首页 > 最新文献

2015 IEEE International Conference on Communication Workshop (ICCW)最新文献

英文 中文
SDNMP: Enabling SDN management using traditional NMS SDN:使用传统网管进行SDN管理
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247205
Yongyue Zhang, Xiangyang Gong, Yannan Hu, Wendong Wang, Xirong Que
Network management system (NMS) is important to ensure security and efficiency of network. Traditional NMS usually adopts SNMP as management protocol and has achieved great success. However, with emerging of various services, traditional network exposes shortcomings. Software-Defined Network (SDN) is a new paradigm which separates the control plane from the forwarding plane as opposed to the distributed control of current networks. This centralized architecture can simplify the complexity of network management. Although SDN has many advantages, it still lacks mature management tools and is difficult to realize full deployment, which makes network operators reluctant to completely replace their legacy NMS. As a result, it is necessary to combine traditional NMS with SDN. This paper presents the design of SDNMP, which is an approach for managing SDN using traditional NMS. To verify our approach, we build and implement a prototype in our own testbed. By deploying virtual networks and services, results show that SDNMP works well in practice.
网络管理系统(NMS)是保证网络安全、高效运行的重要系统。传统的NMS通常采用SNMP作为管理协议,并取得了很大的成功。然而,随着各种业务的出现,传统网络暴露出了不足。软件定义网络(SDN)是一种将控制平面与转发平面分离的新模式,与当前网络的分布式控制相对立。这种集中式架构可以简化网络管理的复杂性。SDN虽然有很多优点,但仍然缺乏成熟的管理工具,难以实现全面部署,这使得网络运营商不愿意完全取代其传统NMS。因此,有必要将传统NMS与SDN相结合。本文介绍了SDN网络管理系统的设计,这是一种利用传统的网络管理系统来管理SDN网络的方法。为了验证我们的方法,我们在自己的测试台上构建并实现了一个原型。通过对虚拟网络和虚拟业务的部署,结果表明该方法在实际应用中效果良好。
{"title":"SDNMP: Enabling SDN management using traditional NMS","authors":"Yongyue Zhang, Xiangyang Gong, Yannan Hu, Wendong Wang, Xirong Que","doi":"10.1109/ICCW.2015.7247205","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247205","url":null,"abstract":"Network management system (NMS) is important to ensure security and efficiency of network. Traditional NMS usually adopts SNMP as management protocol and has achieved great success. However, with emerging of various services, traditional network exposes shortcomings. Software-Defined Network (SDN) is a new paradigm which separates the control plane from the forwarding plane as opposed to the distributed control of current networks. This centralized architecture can simplify the complexity of network management. Although SDN has many advantages, it still lacks mature management tools and is difficult to realize full deployment, which makes network operators reluctant to completely replace their legacy NMS. As a result, it is necessary to combine traditional NMS with SDN. This paper presents the design of SDNMP, which is an approach for managing SDN using traditional NMS. To verify our approach, we build and implement a prototype in our own testbed. By deploying virtual networks and services, results show that SDNMP works well in practice.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78809283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Error characterization of multi-access point WSNs in an aircraft cabin 飞机客舱中多接入点无线传感器网络的误差表征
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247534
Johannes Blanckenstein, C. Nardin, J. Klaue, H. Karl
We present the packet error rate (PER) characterization of an aircraft cabin wireless sensor network (WSN). It is based on measurements for a static and a typical dynamic environment, which were both performed in an aircraft cabin mockup. The WSN exploits spatial diversity by using multiple access points, which decreases the average PER by several orders of magnitude. The characterization gives the individual and combined PER, burst error and run length distributions as well as bit error rates for packets which were received, but with errors. The exploitation of spatial redundancy eliminates the additional packet losses caused by the presence of people in the environment.
