Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247205
Yongyue Zhang, Xiangyang Gong, Yannan Hu, Wendong Wang, Xirong Que
Network management system (NMS) is important to ensure security and efficiency of network. Traditional NMS usually adopts SNMP as management protocol and has achieved great success. However, with emerging of various services, traditional network exposes shortcomings. Software-Defined Network (SDN) is a new paradigm which separates the control plane from the forwarding plane as opposed to the distributed control of current networks. This centralized architecture can simplify the complexity of network management. Although SDN has many advantages, it still lacks mature management tools and is difficult to realize full deployment, which makes network operators reluctant to completely replace their legacy NMS. As a result, it is necessary to combine traditional NMS with SDN. This paper presents the design of SDNMP, which is an approach for managing SDN using traditional NMS. To verify our approach, we build and implement a prototype in our own testbed. By deploying virtual networks and services, results show that SDNMP works well in practice.
{"title":"SDNMP: Enabling SDN management using traditional NMS","authors":"Yongyue Zhang, Xiangyang Gong, Yannan Hu, Wendong Wang, Xirong Que","doi":"10.1109/ICCW.2015.7247205","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247205","url":null,"abstract":"Network management system (NMS) is important to ensure security and efficiency of network. Traditional NMS usually adopts SNMP as management protocol and has achieved great success. However, with emerging of various services, traditional network exposes shortcomings. Software-Defined Network (SDN) is a new paradigm which separates the control plane from the forwarding plane as opposed to the distributed control of current networks. This centralized architecture can simplify the complexity of network management. Although SDN has many advantages, it still lacks mature management tools and is difficult to realize full deployment, which makes network operators reluctant to completely replace their legacy NMS. As a result, it is necessary to combine traditional NMS with SDN. This paper presents the design of SDNMP, which is an approach for managing SDN using traditional NMS. To verify our approach, we build and implement a prototype in our own testbed. By deploying virtual networks and services, results show that SDNMP works well in practice.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"9 1","pages":"357-362"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78809283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247534
Johannes Blanckenstein, C. Nardin, J. Klaue, H. Karl
We present the packet error rate (PER) characterization of an aircraft cabin wireless sensor network (WSN). It is based on measurements for a static and a typical dynamic environment, which were both performed in an aircraft cabin mockup. The WSN exploits spatial diversity by using multiple access points, which decreases the average PER by several orders of magnitude. The characterization gives the individual and combined PER, burst error and run length distributions as well as bit error rates for packets which were received, but with errors. The exploitation of spatial redundancy eliminates the additional packet losses caused by the presence of people in the environment.
{"title":"Error characterization of multi-access point WSNs in an aircraft cabin","authors":"Johannes Blanckenstein, C. Nardin, J. Klaue, H. Karl","doi":"10.1109/ICCW.2015.7247534","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247534","url":null,"abstract":"We present the packet error rate (PER) characterization of an aircraft cabin wireless sensor network (WSN). It is based on measurements for a static and a typical dynamic environment, which were both performed in an aircraft cabin mockup. The WSN exploits spatial diversity by using multiple access points, which decreases the average PER by several orders of magnitude. The characterization gives the individual and combined PER, burst error and run length distributions as well as bit error rates for packets which were received, but with errors. The exploitation of spatial redundancy eliminates the additional packet losses caused by the presence of people in the environment.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"44 1","pages":"2363-2368"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90751693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247598
F. Héliot, Ting-Ting Yang, C. Foh
Energy efficiency (EE) is considered as a key enabler for the next generation of communication system. Equally, scheduling is an important aspect for efficient and reliable communication in multi-user system. In this paper, we propose a low-complexity green scheduling algorithm for the downlink of orthogonal frequency division multiple access (OFDMA) cellular system when considering that base station (BS) can coordinate their transmission. More specifically, our aim here is to design a practical, low-complexity and low-power consumption solution based on a realistic EE scheduling criterion, which takes into account the time dependence of the scheduling process. Numerical results indicate that our scheme reduces both the computational complexity (by a factor of at least 25) and transmit power (by at least 30%) while achieving similar EE performance than existing schemes, in a typical cellular environment. Moreover, they confirm the benefit of BS coordination for power and energy consumption reduction.
