energy consumption per delivered packet is reduced.
水下传感器网络最近被提出作为一种观察和探索湖泊、河流、海洋的方法。在这些网络中,一个具有挑战性的问题是通信,主要是由于声传输的损害。因此,必须提出改善数据传递的有效机制。本文提出了一种新的任播贪婪地理转发协议和两种拓扑控制机制。提出的地理路由协议在数据转发过程中考虑了任播网络体系结构。提出了集中式拓扑控制(CTC)和分布式拓扑控制(DTC)机制,通过调整部分节点的深度来组织网络。仿真结果表明,即使在非常稀疏或非常密集的网络中,这些机制也能使数据包的投递率达到90%以上,降低了端到端延迟和每个数据包的能耗。
{"title":"Movement assisted-topology control and geographic routing protocol for underwater sensor networks","authors":"Rodolfo W. L. Coutinho, L. Vieira, A. Loureiro","doi":"10.1145/2507924.2507956","DOIUrl":"https://doi.org/10.1145/2507924.2507956","url":null,"abstract":"Underwater sensor networks have recently been proposed as a way to observe and to explore the lakes, rivers, seas, and oceans. A challenging issue in these networks is the communication, mainly due to the impairments of the acoustic transmission. Thus, efficient mechanisms to improve the data delivery must be proposed. In this work we present a novel anycast greedy geographic forwarding protocol and two topology control mechanisms. The proposed geo-routing protocol considers the anycast network architecture in the data forwarding process. The proposed centralized topology control (CTC) and distributed topology control (DTC) mechanisms organize the network via depth adjustment of some nodes. The simulation results show that with these mechanisms, the data packet delivery ratio achieves more than 90% even in hard and difficult scenarios of very sparse or very dense networks, the end-to-end delay and energy consumption per delivered packet is reduced.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117213844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
An intelligent routing scheme effectively utilizing mass storage embedded on satellites to mitigate network congestions 一种智能路由方案,有效地利用卫星上嵌入的海量存储来缓解网络拥塞
Kazuma Kaneko, Y. Kawamoto, Hiroki Nishiyama, N. Kato, Shinichi Yamamoto, N. Yoshimura
Recently, since many kinds of wireless devices have been widely used and a large amount of contents is available on the Internet, a network system that provides adequate services anytime and anywhere is required. In this research, we focus on satellite networks using mass storage devices to provide the above mentioned services. In this kind of network, multiple satellites are used to cover the whole surface of the earth, and each satellite is equipped with a mass storage device. By using mass storage devices, the satellite network can manage a high buffer capacity to handle large amounts of data. However, no routing method has been developed for such kind of satellite network that can utilize the storage devices and manage the large amount of data in the network effectively. In this paper, we propose a novel routing scheme for the efficient utilization of the mass storage on satellites to mitigate network congestion. The proposed method is analyzed mathematically. The numerical results validate the effectiveness of our proposed method.
