首页 > 最新文献

2010 IEEE Global Telecommunications Conference GLOBECOM 2010最新文献

英文 中文
Using Centrality-Based Power Control for Hot-Spot Mitigation in Wireless Networks 基于中心性的功率控制在无线网络热点缓解中的应用
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683097
P. Pathak, R. Dutta
When shortest path routing is employed in large scale multi-hop wireless networks, nodes located near the center of the network have to perform disproportionate amount of relaying for others. To solve the problem, various divergent routing schemes are used which route the data on center-avoiding divergent routing paths. Though they achieve better load balancing, overall relaying is increased significantly due to their longer routing paths. In this paper, we propose power control as a way for balancing relay load and mitigating hot-spots in wireless networks. Using a heuristic based on the concept of centrality, we show that if we increase the power levels of only the nodes which are expected to relay more packets, significant relay load balancing can be achieved even with shortest path routing. Different from divergent routing schemes, such load balancing strategy is applicable to any arbitrary topology. Also, it is shown that centrality based power control results into better throughput capacity in many different topologies.
在大规模多跳无线网络中采用最短路径路由时,位于网络中心附近的节点必须为其他节点执行不成比例的中继工作。为了解决这一问题,采用了多种发散路由方案,将数据路由到避免中心的发散路径上。虽然它们实现了更好的负载平衡,但由于它们的路由路径较长,总体中继显着增加。在本文中,我们提出功率控制作为一种平衡中继负载和减轻无线网络热点的方法。使用基于中心性概念的启发式方法,我们表明,如果我们只增加预期中继更多数据包的节点的功率水平,即使使用最短路径路由也可以实现显着的中继负载平衡。与发散路由不同,这种负载均衡策略适用于任意拓扑结构。此外,本文还表明,在许多不同的拓扑中,基于中心性的功率控制可以产生更好的吞吐量。
{"title":"Using Centrality-Based Power Control for Hot-Spot Mitigation in Wireless Networks","authors":"P. Pathak, R. Dutta","doi":"10.1109/GLOCOM.2010.5683097","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683097","url":null,"abstract":"When shortest path routing is employed in large scale multi-hop wireless networks, nodes located near the center of the network have to perform disproportionate amount of relaying for others. To solve the problem, various divergent routing schemes are used which route the data on center-avoiding divergent routing paths. Though they achieve better load balancing, overall relaying is increased significantly due to their longer routing paths. In this paper, we propose power control as a way for balancing relay load and mitigating hot-spots in wireless networks. Using a heuristic based on the concept of centrality, we show that if we increase the power levels of only the nodes which are expected to relay more packets, significant relay load balancing can be achieved even with shortest path routing. Different from divergent routing schemes, such load balancing strategy is applicable to any arbitrary topology. Also, it is shown that centrality based power control results into better throughput capacity in many different topologies.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"46 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88961203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile P2P Multicast Based on Social Network Reducing Psychological Forwarding Cost 基于社交网络的移动P2P组播降低心理转发成本
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683911
H. Kubo, R. Shinkuma, Tatsuro Takahashi
The enhancements of the transmission speed in wireless access networks and mobile-device capacity enable us to use data/audio streaming/video streaming multicast service in large scale networks via their personal mobile devices. Peer-to-peer (P2P) architecture ensures scalability and robustness more easily and more economically than server-client architecture; as the number of nodes in a P2P network increases, the amount of workload per node decreases and lessens the impact of node failure. However, mobile users feel much larger psychological cost due to strict limitations on bandwidth, processing power, memory capacity, and battery life, and they want to minimize their contributions to these services. Therefore, the issue of how we can reduce this psychological cost remains. In this paper, we consider how effective a social networking service is as a platform for mobile P2P multicast. We model users' cooperative behaviors in mobile P2P multicast streaming, and propose a social-network based P2P streaming architecture for mobile networks. We also measured the psychological forwarding cost of real users in mobile P2P multicast streaming through an emulation experiment, and verify that our social-network based mobile P2P multicast streaming improves service quality by reducing the psychological forwarding cost using multi-agent simulation.