提出了一种飞机座舱无线传感器网络(WSN)的包错误率(PER)表征方法。它是基于静态和典型动态环境的测量,这两个都是在飞机客舱模型中进行的。无线传感器网络通过使用多个接入点来利用空间分异,使平均PER降低了几个数量级。该特性给出了单个和组合的PER、突发错误和运行长度分布,以及接收到但有错误的数据包的误码率。空间冗余的利用消除了由于环境中存在人员而造成的额外数据包丢失。
{"title":"Error characterization of multi-access point WSNs in an aircraft cabin","authors":"Johannes Blanckenstein, C. Nardin, J. Klaue, H. Karl","doi":"10.1109/ICCW.2015.7247534","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247534","url":null,"abstract":"We present the packet error rate (PER) characterization of an aircraft cabin wireless sensor network (WSN). It is based on measurements for a static and a typical dynamic environment, which were both performed in an aircraft cabin mockup. The WSN exploits spatial diversity by using multiple access points, which decreases the average PER by several orders of magnitude. The characterization gives the individual and combined PER, burst error and run length distributions as well as bit error rates for packets which were received, but with errors. The exploitation of spatial redundancy eliminates the additional packet losses caused by the presence of people in the environment.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90751693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Low-complexity green scheduling for the downlink of coordinated cellular system 协调蜂窝系统下行链路的低复杂度绿色调度
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247598
F. Héliot, Ting-Ting Yang, C. Foh
Energy efficiency (EE) is considered as a key enabler for the next generation of communication system. Equally, scheduling is an important aspect for efficient and reliable communication in multi-user system. In this paper, we propose a low-complexity green scheduling algorithm for the downlink of orthogonal frequency division multiple access (OFDMA) cellular system when considering that base station (BS) can coordinate their transmission. More specifically, our aim here is to design a practical, low-complexity and low-power consumption solution based on a realistic EE scheduling criterion, which takes into account the time dependence of the scheduling process. Numerical results indicate that our scheme reduces both the computational complexity (by a factor of at least 25) and transmit power (by at least 30%) while achieving similar EE performance than existing schemes, in a typical cellular environment. Moreover, they confirm the benefit of BS coordination for power and energy consumption reduction.
能源效率(EE)被认为是下一代通信系统的关键促成因素。在多用户系统中,调度是实现高效、可靠通信的一个重要方面。针对正交频分多址(OFDMA)蜂窝系统下行链路,在考虑基站间协调传输的情况下,提出了一种低复杂度的绿色调度算法。更具体地说,我们这里的目标是设计一个实用的、低复杂性和低功耗的解决方案,基于一个现实的EE调度标准,考虑到调度过程的时间依赖性。数值结果表明,在典型的蜂窝环境中,我们的方案在实现与现有方案相似的EE性能的同时,降低了计算复杂度(至少25倍)和发射功率(至少30%)。此外,他们证实了BS协调对减少电力和能源消耗的好处。
{"title":"Low-complexity green scheduling for the downlink of coordinated cellular system","authors":"F. Héliot, Ting-Ting Yang, C. Foh","doi":"10.1109/ICCW.2015.7247598","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247598","url":null,"abstract":"Energy efficiency (EE) is considered as a key enabler for the next generation of communication system. Equally, scheduling is an important aspect for efficient and reliable communication in multi-user system. In this paper, we propose a low-complexity green scheduling algorithm for the downlink of orthogonal frequency division multiple access (OFDMA) cellular system when considering that base station (BS) can coordinate their transmission. More specifically, our aim here is to design a practical, low-complexity and low-power consumption solution based on a realistic EE scheduling criterion, which takes into account the time dependence of the scheduling process. Numerical results indicate that our scheme reduces both the computational complexity (by a factor of at least 25) and transmit power (by at least 30%) while achieving similar EE performance than existing schemes, in a typical cellular environment. Moreover, they confirm the benefit of BS coordination for power and energy consumption reduction.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90064069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Opportunistic feedback mechanisms for decentralized Network MIMO systems 分散网络MIMO系统的机会反馈机制
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247517
Sandeep Kottath, D. Gesbert, E. Hardouin
Dense interference-limited wireless networks can rely coordinated multipoint transmission (such as Network MIMO) as a way to improve on spectral efficiency. Unfortunately, Network MIMO requires global channel state information (CSI) at all transmitters, hence places stringent requirements on backhaul rate and even more on latency. As a solution, this paper investigates an emerging design philosophy for CSI that exploits the broadcast nature of wireless which is well suited to dense networks. In our design, feedback is broadcast from each terminal and decoded opportunistically by any overhearing base station which in turn must design opportunistic interference-cancelling precoders. The corresponding precoder design is shown to be equivalent to a decentralized decision problem whose general solution is challenging, yet for which heuristic schemes can be derived. The obtained algorithms are able to capitalize on the opportunistic feedback without the need for global CSI sharing.