近年来,由于各种无线设备的广泛使用和互联网上大量的内容,需要一个随时随地提供充分服务的网络系统。在本研究中,我们聚焦于利用大容量储存装置提供上述服务的卫星网路。在这种网络中,使用多颗卫星覆盖整个地球表面,每颗卫星配备一个大容量存储设备。通过使用大容量存储设备,卫星网络可以管理高缓冲容量来处理大量数据。然而,对于这种卫星网络,目前还没有一种路由方法能够有效地利用存储设备和管理网络中的大量数据。本文提出了一种新的路由方案,以有效利用卫星上的海量存储,缓解网络拥塞。对该方法进行了数学分析。数值结果验证了该方法的有效性。
{"title":"An intelligent routing scheme effectively utilizing mass storage embedded on satellites to mitigate network congestions","authors":"Kazuma Kaneko, Y. Kawamoto, Hiroki Nishiyama, N. Kato, Shinichi Yamamoto, N. Yoshimura","doi":"10.1145/2507924.2507951","DOIUrl":"https://doi.org/10.1145/2507924.2507951","url":null,"abstract":"Recently, since many kinds of wireless devices have been widely used and a large amount of contents is available on the Internet, a network system that provides adequate services anytime and anywhere is required. In this research, we focus on satellite networks using mass storage devices to provide the above mentioned services. In this kind of network, multiple satellites are used to cover the whole surface of the earth, and each satellite is equipped with a mass storage device. By using mass storage devices, the satellite network can manage a high buffer capacity to handle large amounts of data. However, no routing method has been developed for such kind of satellite network that can utilize the storage devices and manage the large amount of data in the network effectively. In this paper, we propose a novel routing scheme for the efficient utilization of the mass storage on satellites to mitigate network congestion. The proposed method is analyzed mathematically. The numerical results validate the effectiveness of our proposed method.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115661285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hierarchical modeling of IEEE 802.11 multi-hop wireless networks IEEE 802.11多跳无线网络的分层建模
Thiago Abreu, B. Baynat, Thomas Begin, I. G. Lassous
IEEE 802.11 is implemented in many wireless networks, including multi-hop networks where communications between nodes are conveyed along a chain. We present a modeling framework to evaluate the performance of flows conveyed through such a chain. Our framework is based on a hierarchical modeling composed of two levels. The lower level is dedicated to the modeling of each node, while the upper level matches the actual topology of the chain. Our approach can handle different topologies, takes into account Bit Error Rate and can be applied to multi-hop flows with rates ranging from light to heavy workloads. We assess the ability of our model to evaluate loss rate, throughput, and end-to-end delay experienced by flows on a simple scenario, where the number of nodes is limited to three. Numerical results show that our model accurately approximates the performance of flows with a relative error typically less than 10%.
IEEE 802.11在许多无线网络中实现,包括多跳网络,其中节点之间的通信沿链传输。我们提出了一个建模框架来评估通过这样一个链传递的流的性能。我们的框架基于由两层组成的分层建模。较低的级别专门用于每个节点的建模,而较高的级别匹配链的实际拓扑结构。我们的方法可以处理不同的拓扑,考虑误码率,可以应用于从轻到重工作负载的速率范围内的多跳流。我们评估了我们的模型在一个简单场景中评估流所经历的损失率、吞吐量和端到端延迟的能力,其中节点数量限制为三个。数值计算结果表明,该模型能准确地逼近流动特性,相对误差一般小于10%。
{"title":"Hierarchical modeling of IEEE 802.11 multi-hop wireless networks","authors":"Thiago Abreu, B. Baynat, Thomas Begin, I. G. Lassous","doi":"10.1145/2507924.2507949","DOIUrl":"https://doi.org/10.1145/2507924.2507949","url":null,"abstract":"IEEE 802.11 is implemented in many wireless networks, including multi-hop networks where communications between nodes are conveyed along a chain. We present a modeling framework to evaluate the performance of flows conveyed through such a chain. Our framework is based on a hierarchical modeling composed of two levels. The lower level is dedicated to the modeling of each node, while the upper level matches the actual topology of the chain. Our approach can handle different topologies, takes into account Bit Error Rate and can be applied to multi-hop flows with rates ranging from light to heavy workloads. We assess the ability of our model to evaluate loss rate, throughput, and end-to-end delay experienced by flows on a simple scenario, where the number of nodes is limited to three. Numerical results show that our model accurately approximates the performance of flows with a relative error typically less than 10%.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122901351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Equilibrium sensing time for distributed opportunistic access incognitive radio networks 认知无线网络中分布式机会接入的平衡感知时间
S. Bouferda, Essaid Sabir, A. Hayar, M. Rifi
In this paper, we consider a distributed opportunistic access (D-OSA), in which cognitive radio (CR) users attempt to access a channel licensed to a primary network. In this context, we formulate the problem of designing the equilibrium sensing time in a distributed manner, in order to maximize the throughput of CR users while guarantying a good protection to the primary users (PU). Next, we study the Nash equilibrium of the system, we also propose a combined learning algorithm for continuous actions that is fully distributed, and allows to the CR users to learn their equilibrium payoffs and their equilibrium sensing time. The simulation results show that the system can learn the sensing time and converge to a unique Nash equilibrium, which come to prove the theoretical study. A surprising feature is that there exists a correlation between the transmit probability and the sensing time. More precisely, lower transmit probability induces lower sensing times.