无线接入网络传输速度的提高和移动设备容量的提高,使我们能够通过个人移动设备在大规模网络中使用数据/音频流/视频流多播服务。点对点(P2P)架构比服务器-客户端架构更容易、更经济地确保可扩展性和健壮性;随着P2P网络中节点数量的增加,每个节点的工作量会减少,节点故障的影响也会减小。然而,由于带宽、处理能力、内存容量和电池寿命的严格限制,移动用户感到更大的心理成本,他们希望尽量减少对这些服务的贡献。因此,我们如何减少这种心理成本的问题仍然存在。在本文中,我们考虑了社交网络服务作为移动P2P多播平台的有效性。对移动P2P组播流中的用户合作行为进行建模,提出了一种基于社交网络的移动P2P组播流架构。我们还通过仿真实验测量了真实用户在移动P2P组播流中的心理转发成本,并通过多智能体仿真验证了我们基于社交网络的移动P2P组播流通过降低心理转发成本来提高服务质量。
{"title":"Mobile P2P Multicast Based on Social Network Reducing Psychological Forwarding Cost","authors":"H. Kubo, R. Shinkuma, Tatsuro Takahashi","doi":"10.1109/GLOCOM.2010.5683911","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683911","url":null,"abstract":"The enhancements of the transmission speed in wireless access networks and mobile-device capacity enable us to use data/audio streaming/video streaming multicast service in large scale networks via their personal mobile devices. Peer-to-peer (P2P) architecture ensures scalability and robustness more easily and more economically than server-client architecture; as the number of nodes in a P2P network increases, the amount of workload per node decreases and lessens the impact of node failure. However, mobile users feel much larger psychological cost due to strict limitations on bandwidth, processing power, memory capacity, and battery life, and they want to minimize their contributions to these services. Therefore, the issue of how we can reduce this psychological cost remains. In this paper, we consider how effective a social networking service is as a platform for mobile P2P multicast. We model users' cooperative behaviors in mobile P2P multicast streaming, and propose a social-network based P2P streaming architecture for mobile networks. We also measured the psychological forwarding cost of real users in mobile P2P multicast streaming through an emulation experiment, and verify that our social-network based mobile P2P multicast streaming improves service quality by reducing the psychological forwarding cost using multi-agent simulation.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88998049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using ID-Based Digital Signature 基于id数字签名的集群无线传感器网络安全路由协议
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683084
Huang Lu, Jie Li, H. Kameda
In this paper, we study the secure routing for cluster-based sensor networks where clusters are formed dynamically and periodically. We point out the deficiency in the secure routing protocols with symmetric key pairing. Along with the investigation of ID-based cryptography for security in WSNs, we propose a new secure routing protocol with ID-based signature scheme for cluster-based WSNs, in which the security relies on the hardness of the Diffie-Hellman problem in the random oracle model. Because of the communication overhead for security, we provide analysis and simulation results in details to illustrate how various parameters act between security and energy efficiency.
本文研究了动态、周期性形成集群的传感器网络的安全路由问题。指出了对称密钥对安全路由协议存在的不足。在研究基于id的无线传感器网络加密安全性的基础上,提出了一种基于id签名方案的无线传感器网络安全路由协议,该协议的安全性依赖于随机oracle模型中Diffie-Hellman问题的硬度。由于安全性的通信开销,我们提供了详细的分析和仿真结果,以说明各种参数如何在安全性和能源效率之间起作用。
{"title":"A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using ID-Based Digital Signature","authors":"Huang Lu, Jie Li, H. Kameda","doi":"10.1109/GLOCOM.2010.5683084","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683084","url":null,"abstract":"In this paper, we study the secure routing for cluster-based sensor networks where clusters are formed dynamically and periodically. We point out the deficiency in the secure routing protocols with symmetric key pairing. Along with the investigation of ID-based cryptography for security in WSNs, we propose a new secure routing protocol with ID-based signature scheme for cluster-based WSNs, in which the security relies on the hardness of the Diffie-Hellman problem in the random oracle model. Because of the communication overhead for security, we provide analysis and simulation results in details to illustrate how various parameters act between security and energy efficiency.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"9 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89218000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Statistical Analysis of MIMO Beamforming with Co-Channel MIMO Interferers Under Rayleigh Fading 瑞利衰落下同信道MIMO波束形成的统计分析
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684079
Yongzhao Li, L. Cimini, Hailin Zhang, N. Himayat
In this paper, the impact of co-channel MIMO interference on MIMO Beamforming (MBF) in the desired link is investigated. The exact closed-form expression of the probability density function (pdf ) of the signal-to-interference ratio when the desired user has one antenna is derived. Due to the unavailability of the closed-form pdf expression for arbitrary (N,M) (where N and M are the number of transmit and receive antennas, respectively), a simple approximation for an arbitrary number of antennas is proposed and used to analyze the impact of various MIMO modes used by the co-channel base stations. Simulation results verify the validity of the analysis and the impact of cochannel MIMO modes on the desired MBF receiver is discussed.