{"title":"Low-complexity green scheduling for the downlink of coordinated cellular system","authors":"F. Héliot, Ting-Ting Yang, C. Foh","doi":"10.1109/ICCW.2015.7247598","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247598","url":null,"abstract":"Energy efficiency (EE) is considered as a key enabler for the next generation of communication system. Equally, scheduling is an important aspect for efficient and reliable communication in multi-user system. In this paper, we propose a low-complexity green scheduling algorithm for the downlink of orthogonal frequency division multiple access (OFDMA) cellular system when considering that base station (BS) can coordinate their transmission. More specifically, our aim here is to design a practical, low-complexity and low-power consumption solution based on a realistic EE scheduling criterion, which takes into account the time dependence of the scheduling process. Numerical results indicate that our scheme reduces both the computational complexity (by a factor of at least 25) and transmit power (by at least 30%) while achieving similar EE performance than existing schemes, in a typical cellular environment. Moreover, they confirm the benefit of BS coordination for power and energy consumption reduction.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"6 1","pages":"2769-2774"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90064069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247517
Sandeep Kottath, D. Gesbert, E. Hardouin
Dense interference-limited wireless networks can rely coordinated multipoint transmission (such as Network MIMO) as a way to improve on spectral efficiency. Unfortunately, Network MIMO requires global channel state information (CSI) at all transmitters, hence places stringent requirements on backhaul rate and even more on latency. As a solution, this paper investigates an emerging design philosophy for CSI that exploits the broadcast nature of wireless which is well suited to dense networks. In our design, feedback is broadcast from each terminal and decoded opportunistically by any overhearing base station which in turn must design opportunistic interference-cancelling precoders. The corresponding precoder design is shown to be equivalent to a decentralized decision problem whose general solution is challenging, yet for which heuristic schemes can be derived. The obtained algorithms are able to capitalize on the opportunistic feedback without the need for global CSI sharing.
{"title":"Opportunistic feedback mechanisms for decentralized Network MIMO systems","authors":"Sandeep Kottath, D. Gesbert, E. Hardouin","doi":"10.1109/ICCW.2015.7247517","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247517","url":null,"abstract":"Dense interference-limited wireless networks can rely coordinated multipoint transmission (such as Network MIMO) as a way to improve on spectral efficiency. Unfortunately, Network MIMO requires global channel state information (CSI) at all transmitters, hence places stringent requirements on backhaul rate and even more on latency. As a solution, this paper investigates an emerging design philosophy for CSI that exploits the broadcast nature of wireless which is well suited to dense networks. In our design, feedback is broadcast from each terminal and decoded opportunistically by any overhearing base station which in turn must design opportunistic interference-cancelling precoders. The corresponding precoder design is shown to be equivalent to a decentralized decision problem whose general solution is challenging, yet for which heuristic schemes can be derived. The obtained algorithms are able to capitalize on the opportunistic feedback without the need for global CSI sharing.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"35 1","pages":"2257-2262"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89637986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247590
Aleksandra Checko, Anders Christian Juul, H. Christiansen, M. Berger
In this paper, we look at reusing existing packet-based network (e.g. Ethernet) to possibly decrease deployment costs of fronthaul Cloud Radio Access Network (C-RAN) network and cost of Baseband Unit (BBU) resources. The challenge of this solution is that it requires mobile traffic (until now transmitted over synchronous protocols) to traverse the asynchronous Ethernet without losing synchronization. We analyze synchronization requirements of mobile networks and present an overview of solutions that fulfill them in traditional mobile networks. Then we elaborate on challenges that packet-based fronthaul imposes. We analyze possible contributions to frequency and phase error. We verify the feasibility of using the IEEE 1588v2 also know as Precision Time Protocol (PTP) for providing accurate phase and frequency synchronization. The study is based on simulations made in OPNET modeler. Thereby we bridge the gap between Ethernet and mobile network domains creating a comprehensive architectural analysis.