在本文中,我们考虑分布式机会接入(D-OSA),其中认知无线电(CR)用户试图访问授权给主网络的信道。在这种情况下,我们提出了以分布式方式设计平衡感知时间的问题,以最大限度地提高CR用户的吞吐量,同时保证对主用户(PU)的良好保护。接下来,我们研究了系统的纳什均衡,并提出了一种完全分布的连续动作的组合学习算法,并允许CR用户学习其均衡收益和均衡感知时间。仿真结果表明,该系统能够学习感知时间并收敛到唯一的纳什均衡,验证了理论研究的正确性。一个令人惊讶的特征是发射概率与传感时间之间存在相关性。更准确地说,较低的发射概率导致较低的传感次数。
{"title":"Equilibrium sensing time for distributed opportunistic access incognitive radio networks","authors":"S. Bouferda, Essaid Sabir, A. Hayar, M. Rifi","doi":"10.1145/2507924.2507944","DOIUrl":"https://doi.org/10.1145/2507924.2507944","url":null,"abstract":"In this paper, we consider a distributed opportunistic access (D-OSA), in which cognitive radio (CR) users attempt to access a channel licensed to a primary network. In this context, we formulate the problem of designing the equilibrium sensing time in a distributed manner, in order to maximize the throughput of CR users while guarantying a good protection to the primary users (PU). Next, we study the Nash equilibrium of the system, we also propose a combined learning algorithm for continuous actions that is fully distributed, and allows to the CR users to learn their equilibrium payoffs and their equilibrium sensing time. The simulation results show that the system can learn the sensing time and converge to a unique Nash equilibrium, which come to prove the theoretical study. A surprising feature is that there exists a correlation between the transmit probability and the sensing time. More precisely, lower transmit probability induces lower sensing times.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"16 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113979614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed base station activation for energy-efficient operation of cellular networks 面向蜂窝网络节能运行的分布式基站激活
A. Abbasi, Majid Ghaderi
Dynamic base station activation (DBA) has recently emerged as a viable solution for reducing energy consumption in cellular networks. While most of the works on this topic focused on centralized decision making algorithms, in this paper we investigate distributive solutions. These solutions are particularly desirable due to importance of self-organization and self-optimization in future cellular networks. The goal of DBA is to achieve an optimal trade-off between network operator's revenue and operational cost while guaranteeing coverage for network users. The problem is posed as a network utility maximization aiming to find the optimal activation schedule of each base station. Using Lagrangian duality, the problem is decomposed into smaller subproblems, where each subproblem is solved locally at its associated base station. Controlled message passing among base stations ensures convergence to the global optimal solution. Moreover, this general solution is further extended to capture the combinatorial nature of DBA. Finally, numerical results are provided to demonstrate the behavior of our solution in terms of utility and cost trade-off and convergence in some example network scenarios.