本文研究了同信道MIMO干扰对目标链路中MIMO波束形成(MBF)的影响。导出了当期望用户有一个天线时,信干扰比的概率密度函数(pdf)的精确封闭表达式。由于无法获得任意(N,M)(其中N和M分别为发射和接收天线的数量)的封闭式pdf表达式,因此提出了任意天线数量的简单近似,并用于分析同信道基站使用的各种MIMO模式的影响。仿真结果验证了分析的有效性,并讨论了同信道MIMO模式对期望MBF接收机的影响。
{"title":"Statistical Analysis of MIMO Beamforming with Co-Channel MIMO Interferers Under Rayleigh Fading","authors":"Yongzhao Li, L. Cimini, Hailin Zhang, N. Himayat","doi":"10.1109/GLOCOM.2010.5684079","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684079","url":null,"abstract":"In this paper, the impact of co-channel MIMO interference on MIMO Beamforming (MBF) in the desired link is investigated. The exact closed-form expression of the probability density function (pdf ) of the signal-to-interference ratio when the desired user has one antenna is derived. Due to the unavailability of the closed-form pdf expression for arbitrary (N,M) (where N and M are the number of transmit and receive antennas, respectively), a simple approximation for an arbitrary number of antennas is proposed and used to analyze the impact of various MIMO modes used by the co-channel base stations. Simulation results verify the validity of the analysis and the impact of cochannel MIMO modes on the desired MBF receiver is discussed.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88872842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cognitive Network Inference through Bayesian Network Analysis 基于贝叶斯网络分析的认知网络推理
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683282
Giorgio Quer, Hemanth Meenakshisundaram, T. B. Reddy, B. S. Manoj, R. Rao, M. Zorzi
Cognitive networking deals with applying cognition to the entire network protocol stack for achieving stack-wide as well as network-wide performance goals, unlike cognitive radios that apply cognition only at the physical layer. Designing a cognitive network is challenging since learning the relationship between network protocol parameters in an automated fashion is very complex. We propose to use Bayesian Network (BN) models for creating a representation of the dependence relationships among network protocol parameters. BN is a unique tool for modeling the network protocol stack as it not only learns the probabilistic dependence of network protocol parameters but also provides an opportunity to tune some of the cognitive network parameters to achieve desired performance. To the best of our knowledge, this is the first work to explore the use of BNs for cognitive networks. Creating a BN model for network parameters involves the following steps: sampling the network protocol parameters (Observe), learning the structure of the BN and its parameters from the data (Learn), using a Bayesian Network inference engine (Plan and Decide) to make decisions, and finally effecting the decisions (Act). We have proved the feasibility of achieving a BN-based cognitive network system using the ns-3 simulation platform. From the early results obtained from our cognitive network approach, we provide interesting insights on predicting the network behavior, including the performance of the TCP throughput inference engine based on other observed parameters.