{"title":"Synchronization challenges in packet-based Cloud-RAN fronthaul for mobile networks","authors":"Aleksandra Checko, Anders Christian Juul, H. Christiansen, M. Berger","doi":"10.1109/ICCW.2015.7247590","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247590","url":null,"abstract":"In this paper, we look at reusing existing packet-based network (e.g. Ethernet) to possibly decrease deployment costs of fronthaul Cloud Radio Access Network (C-RAN) network and cost of Baseband Unit (BBU) resources. The challenge of this solution is that it requires mobile traffic (until now transmitted over synchronous protocols) to traverse the asynchronous Ethernet without losing synchronization. We analyze synchronization requirements of mobile networks and present an overview of solutions that fulfill them in traditional mobile networks. Then we elaborate on challenges that packet-based fronthaul imposes. We analyze possible contributions to frequency and phase error. We verify the feasibility of using the IEEE 1588v2 also know as Precision Time Protocol (PTP) for providing accurate phase and frequency synchronization. The study is based on simulations made in OPNET modeler. Thereby we bridge the gap between Ethernet and mobile network domains creating a comprehensive architectural analysis.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"38 1","pages":"2721-2726"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89650170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247576
P. Sarigiannidis, E. Karapistoli, A. Economides
Without doubt, the Internet of Things (IoT) is changing the way people and technology interact. Fuelled by recent advances in networking, communications, computation, software, and hardware technologies, IoT has stepped out of its infancy and is considered as the next breakthrough technology in transforming the Internet into a fully integrated Future Internet. However, realising a network of physical objects accessed through the Internet brings a potential threat in the shadow of the numerous benefits. The threat is “security”. Given that Wireless Sensor Networks (WSNs) leverage the potential of IoT quite efficiently, this paper faces the challenge of security attention on a particular, yet broad, context of IP-enabled WSNs. In particular, it proposes a novel threat visualisation tool for such networks, called VisIoT. VisIoT is a human-interactive visual-based anomaly detection system that is capable of monitoring and promptly detecting several devastating forms of security attacks, including wormhole attacks, and Sybil attacks. Based on a rigorous, radial visualisation design, VisIoT may expose adversaries conducting one or multiple concurrent attacks against IP-enabled WSNs. The system's visual and anomaly detection efficacy in exposing complex security threats is demonstrated through a number of simulated attack scenarios.
{"title":"VisIoT: A threat visualisation tool for IoT systems security","authors":"P. Sarigiannidis, E. Karapistoli, A. Economides","doi":"10.1109/ICCW.2015.7247576","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247576","url":null,"abstract":"Without doubt, the Internet of Things (IoT) is changing the way people and technology interact. Fuelled by recent advances in networking, communications, computation, software, and hardware technologies, IoT has stepped out of its infancy and is considered as the next breakthrough technology in transforming the Internet into a fully integrated Future Internet. However, realising a network of physical objects accessed through the Internet brings a potential threat in the shadow of the numerous benefits. The threat is “security”. Given that Wireless Sensor Networks (WSNs) leverage the potential of IoT quite efficiently, this paper faces the challenge of security attention on a particular, yet broad, context of IP-enabled WSNs. In particular, it proposes a novel threat visualisation tool for such networks, called VisIoT. VisIoT is a human-interactive visual-based anomaly detection system that is capable of monitoring and promptly detecting several devastating forms of security attacks, including wormhole attacks, and Sybil attacks. Based on a rigorous, radial visualisation design, VisIoT may expose adversaries conducting one or multiple concurrent attacks against IP-enabled WSNs. The system's visual and anomaly detection efficacy in exposing complex security threats is demonstrated through a number of simulated attack scenarios.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"71 1","pages":"2633-2638"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87842663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247338
N. Johansson, Y.-P. Eric Wang, Erik Eriksson, Martin Hessler
Fifth generation wireless networks are currently being developed to handle a wide range of new use cases. One important emerging area is ultra-reliable communication with guaranteed low latencies well beyond what current wireless technologies can provide. In this paper, we explore the viability of using wireless communication for low-latency, high-reliability communication in an example scenario of factory automation, and outline important design choices for such a system. We show that it is possible to achieve very low error rates and latencies over a radio channel, also when considering fast fading signal and interference, channel estimation errors, and antenna correlation. The most important tool to ensure high reliability is diversity, and low latency is achieved by using short transmission intervals without retransmissions, which, however, introduces a natural restriction on coverage area.