动态基站激活(DBA)最近成为减少蜂窝网络能耗的可行解决方案。虽然关于这个主题的大多数工作都集中在集中决策算法上,但在本文中,我们研究分布式解决方案。由于自组织和自优化在未来蜂窝网络中的重要性,这些解决方案是特别可取的。DBA的目标是在保证网络用户覆盖的同时,在网络运营商的收益和运营成本之间实现最优的权衡。该问题是一个网络效用最大化问题,其目标是找出每个基站的最优激活计划。利用拉格朗日对偶性,将该问题分解为更小的子问题,其中每个子问题在其相关的基站局部求解。控制消息在基站间传递,保证了收敛到全局最优解。此外,还进一步扩展了这个通用解决方案,以捕获DBA的组合特性。最后,给出了数值结果来证明我们的解决方案在效用和成本权衡和收敛方面的行为在一些示例网络场景。
{"title":"Distributed base station activation for energy-efficient operation of cellular networks","authors":"A. Abbasi, Majid Ghaderi","doi":"10.1145/2507924.2507961","DOIUrl":"https://doi.org/10.1145/2507924.2507961","url":null,"abstract":"Dynamic base station activation (DBA) has recently emerged as a viable solution for reducing energy consumption in cellular networks. While most of the works on this topic focused on centralized decision making algorithms, in this paper we investigate distributive solutions. These solutions are particularly desirable due to importance of self-organization and self-optimization in future cellular networks. The goal of DBA is to achieve an optimal trade-off between network operator's revenue and operational cost while guaranteeing coverage for network users. The problem is posed as a network utility maximization aiming to find the optimal activation schedule of each base station. Using Lagrangian duality, the problem is decomposed into smaller subproblems, where each subproblem is solved locally at its associated base station. Controlled message passing among base stations ensures convergence to the global optimal solution. Moreover, this general solution is further extended to capture the combinatorial nature of DBA. Finally, numerical results are provided to demonstrate the behavior of our solution in terms of utility and cost trade-off and convergence in some example network scenarios.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116264023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient new delayed ACK for TCP: old problem, new insight TCP有效的新延迟ACK:老问题,新见解
Ming Li, Andrey Lukyanenko, S. Tarkoma, Antti Ylä-Jääski
When a TCP connection experiences a timeout, the sender must wait at least RTOmin (Minimum Retransmission Timeout) before doing the retransmission, during which the channel may be completely idle, undermining the throughput and channel efficiency. In this paper, we investigate the origin of RTOmin and find that it is needed to mitigate against spurious timeouts when the Delayed ACK (DA) scheme for TCP is implemented. Motivated by this observation, we propose a deployable and TCP-compatible new Delayed ACK (NDA) to replace the legacy DA. Our solution differs with previous work is that instead of using complex algorithms or fine-grained timer to tune RTOmin, we modify the DA scheme with minor changes to allow the sender to remove the RTOmin constraint while reserving the delayed ACK function at the receiver. In order to eliminate the aggressiveness of RTO (Retransmission Timeout) after removing RTOmin, we use coding techniques to encode the timeout retransmitted packets to make the potential spurious retransmissions useful. The simulation results demonstrate that in lossy wireless networks, NDA is efficient, because it achieves much higher TCP goodput and channel efficiency compared to DA. The gain we obtain by the use of NDA comes from two-order effects. One effect comes from removing the RTOmin constraint, because small RTO timer makes TCP react quickly to timeouts, resulting in small transmission idle. The other effect comes from eliminating consecutive RTO by allowing the receiver to acknowledge each timeout retransmission, which further reduces the RTO idle.