认知网络处理将认知应用于整个网络协议栈,以实现堆栈范围和网络范围的性能目标,而不像认知无线电只在物理层应用认知。设计认知网络具有挑战性,因为以自动化的方式学习网络协议参数之间的关系非常复杂。我们建议使用贝叶斯网络(BN)模型来创建网络协议参数之间依赖关系的表示。BN是一种独特的网络协议栈建模工具,因为它不仅学习网络协议参数的概率依赖性,而且还提供了调整一些认知网络参数以达到预期性能的机会。据我们所知,这是第一个探索在认知网络中使用神经网络的工作。创建网络参数的BN模型包括以下步骤:对网络协议参数进行采样(Observe),从数据中学习BN的结构及其参数(Learn),使用贝叶斯网络推理引擎(Plan and Decide)进行决策,最后影响决策(Act)。我们利用ns-3仿真平台证明了实现基于bn的认知网络系统的可行性。从我们的认知网络方法获得的早期结果中,我们提供了关于预测网络行为的有趣见解,包括基于其他观察到的参数的TCP吞吐量推理引擎的性能。
{"title":"Cognitive Network Inference through Bayesian Network Analysis","authors":"Giorgio Quer, Hemanth Meenakshisundaram, T. B. Reddy, B. S. Manoj, R. Rao, M. Zorzi","doi":"10.1109/GLOCOM.2010.5683282","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683282","url":null,"abstract":"Cognitive networking deals with applying cognition to the entire network protocol stack for achieving stack-wide as well as network-wide performance goals, unlike cognitive radios that apply cognition only at the physical layer. Designing a cognitive network is challenging since learning the relationship between network protocol parameters in an automated fashion is very complex. We propose to use Bayesian Network (BN) models for creating a representation of the dependence relationships among network protocol parameters. BN is a unique tool for modeling the network protocol stack as it not only learns the probabilistic dependence of network protocol parameters but also provides an opportunity to tune some of the cognitive network parameters to achieve desired performance. To the best of our knowledge, this is the first work to explore the use of BNs for cognitive networks. Creating a BN model for network parameters involves the following steps: sampling the network protocol parameters (Observe), learning the structure of the BN and its parameters from the data (Learn), using a Bayesian Network inference engine (Plan and Decide) to make decisions, and finally effecting the decisions (Act). We have proved the feasibility of achieving a BN-based cognitive network system using the ns-3 simulation platform. From the early results obtained from our cognitive network approach, we provide interesting insights on predicting the network behavior, including the performance of the TCP throughput inference engine based on other observed parameters.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"43 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88881159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Packet-Reliability-Based Decode-and-Forward Distributed Space-Time Shift Keying 基于包可靠性的译码转发分布式时空移位键控
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683503
S. Sugiura, Sheng Chen, L. Hanzo
Motivated by the recent concept of Space-Time Shift Keying (STSK), we propose a novel cooperative STSK scheme, which is capable of achieving a flexible rate-diversity tradeoff, in the context of cooperative space-time transmissions. More specifically, in our cooperative STSK scheme each Relay Node (RN) activates Decode-and-Forward (DF) transmissions, depending on the success or failure of Cyclic Redundancy Checking (CRC). We propose a novel bit-to STSK mapping rule, where according to the input bits, one of the Q pre-assigned dispersion vectors is activated to implicitly convey log2 Q bits, which are transmitted in combination with the classic log2(L)-bit modulated symbol. Additionally, we introduce a beneficial dispersion vector design, which enables us to dispense with symbol-level Inter-Relay Synchronization (IRS). Furthermore, the Destination Node (DN) is capable of jointly detecting the signals received from the source-destination and relay-destination links, using a low-complexity single-stream-based Maximum Likelihood (ML) detector, which is an explicit benefit of our Inter-Element Interference (IEI)-free system model. More importantly, as a benefit of its design flexibility, our cooperative STSK arrangement enables us to adapt the number of the RNs, the transmission rate as well as the achievable diversity order.
受时空移位键控(STSK)概念的启发,我们提出了一种新的协同时空移位键控方案,该方案能够在协同时空传输的背景下实现灵活的速率分集权衡。更具体地说,在我们的合作STSK方案中,每个中继节点(RN)激活解码转发(DF)传输,这取决于循环冗余检查(CRC)的成功或失败。我们提出了一种新的bit-to - STSK映射规则,根据输入位,激活Q预分配色散向量中的一个隐式传输log2 Q位,并与经典的log2(L)位调制符号结合传输。此外,我们还引入了一种有益的色散矢量设计,使我们能够省去符号级中继间同步(IRS)。此外,目的节点(DN)能够使用低复杂度的基于单流的最大似然(ML)检测器联合检测从源-目的地和中继-目的地链路接收的信号,这是我们的元素间干扰(IEI)无系统模型的一个明显优点。更重要的是,由于其设计的灵活性,我们的合作STSK安排使我们能够适应rn的数量,传输速率以及可实现的分集顺序。