密集限制干扰的无线网络可以依靠协同多点传输(如网络MIMO)作为提高频谱效率的一种方式。不幸的是,网络MIMO需要所有发射机的全局信道状态信息(CSI),因此对回程速率提出了严格的要求,甚至对延迟提出了更高的要求。作为解决方案,本文研究了CSI的一种新兴设计理念,该理念利用无线的广播特性,非常适合密集网络。在我们的设计中,反馈从每个终端广播,并由任何侦听基站随机解码,而侦听基站又必须设计机会性干扰消除预编码器。相应的预编码器设计等效于一个分散的决策问题,其通解具有挑战性,但可以推导出启发式方案。所获得的算法能够利用机会反馈而不需要全局CSI共享。
{"title":"Opportunistic feedback mechanisms for decentralized Network MIMO systems","authors":"Sandeep Kottath, D. Gesbert, E. Hardouin","doi":"10.1109/ICCW.2015.7247517","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247517","url":null,"abstract":"Dense interference-limited wireless networks can rely coordinated multipoint transmission (such as Network MIMO) as a way to improve on spectral efficiency. Unfortunately, Network MIMO requires global channel state information (CSI) at all transmitters, hence places stringent requirements on backhaul rate and even more on latency. As a solution, this paper investigates an emerging design philosophy for CSI that exploits the broadcast nature of wireless which is well suited to dense networks. In our design, feedback is broadcast from each terminal and decoded opportunistically by any overhearing base station which in turn must design opportunistic interference-cancelling precoders. The corresponding precoder design is shown to be equivalent to a decentralized decision problem whose general solution is challenging, yet for which heuristic schemes can be derived. The obtained algorithms are able to capitalize on the opportunistic feedback without the need for global CSI sharing.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89637986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronization challenges in packet-based Cloud-RAN fronthaul for mobile networks 移动网络基于分组的Cloud-RAN前传中的同步挑战
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247590
Aleksandra Checko, Anders Christian Juul, H. Christiansen, M. Berger
In this paper, we look at reusing existing packet-based network (e.g. Ethernet) to possibly decrease deployment costs of fronthaul Cloud Radio Access Network (C-RAN) network and cost of Baseband Unit (BBU) resources. The challenge of this solution is that it requires mobile traffic (until now transmitted over synchronous protocols) to traverse the asynchronous Ethernet without losing synchronization. We analyze synchronization requirements of mobile networks and present an overview of solutions that fulfill them in traditional mobile networks. Then we elaborate on challenges that packet-based fronthaul imposes. We analyze possible contributions to frequency and phase error. We verify the feasibility of using the IEEE 1588v2 also know as Precision Time Protocol (PTP) for providing accurate phase and frequency synchronization. The study is based on simulations made in OPNET modeler. Thereby we bridge the gap between Ethernet and mobile network domains creating a comprehensive architectural analysis.