{"title":"Radio access for ultra-reliable and low-latency 5G communications","authors":"N. Johansson, Y.-P. Eric Wang, Erik Eriksson, Martin Hessler","doi":"10.1109/ICCW.2015.7247338","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247338","url":null,"abstract":"Fifth generation wireless networks are currently being developed to handle a wide range of new use cases. One important emerging area is ultra-reliable communication with guaranteed low latencies well beyond what current wireless technologies can provide. In this paper, we explore the viability of using wireless communication for low-latency, high-reliability communication in an example scenario of factory automation, and outline important design choices for such a system. We show that it is possible to achieve very low error rates and latencies over a radio channel, also when considering fast fading signal and interference, channel estimation errors, and antenna correlation. The most important tool to ensure high reliability is diversity, and low latency is achieved by using short transmission intervals without retransmissions, which, however, introduces a natural restriction on coverage area.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"19 1","pages":"1184-1189"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88061879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247258
Yuan Hu, Weisi Guo, Siyi Wang
In this paper, we define a collision area in a heterogeneous cellular network for the purpose of interference management between Device-to-Device (D2D) and conventional cellular (CC) communications. Currently, most D2D routing algorithms assume synchronized accurate location knowledge among users and the base stations. In reality, this level of location accuracy is difficult and power consuming in Universal Mobile Telecommunications System (UMTS). In current Long-Term Evolution (LTE), there is no location information from the cell besides range information from time measurements. In the absence of accurate location information, we analyze the collision probability of the D2D multi-hop path hitting the defined collision area. Specifically, we consider the problem for three different routing scenarios: intra-cell, intra-cell to cell boundary, and cell boundary to boundary routing. As a result, we propose a dynamic switching strategy between D2D and CC communications in order to minimize mutual interference. The gradient-based switching strategy can avoid collision with the collision area and only requires knowledge of the current user and the final destination user's distances to the serving base station.
{"title":"D2D multi-hop routing: Collision probability and routing strategy with limited location information","authors":"Yuan Hu, Weisi Guo, Siyi Wang","doi":"10.1109/ICCW.2015.7247258","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247258","url":null,"abstract":"In this paper, we define a collision area in a heterogeneous cellular network for the purpose of interference management between Device-to-Device (D2D) and conventional cellular (CC) communications. Currently, most D2D routing algorithms assume synchronized accurate location knowledge among users and the base stations. In reality, this level of location accuracy is difficult and power consuming in Universal Mobile Telecommunications System (UMTS). In current Long-Term Evolution (LTE), there is no location information from the cell besides range information from time measurements. In the absence of accurate location information, we analyze the collision probability of the D2D multi-hop path hitting the defined collision area. Specifically, we consider the problem for three different routing scenarios: intra-cell, intra-cell to cell boundary, and cell boundary to boundary routing. As a result, we propose a dynamic switching strategy between D2D and CC communications in order to minimize mutual interference. The gradient-based switching strategy can avoid collision with the collision area and only requires knowledge of the current user and the final destination user's distances to the serving base station.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"66 1","pages":"670-674"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75979193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247388
Subarna Chatterjee, Subhadeep Sarkar, S. Misra
This work focuses on the quantification of node misbehavior in wireless sensor networks (WSNs). Misbehaving nodes are common within WSNs which are once detected, are penalized and in some cases eliminated from the network. However, node misbehavior might be relative i.e., a node may exhibit maliciousness or selfishness only to a specific set of nodes and may function normally for the rest. In these cases, a complete elimination of the node from the network is unfair. This work mitigates the aforesaid problem and mathematically evaluates the extent of misbehavior of a node through the proposed Metric of Misbehavior (MoM). Based on the Theory of Social Choice, the proposed algorithm considers the misbehaving nodes as the voting alternatives and the normally behaving nodes as the voters. Based on majority ranking of social choice, eventually MoM is obtained for every alternative in a fair manner.