{"title":"Packet-Reliability-Based Decode-and-Forward Distributed Space-Time Shift Keying","authors":"S. Sugiura, Sheng Chen, L. Hanzo","doi":"10.1109/GLOCOM.2010.5683503","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683503","url":null,"abstract":"Motivated by the recent concept of Space-Time Shift Keying (STSK), we propose a novel cooperative STSK scheme, which is capable of achieving a flexible rate-diversity tradeoff, in the context of cooperative space-time transmissions. More specifically, in our cooperative STSK scheme each Relay Node (RN) activates Decode-and-Forward (DF) transmissions, depending on the success or failure of Cyclic Redundancy Checking (CRC). We propose a novel bit-to STSK mapping rule, where according to the input bits, one of the Q pre-assigned dispersion vectors is activated to implicitly convey log2 Q bits, which are transmitted in combination with the classic log2(L)-bit modulated symbol. Additionally, we introduce a beneficial dispersion vector design, which enables us to dispense with symbol-level Inter-Relay Synchronization (IRS). Furthermore, the Destination Node (DN) is capable of jointly detecting the signals received from the source-destination and relay-destination links, using a low-complexity single-stream-based Maximum Likelihood (ML) detector, which is an explicit benefit of our Inter-Element Interference (IEI)-free system model. More importantly, as a benefit of its design flexibility, our cooperative STSK arrangement enables us to adapt the number of the RNs, the transmission rate as well as the achievable diversity order.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"39 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83100164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Novel PMEPR Control Approach for 64- and 256-QAM Coded OFDM Systems 64 qam和256 qam编码OFDM系统的PMEPR控制方法
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683185
S. Huang, Hsiao-Chun Wu, J. Cioffi
Orthogonal frequency division multiplexing (OFDM) is a prevalent telecommunication technology to mitigate multipath distortion with high-order modulations such as quadrature amplitude modulation (QAM). However, uncoded OFDM systems also have a serious drawback of high peak-to-mean envelope power ratio (PMEPR). On the other hand, coded OFDM systems can reduce the PMEPR problem but often lead to low code rates. There is thus a tradeoff between PMEPR and code rate in the design of OFDM systems. In this paper, PMEPR reduction for OFDM 64- and 256-QAM sequences is comprehensively studied. Four new families of 64-QAM sequences and seven new families of 256-QAM sequences are proposed to achieve the lowest PMEPR, the highest code rate, or the tradeoffs between these two metrics. Through the comparison with all other OFDM 16- or 64-QAM sequences, these new families of OFDM sequences can facilitate higher code rates. Furthermore, many of these new sequences have lower PMEPR than other OFDM sequences. Adjustment of the tradeoff between PMEPR and code rate can be made to meet the stringent demand in low PMEPR or the need for high code rate subject to various system requirements. Moreover, the construction method of the proposed new sequences is quite simple.
正交频分复用(OFDM)是一种流行的通信技术,用于减轻高阶调制(如正交调幅(QAM))带来的多径失真。然而,无编码OFDM系统也有较高的峰值平均包络功率比(PMEPR)的严重缺点。另一方面,编码OFDM系统可以减少PMEPR问题,但往往导致低码率。因此,在OFDM系统的设计中,PMEPR和码率之间存在权衡。本文对OFDM 64- qam和256-QAM序列的PMEPR降低进行了全面的研究。提出了4个新的64-QAM序列族和7个新的256-QAM序列族,以实现最低的PMEPR,最高的码率,或者在这两个指标之间进行权衡。通过与其他所有的16- qam或64-QAM序列的比较,这些新的OFDM序列族可以实现更高的码率。此外,许多这些新序列的PMEPR比其他OFDM序列低。调整PMEPR和码率之间的权衡可以满足低PMEPR的严格要求或根据不同的系统要求对高码率的需要。此外,所提出的新序列的构造方法非常简单。
{"title":"Novel PMEPR Control Approach for 64- and 256-QAM Coded OFDM Systems","authors":"S. Huang, Hsiao-Chun Wu, J. Cioffi","doi":"10.1109/GLOCOM.2010.5683185","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683185","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is a prevalent telecommunication technology to mitigate multipath distortion with high-order modulations such as quadrature amplitude modulation (QAM). However, uncoded OFDM systems also have a serious drawback of high peak-to-mean envelope power ratio (PMEPR). On the other hand, coded OFDM systems can reduce the PMEPR problem but often lead to low code rates. There is thus a tradeoff between PMEPR and