在本文中,我们着眼于重用现有的基于分组的网络(例如以太网),以可能降低前传云无线接入网(C-RAN)网络的部署成本和基带单元(BBU)资源的成本。这种解决方案的挑战在于,它要求移动流量(直到现在都是通过同步协议传输的)在不丢失同步的情况下遍历异步以太网。我们分析了移动网络的同步需求,并概述了在传统移动网络中满足这些需求的解决方案。然后,我们详细阐述了基于分组的前传带来的挑战。我们分析了可能对频率和相位误差的贡献。我们验证了使用IEEE 1588v2(也称为精确时间协议(PTP))提供精确相位和频率同步的可行性。该研究是基于在OPNET modeler中进行的仿真。因此,我们弥合了以太网和移动网络领域之间的差距,创建了一个全面的体系结构分析。
{"title":"Synchronization challenges in packet-based Cloud-RAN fronthaul for mobile networks","authors":"Aleksandra Checko, Anders Christian Juul, H. Christiansen, M. Berger","doi":"10.1109/ICCW.2015.7247590","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247590","url":null,"abstract":"In this paper, we look at reusing existing packet-based network (e.g. Ethernet) to possibly decrease deployment costs of fronthaul Cloud Radio Access Network (C-RAN) network and cost of Baseband Unit (BBU) resources. The challenge of this solution is that it requires mobile traffic (until now transmitted over synchronous protocols) to traverse the asynchronous Ethernet without losing synchronization. We analyze synchronization requirements of mobile networks and present an overview of solutions that fulfill them in traditional mobile networks. Then we elaborate on challenges that packet-based fronthaul imposes. We analyze possible contributions to frequency and phase error. We verify the feasibility of using the IEEE 1588v2 also know as Precision Time Protocol (PTP) for providing accurate phase and frequency synchronization. The study is based on simulations made in OPNET modeler. Thereby we bridge the gap between Ethernet and mobile network domains creating a comprehensive architectural analysis.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89650170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
VisIoT: A threat visualisation tool for IoT systems security VisIoT:物联网系统安全威胁可视化工具
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247576
P. Sarigiannidis, E. Karapistoli, A. Economides
Without doubt, the Internet of Things (IoT) is changing the way people and technology interact. Fuelled by recent advances in networking, communications, computation, software, and hardware technologies, IoT has stepped out of its infancy and is considered as the next breakthrough technology in transforming the Internet into a fully integrated Future Internet. However, realising a network of physical objects accessed through the Internet brings a potential threat in the shadow of the numerous benefits. The threat is “security”. Given that Wireless Sensor Networks (WSNs) leverage the potential of IoT quite efficiently, this paper faces the challenge of security attention on a particular, yet broad, context of IP-enabled WSNs. In particular, it proposes a novel threat visualisation tool for such networks, called VisIoT. VisIoT is a human-interactive visual-based anomaly detection system that is capable of monitoring and promptly detecting several devastating forms of security attacks, including wormhole attacks, and Sybil attacks. Based on a rigorous, radial visualisation design, VisIoT may expose adversaries conducting one or multiple concurrent attacks against IP-enabled WSNs. The system's visual and anomaly detection efficacy in exposing complex security threats is demonstrated through a number of simulated attack scenarios.
毫无疑问,物联网(IoT)正在改变人与技术的互动方式。在网络、通信、计算、软件和硬件技术的最新进展的推动下,物联网已经走出了起步阶段,被认为是将互联网转变为完全集成的未来互联网的下一个突破性技术。然而,实现通过互联网访问的物理对象网络在众多好处的阴影下带来了潜在的威胁。威胁是“安全”。鉴于无线传感器网络(wsn)非常有效地利用了物联网的潜力,本文面临着对特定但广泛的支持ip的wsn背景的安全关注的挑战。特别是,它提出了一种新的威胁可视化工具,称为VisIoT。VisIoT是一个人机交互的基于视觉的异常检测系统,能够监测和及时检测几种破坏性的安全攻击形式,包括虫洞攻击和Sybil攻击。基于严格的径向可视化设计,VisIoT可能会暴露对手对启用ip的wsn进行一次或多次并发攻击。通过多个模拟攻击场景,验证了该系统在暴露复杂安全威胁方面的可视化和异常检测效果。
{"title":"VisIoT: A threat visualisation tool for IoT systems security","authors":"P. Sarigiannidis, E. Karapistoli, A. Economides","doi":"10.1109/ICCW.2015.7247576","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247576","url":null,"abstract":"Without doubt, the Internet of Things (IoT) is changing the way people and technology interact. Fuelled by recent advances in networking, communications, computation, software, and hardware technologies, IoT has stepped out of its infancy and is considered as the next breakthrough technology in transforming the Internet into a fully integrated Future Internet. However, realising a network of physical objects accessed through the Internet brings a potential threat in the shadow of the numerous benefits. The threat is “security”. Given that Wireless Sensor Networks (WSNs) leverage the potential of IoT quite efficiently, this paper faces the challenge of security attention on a particular, yet broad, context of IP-enabled WSNs. In particular, it proposes a novel threat visualisation tool for such networks, called VisIoT. VisIoT is a human-interactive visual-based anomaly detection system that is capable of monitoring and promptly detecting several devastating forms of security attacks, including wormhole attacks, and Sybil attacks. Based on a rigorous, radial visualisation design, VisIoT may expose adversaries conducting one or multiple concurrent attacks against IP-enabled WSNs. The system's visual and anomaly detection efficacy in exposing complex security threats is demonstrated through a number of simulated attack scenarios.