{"title":"Quantification of node misbehavior in wireless sensor networks: A social choice-based approach","authors":"Subarna Chatterjee, Subhadeep Sarkar, S. Misra","doi":"10.1109/ICCW.2015.7247388","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247388","url":null,"abstract":"This work focuses on the quantification of node misbehavior in wireless sensor networks (WSNs). Misbehaving nodes are common within WSNs which are once detected, are penalized and in some cases eliminated from the network. However, node misbehavior might be relative i.e., a node may exhibit maliciousness or selfishness only to a specific set of nodes and may function normally for the rest. In these cases, a complete elimination of the node from the network is unfair. This work mitigates the aforesaid problem and mathematically evaluates the extent of misbehavior of a node through the proposed Metric of Misbehavior (MoM). Based on the Theory of Social Choice, the proposed algorithm considers the misbehaving nodes as the voting alternatives and the normally behaving nodes as the voters. Based on majority ranking of social choice, eventually MoM is obtained for every alternative in a fair manner.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"33 1","pages":"1479-1484"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76030872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247440
Aman Jassal, Basak Oztas, M. Pourazad, P. Nasiopoulos
Long Term Evolution (LTE) has been standardized at the 3GPP since 2008 and targets the delivery of high data rate services with strict quality-of-service (QoS) requirements. It is now the fastest ever growing mobile technology and is gradually becoming the mainstream radio access technology used in cellular networks. The latest video coding standard, High Efficiency Video Coding (HEVC), achieves higher compression rate than its predecessor Advanced Video Coding (AVC) and for the same level of quality uses almost 50% less bandwidth. HEVC is the leading video compression technology that will be used to deliver high-definition (HD) and ultra-high-definition (UHD) video content to users. Extensions of HEVC, such as 3D-HEVC, are now being developed and standardized by MPEG to deliver 3D video content. The current issues with LTE include its lack of awareness regarding the type of packets being transmitted, and their importance to the end user. The aim of this paper is to investigate the performance of 3D-HEVC over LTE networks using metrics such as packet loss ratio and average user throughput. We also propose a cross-layer solution in the form of a packet prioritization scheme to help provide better quality-of-experience (QoE) to users and demonstrate its advantages over a baseline scheme that is not QoE-aware.
{"title":"A packet prioritization scheme for 3D-HEVC content transmission over LTE networks","authors":"Aman Jassal, Basak Oztas, M. Pourazad, P. Nasiopoulos","doi":"10.1109/ICCW.2015.7247440","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247440","url":null,"abstract":"Long Term Evolution (LTE) has been standardized at the 3GPP since 2008 and targets the delivery of high data rate services with strict quality-of-service (QoS) requirements. It is now the fastest ever growing mobile technology and is gradually becoming the mainstream radio access technology used in cellular networks. The latest video coding standard, High Efficiency Video Coding (HEVC), achieves higher compression rate than its predecessor Advanced Video Coding (AVC) and for the same level of quality uses almost 50% less bandwidth. HEVC is the leading video compression technology that will be used to deliver high-definition (HD) and ultra-high-definition (UHD) video content to users. Extensions of HEVC, such as 3D-HEVC, are now being developed and standardized by MPEG to deliver 3D video content. The current issues with LTE include its lack of awareness regarding the type of packets being transmitted, and their importance to the end user. The aim of this paper is to investigate the performance of 3D-HEVC over LTE networks using metrics such as packet loss ratio and average user throughput. We also propose a cross-layer solution in the form of a packet prioritization scheme to help provide better quality-of-experience (QoE) to users and demonstrate its advantages over a baseline scheme that is not QoE-aware.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"104-B 1","pages":"1788-1793"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79031589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}