当TCP连接超时时,发送方必须等待至少RTOmin(最小重传超时)才能进行重传,在此期间通道可能完全空闲,从而降低吞吐量和通道效率。在本文中,我们研究了RTOmin的起源,并发现当TCP的延迟ACK (DA)方案实现时,需要RTOmin来缓解虚假超时。基于这一观察结果,我们提出了一种可部署且与tcp兼容的新型延迟ACK (NDA)来取代传统的DA。我们的解决方案与以前的工作不同之处在于,我们没有使用复杂的算法或细粒度定时器来调优RTOmin,而是对DA方案进行了微小的修改,以允许发送方删除RTOmin约束,同时在接收方保留延迟的ACK函数。在去除RTOmin后,为了消除RTO(重传超时)的攻击性,我们使用编码技术对超时重传的数据包进行编码,使潜在的虚假重传变得有用。仿真结果表明,在有损无线网络中,NDA是高效的,因为它比DA实现了更高的TCP goodput和信道效率。利用NDA获得的增益来自于二阶效应。消除RTOmin约束带来的一个效果是,因为较小的RTO定时器使TCP对超时做出快速反应,从而导致较小的传输空闲。另一个效果来自于通过允许接收方确认每个超时重传来消除连续RTO,这进一步减少了RTO空闲。
{"title":"Efficient new delayed ACK for TCP: old problem, new insight","authors":"Ming Li, Andrey Lukyanenko, S. Tarkoma, Antti Ylä-Jääski","doi":"10.1145/2507924.2507948","DOIUrl":"https://doi.org/10.1145/2507924.2507948","url":null,"abstract":"When a TCP connection experiences a timeout, the sender must wait at least RTOmin (Minimum Retransmission Timeout) before doing the retransmission, during which the channel may be completely idle, undermining the throughput and channel efficiency. In this paper, we investigate the origin of RTOmin and find that it is needed to mitigate against spurious timeouts when the Delayed ACK (DA) scheme for TCP is implemented. Motivated by this observation, we propose a deployable and TCP-compatible new Delayed ACK (NDA) to replace the legacy DA. Our solution differs with previous work is that instead of using complex algorithms or fine-grained timer to tune RTOmin, we modify the DA scheme with minor changes to allow the sender to remove the RTOmin constraint while reserving the delayed ACK function at the receiver. In order to eliminate the aggressiveness of RTO (Retransmission Timeout) after removing RTOmin, we use coding techniques to encode the timeout retransmitted packets to make the potential spurious retransmissions useful. The simulation results demonstrate that in lossy wireless networks, NDA is efficient, because it achieves much higher TCP goodput and channel efficiency compared to DA. The gain we obtain by the use of NDA comes from two-order effects. One effect comes from removing the RTOmin constraint, because small RTO timer makes TCP react quickly to timeouts, resulting in small transmission idle. The other effect comes from eliminating consecutive RTO by allowing the receiver to acknowledge each timeout retransmission, which further reduces the RTO idle.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123196794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling and analysis of link adaptation for LTE-advanced LTE-advanced链路自适应建模与分析
Parth Amin, S. Iraji, J. Nurminen
We present the detailed system model for adaptive modulation and coding (AMC) in the physical layer, and hybrid automatic repeat request (HARQ) in the data link layer, which play key roles in link layer of future wireless technologies as for e.g. LTE-Advanced. The packet combining schemes hard combining and weighted hard combining are compared in an attempt to reduce packet error rate (PER) and increase spectral efficiency. Simulation results show that both combining schemes will always keep the required quality of service (QoS) and increase spectral efficiency significantly over the system without AMC/HARQ. Moreover, with severe interference, hard combining will improve the system spectral efficiency more than weighted hard combining.
提出了物理层自适应调制和编码(AMC)和数据链路层混合自动重复请求(HARQ)的详细系统模型,它们在LTE-Advanced等未来无线技术的链路层中起着关键作用。为了降低包错误率和提高频谱效率,比较了硬合并和加权硬合并两种包合并方案。仿真结果表明,与没有AMC/HARQ的系统相比,两种组合方案都能保持所需的服务质量(QoS),并显著提高频谱效率。此外,在干扰严重的情况下,硬合并比加权硬合并更能提高系统的频谱效率。
{"title":"Modelling and analysis of link adaptation for LTE-advanced","authors":"Parth Amin, S. Iraji, J. Nurminen","doi":"10.1145/2507924.2507986","DOIUrl":"https://doi.org/10.1145/2507924.2507986","url":null,"abstract":"We present the detailed system model for adaptive modulation and coding (AMC) in the physical layer, and hybrid automatic repeat request (HARQ) in the data link layer, which play key roles in link layer of future wireless technologies as for e.g. LTE-Advanced. The packet combining schemes hard combining and weighted hard combining are compared in an attempt to reduce packet error rate (PER) and increase spectral efficiency. Simulation results show that both combining schemes will always keep the required quality of service (QoS) and increase spectral efficiency significantly over the system without AMC/HARQ. Moreover, with severe interference, hard combining will improve the system spectral efficiency more than weighted hard combining.","PeriodicalId":445138,"journal":{"name":"Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128511921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1