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87842663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Radio access for ultra-reliable and low-latency 5G communications 用于超可靠和低延迟5G通信的无线接入
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247338
N. Johansson, Y.-P. Eric Wang, Erik Eriksson, Martin Hessler
Fifth generation wireless networks are currently being developed to handle a wide range of new use cases. One important emerging area is ultra-reliable communication with guaranteed low latencies well beyond what current wireless technologies can provide. In this paper, we explore the viability of using wireless communication for low-latency, high-reliability communication in an example scenario of factory automation, and outline important design choices for such a system. We show that it is possible to achieve very low error rates and latencies over a radio channel, also when considering fast fading signal and interference, channel estimation errors, and antenna correlation. The most important tool to ensure high reliability is diversity, and low latency is achieved by using short transmission intervals without retransmissions, which, however, introduces a natural restriction on coverage area.
目前正在开发第五代无线网络,以处理广泛的新用例。一个重要的新兴领域是保证低延迟的超可靠通信,远远超过当前无线技术所能提供的。在本文中,我们探讨了在工厂自动化示例场景中使用无线通信进行低延迟、高可靠性通信的可行性,并概述了此类系统的重要设计选择。我们表明,当考虑到快速衰落信号和干扰、信道估计误差和天线相关性时,在无线电信道上实现非常低的错误率和延迟是可能的。确保高可靠性的最重要的工具是分集,低延迟是通过使用短的传输间隔而不重传来实现的,然而,这对覆盖区域带来了自然的限制。
{"title":"Radio access for ultra-reliable and low-latency 5G communications","authors":"N. Johansson, Y.-P. Eric Wang, Erik Eriksson, Martin Hessler","doi":"10.1109/ICCW.2015.7247338","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247338","url":null,"abstract":"Fifth generation wireless networks are currently being developed to handle a wide range of new use cases. One important emerging area is ultra-reliable communication with guaranteed low latencies well beyond what current wireless technologies can provide. In this paper, we explore the viability of using wireless communication for low-latency, high-reliability communication in an example scenario of factory automation, and outline important design choices for such a system. We show that it is possible to achieve very low error rates and latencies over a radio channel, also when considering fast fading signal and interference, channel estimation errors, and antenna correlation. The most important tool to ensure high reliability is diversity, and low latency is achieved by using short transmission intervals without retransmissions, which, however, introduces a natural restriction on coverage area.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88061879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 199
D2D multi-hop routing: Collision probability and routing strategy with limited location information D2D多跳路由:有限位置信息下的碰撞概率与路由策略
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247258
Yuan Hu, Weisi Guo, Siyi Wang
In this paper, we define a collision area in a heterogeneous cellular network for the purpose of interference management between Device-to-Device (D2D) and conventional cellular (CC) communications. Currently, most D2D routing algorithms assume synchronized accurate location knowledge among users and the base stations. In reality, this level of location accuracy is difficult and power consuming in Universal Mobile Telecommunications System (UMTS). In current Long-Term Evolution (LTE), there is no location information from the cell besides range information from time measurements. In the absence of accurate location information, we analyze the collision probability of the D2D multi-hop path hitting the defined collision area. Specifically, we consider the problem for three different routing scenarios: intra-cell, intra-cell to cell boundary, and cell boundary to boundary routing. As a result, we propose a dynamic switching strategy between D2D and CC communications in order to minimize mutual interference. The gradient-based switching strategy can avoid collision with the collision area and only requires knowledge of the current user and the final destination user's distances to the serving base station.