code rate in the design of OFDM systems. In this paper, PMEPR reduction for OFDM 64- and 256-QAM sequences is comprehensively studied. Four new families of 64-QAM sequences and seven new families of 256-QAM sequences are proposed to achieve the lowest PMEPR, the highest code rate, or the tradeoffs between these two metrics. Through the comparison with all other OFDM 16- or 64-QAM sequences, these new families of OFDM sequences can facilitate higher code rates. Furthermore, many of these new sequences have lower PMEPR than other OFDM sequences. Adjustment of the tradeoff between PMEPR and code rate can be made to meet the stringent demand in low PMEPR or the need for high code rate subject to various system requirements. Moreover, the construction method of the proposed new sequences is quite simple.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"106 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80693188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Degrees of Freedom on MIMO Multi-Link Two-Way Relay Channels MIMO多链路双向中继信道的自由度
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683864
Kwangwon Lee, Seokhwan Park, Jin-Sung Kim, Inkyu Lee
In this paper, we introduce multi-link two-way relay channels where multiple two-way relay systems are interfering with each other. We study the capacity of this system by investigating the degree of freedom (DOF) with various message settings. Specifically, we consider two cases of two-way relay interference channels and two-way relay X channels. We show that the two-way relay interference channel where all nodes have M antennas obtains the DOF of 2M and compare with multipair two-way relay channels. Next, we introduce general message settings for two-way relay X channels. For the case where each user is equipped with 3 antennas and relays have 4 antennas, we prove that the DOF of 8 is achieved by employing network coding.
本文介绍了多个双向中继系统相互干扰的多链路双向中继信道。我们通过研究不同消息设置下的自由度(DOF)来研究系统的容量。具体来说,我们考虑了双向中继干扰通道和双向中继X通道两种情况。我们证明了所有节点有M个天线的双向中继干扰信道获得了2M的DOF,并与多对双向中继信道进行了比较。接下来,我们介绍双向中继X通道的一般消息设置。对于每个用户配置3根天线,中继配置4根天线的情况,我们证明了采用网络编码可以实现8的自由度。
{"title":"Degrees of Freedom on MIMO Multi-Link Two-Way Relay Channels","authors":"Kwangwon Lee, Seokhwan Park, Jin-Sung Kim, Inkyu Lee","doi":"10.1109/GLOCOM.2010.5683864","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683864","url":null,"abstract":"In this paper, we introduce multi-link two-way relay channels where multiple two-way relay systems are interfering with each other. We study the capacity of this system by investigating the degree of freedom (DOF) with various message settings. Specifically, we consider two cases of two-way relay interference channels and two-way relay X channels. We show that the two-way relay interference channel where all nodes have M antennas obtains the DOF of 2M and compare with multipair two-way relay channels. Next, we introduce general message settings for two-way relay X channels. For the case where each user is equipped with 3 antennas and relays have 4 antennas, we prove that the DOF of 8 is achieved by employing network coding.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"71 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83707462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
SKWeak Attacks on Path Splicing: Vulnerability Assessment and Defense Mechanisms 路径拼接的SKWeak攻击:脆弱性评估与防御机制
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683909
E. Guirguis, Mina Guirguis, Christopher Page
Path splicing is a proposed routing architecture for the Internet in which end-hosts (and intermediate routers) are empowered to change the paths their traffic uses by modifying a number of bits in the packet headers. These bits allow intermediate routers to choose alternate paths from the shortest one. To that end, this paper exposes SKWeak (Selective K Weakest links) attacks that exploit the adaptive behavior of end-hosts, through attacking the K weakest links. We show that SKWeak attack can significantly increase the network overhead due to the use of non-optimal paths. Our results show a multiplicative factor of SKWeak attacks that are close to 700. We propose defense mechanisms that aim to limit the dynamics induced by preventing excessive splicing from end-hosts. Our assessment is conducted on the Sprint topology with synthetic traffic matrices.