在本文中,我们在异构蜂窝网络中定义了一个碰撞区域,用于设备对设备(D2D)和传统蜂窝(CC)通信之间的干扰管理。目前,大多数D2D路由算法都假定用户和基站之间同步的精确位置知识。在现实中,这种水平的定位精度在通用移动通信系统(UMTS)中是困难和耗电的。在目前的长期演进(LTE)技术中,除了从时间测量中获得的距离信息外,没有来自小区的位置信息。在没有准确位置信息的情况下,分析了D2D多跳路径与定义碰撞区域的碰撞概率。具体来说,我们考虑了三种不同路由场景的问题:单元内、单元内到单元边界和单元边界到边界路由。因此,我们提出了D2D和CC通信之间的动态切换策略,以尽量减少相互干扰。基于梯度的交换策略可以避免与碰撞区域发生碰撞,并且只需要知道当前用户和最终目标用户到服务基站的距离。
{"title":"D2D multi-hop routing: Collision probability and routing strategy with limited location information","authors":"Yuan Hu, Weisi Guo, Siyi Wang","doi":"10.1109/ICCW.2015.7247258","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247258","url":null,"abstract":"In this paper, we define a collision area in a heterogeneous cellular network for the purpose of interference management between Device-to-Device (D2D) and conventional cellular (CC) communications. Currently, most D2D routing algorithms assume synchronized accurate location knowledge among users and the base stations. In reality, this level of location accuracy is difficult and power consuming in Universal Mobile Telecommunications System (UMTS). In current Long-Term Evolution (LTE), there is no location information from the cell besides range information from time measurements. In the absence of accurate location information, we analyze the collision probability of the D2D multi-hop path hitting the defined collision area. Specifically, we consider the problem for three different routing scenarios: intra-cell, intra-cell to cell boundary, and cell boundary to boundary routing. As a result, we propose a dynamic switching strategy between D2D and CC communications in order to minimize mutual interference. The gradient-based switching strategy can avoid collision with the collision area and only requires knowledge of the current user and the final destination user's distances to the serving base station.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75979193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Quantification of node misbehavior in wireless sensor networks: A social choice-based approach 无线传感器网络中节点不当行为的量化:基于社会选择的方法
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247388
Subarna Chatterjee, Subhadeep Sarkar, S. Misra
This work focuses on the quantification of node misbehavior in wireless sensor networks (WSNs). Misbehaving nodes are common within WSNs which are once detected, are penalized and in some cases eliminated from the network. However, node misbehavior might be relative i.e., a node may exhibit maliciousness or selfishness only to a specific set of nodes and may function normally for the rest. In these cases, a complete elimination of the node from the network is unfair. This work mitigates the aforesaid problem and mathematically evaluates the extent of misbehavior of a node through the proposed Metric of Misbehavior (MoM). Based on the Theory of Social Choice, the proposed algorithm considers the misbehaving nodes as the voting alternatives and the normally behaving nodes as the voters. Based on majority ranking of social choice, eventually MoM is obtained for every alternative in a fair manner.
本工作的重点是无线传感器网络(WSNs)中节点错误行为的量化。行为不端的节点在wsn中很常见,一旦检测到,就会受到惩罚,在某些情况下会从网络中消除。然而,节点不当行为可能是相对的,即节点可能仅对特定的一组节点表现出恶意或自私,而对其余节点可能正常工作。在这些情况下,从网络中完全消除节点是不公平的。这项工作减轻了上述问题,并通过提出的不当行为度量(MoM)从数学上评估节点的不当行为程度。该算法基于社会选择理论,将行为不端的节点作为投票备选,将行为正常的节点作为投票人。通过对社会选择的多数排序,最终公平地得到每个选择的最小方差。
{"title":"Quantification of node misbehavior in wireless sensor networks: A social choice-based approach","authors":"Subarna Chatterjee, Subhadeep Sarkar, S. Misra","doi":"10.1109/ICCW.2015.7247388","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247388","url":null,"abstract":"This work focuses on the quantification of node misbehavior in wireless sensor networks (WSNs). Misbehaving nodes are common within WSNs which are once detected, are penalized and in some cases eliminated from the network. However, node misbehavior might be relative i.e., a node may exhibit maliciousness or selfishness only to a specific set of nodes and may function normally for the rest. In these cases, a complete elimination of the node from the network is unfair. This work mitigates the aforesaid problem and mathematically evaluates the extent of misbehavior of a node through the proposed Metric of Misbehavior (MoM). Based on the Theory of Social Choice, the proposed algorithm considers the misbehaving nodes as the voting alternatives and the normally behaving nodes as the voters. Based on majority ranking of social choice, eventually MoM is obtained for every alternative in a fair manner.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76030872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A packet prioritization scheme for 3D-HEVC content transmission over LTE networks LTE网络上3D-HEVC内容传输的分组优先级方案
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247440
Aman Jassal, Basak Oztas, M. Pourazad, P. Nasiopoulos
Long Term Evolution (LTE) has been standardized at the 3GPP since 2008 and targets the delivery of high data rate services with strict quality-of-service (QoS) requirements. It is now the fastest ever growing mobile technology and is gradually becoming the mainstream radio access technology used in cellular networks. The latest video coding standard, High Efficiency Video Coding (HEVC), achieves higher compression rate than its predecessor Advanced Video Coding (AVC) and for the same level of quality uses almost 50% less bandwidth. HEVC is the leading video compression technology that will be used to deliver high-definition (HD) and ultra-high-definition (UHD) video content to users. Extensions of HEVC, such as 3D-HEVC, are now being developed and standardized by MPEG to deliver 3D video content. The current issues with LTE include its lack of awareness regarding the type of packets being transmitted, and their importance to the end user. The aim of this paper is to investigate the performance of 3D-HEVC over LTE networks using metrics such as packet loss ratio and average user throughput. We also propose a cross-layer solution in the form of a packet prioritization scheme to help provide better quality-of-experience (QoE) to users and demonstrate its advantages over a baseline scheme that is not QoE-aware.
自2008年以来,长期演进(LTE)已经在3GPP标准化,目标是提供具有严格服务质量(QoS)要求的高数据速率业务。它是目前发展最快的移动技术,并逐渐成为蜂窝网络中使用的主流无线接入技术。最新的视频编码标准,高效视频编码(HEVC),实现了比其前身高级视频编码(AVC)更高的压缩率,并且在相同的质量水平下使用的带宽几乎减少了50%。HEVC是一种领先的视频压缩技术,将用于向用户提供高清(HD)和超高清(UHD)视频内容。HEVC的扩展,如3D-HEVC,现在正在由MPEG开发和标准化,以提供3D视频内容。LTE当前的问题包括它对正在传输的数据包类型及其对最终用户的重要性缺乏认识。本文的目的是研究3D-HEVC在LTE网络上的性能,使用诸如丢包率和平均用户吞吐量等指标。我们还以包优先级方案的形式提出了一个跨层解决方案,以帮助为用户提供更好的体验质量(QoE),并展示其优于不感知qos的基线方案的优势。
{"title":"A packet prioritization scheme for 3D-HEVC content transmission over LTE networks","authors":"Aman Jassal, Basak Oztas, M. Pourazad, P. Nasiopoulos","doi":"10.1109/ICCW.2015.7247440","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247440","url":null,"abstract":"Long Term Evolution (LTE) has been standardized at the 3GPP since 2008 and targets the delivery of high data rate services with strict quality-of-service (QoS) requirements. It is now the fastest ever growing mobile technology and is gradually becoming the mainstream radio access technology used in cellular networks. The latest video coding standard, High Efficiency Video Coding (HEVC), achieves higher compression rate than its predecessor Advanced Video Coding (AVC) and for the same level of quality uses almost 50% less bandwidth. HEVC is the leading video compression technology that will be used to deliver high-definition (HD) and ultra-high-definition (UHD) video content to users. Extensions of HEVC, such as 3D-HEVC, are now being developed and standardized by MPEG to deliver 3D video content. The current issues with LTE include its lack of awareness regarding the type of packets being transmitted, and their importance to the end user. The aim of this paper is to investigate the performance of 3D-HEVC over LTE networks using metrics such as packet loss ratio and average user throughput. We also propose a cross-layer solution in the form of a packet prioritization scheme to help provide better quality-of-experience (QoE) to users and demonstrate its advantages over a baseline scheme that is not QoE-aware.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79031589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2015 IEEE International Conference on Communication Workshop (ICCW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1