路径拼接是一种建议的互联网路由架构,在这种架构中,终端主机(和中间路由器)被授权通过修改数据包头中的一些位来改变其流量使用的路径。这些位允许中间路由器从最短路径中选择备用路径。为此,本文通过攻击K个最薄弱环节,揭示了利用终端主机自适应行为的SKWeak(选择性K个最薄弱环节)攻击。我们表明,由于使用非最优路径,SKWeak攻击可以显着增加网络开销。我们的结果显示,SKWeak攻击的乘数接近700。我们提出了防御机制,旨在限制由防止末端宿主过度剪接引起的动态。我们的评估是在Sprint拓扑上使用合成流量矩阵进行的。
{"title":"SKWeak Attacks on Path Splicing: Vulnerability Assessment and Defense Mechanisms","authors":"E. Guirguis, Mina Guirguis, Christopher Page","doi":"10.1109/GLOCOM.2010.5683909","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683909","url":null,"abstract":"Path splicing is a proposed routing architecture for the Internet in which end-hosts (and intermediate routers) are empowered to change the paths their traffic uses by modifying a number of bits in the packet headers. These bits allow intermediate routers to choose alternate paths from the shortest one. To that end, this paper exposes SKWeak (Selective K Weakest links) attacks that exploit the adaptive behavior of end-hosts, through attacking the K weakest links. We show that SKWeak attack can significantly increase the network overhead due to the use of non-optimal paths. Our results show a multiplicative factor of SKWeak attacks that are close to 700. We propose defense mechanisms that aim to limit the dynamics induced by preventing excessive splicing from end-hosts. Our assessment is conducted on the Sprint topology with synthetic traffic matrices.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"53 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83812373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advanced Mechanisms for Sleep Mode Optimization of VoIP Traffic over IEEE 802.16m 基于IEEE 802.16m的VoIP流量睡眠模式优化的高级机制
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683895
R. K. Kalle, M. Gupta, Aran Bergman, Elad Levy, Shantidev Mohanty, M. Venkatachalam, D. Das
Since mobile devices are equipped with limited battery power, it is essential to have efficient power management mechanisms in mobile broadband networks such as mobile WiMAX that enable always on connectivity and provide high throughputs. In recent times Voice over IP (VoIP) has emerged as an important and dominant application in broadband mobile networks such as WiMAX. VoIP traffic is uniquely characterized by small packets sent regularly at periodic intervals and are bound by strict latency requirements for satisfactory user experience. This paper presents novel mechanisms to achieve enhanced power saving during a VoIP session by exploiting unique characteristics of VoIP traffic in next generation mobile WiMAX networks based on IEEE 802.16m standard. The analytical model and simulation results indicate that proposed methods reduce the average power consumption during a VoIP call by up to 70% compared to the existing IEEE 802.16m draft specifications. Moreover, the simulation results closely match our proposed analytical model.
由于移动设备配备的电池电量有限,因此在移动宽带网络(如移动WiMAX)中必须有有效的电源管理机制,以实现始终在线连接并提供高吞吐量。近年来,IP语音(VoIP)已成为WiMAX等宽带移动网络的重要和主导应用。VoIP流量的独特特点是定期发送小数据包,并且受到严格的延迟要求的约束,以获得满意的用户体验。本文通过利用基于IEEE 802.16m标准的下一代移动WiMAX网络中VoIP业务的独特特性,提出了在VoIP会话期间实现增强省电的新机制。分析模型和仿真结果表明,与现有的IEEE 802.16m草案规范相比,所提出的方法可将VoIP呼叫期间的平均功耗降低高达70%。仿真结果与本文提出的分析模型吻合较好。
{"title":"Advanced Mechanisms for Sleep Mode Optimization of VoIP Traffic over IEEE 802.16m","authors":"R. K. Kalle, M. Gupta, Aran Bergman, Elad Levy, Shantidev Mohanty, M. Venkatachalam, D. Das","doi":"10.1109/GLOCOM.2010.5683895","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683895","url":null,"abstract":"Since mobile devices are equipped with limited battery power, it is essential to have efficient power management mechanisms in mobile broadband networks such as mobile WiMAX that enable always on connectivity and provide high throughputs. In recent times Voice over IP (VoIP) has emerged as an important and dominant application in broadband mobile networks such as WiMAX. VoIP traffic is uniquely characterized by small packets sent regularly at periodic intervals and are bound by strict latency requirements for satisfactory user experience. This paper presents novel mechanisms to achieve enhanced power saving during a VoIP session by exploiting unique characteristics of VoIP traffic in next generation mobile WiMAX networks based on IEEE 802.16m standard. The analytical model and simulation results indicate that proposed methods reduce the average power consumption during a VoIP call by up to 70% compared to the existing IEEE 802.16m draft specifications. Moreover, the simulation results closely match our proposed analytical model.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79221683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1