首页 > 最新文献

2014 IEEE Global Communications Conference最新文献

英文 中文
Power efficient uplink resource allocation in LTE networks under delay QoS constraints 时延QoS约束下LTE网络的高效上行资源分配
Pub Date : 2014-12-10 DOI: 10.1109/GLOCOM.2014.7036978
Adnan Aijaz, M. R. Nakhai, H. Aghvami
In this paper, we investigate power efficient resource allocation for the uplink of LTE networks under delay Quality-of-Service (QoS) constraints. We formulate the resource allocation problem as the minimization of sum power in the uplink under statistical delay QoS provisioning, which is complicated due to the specific constraints of SC-FDMA (uplink air interface in LTE networks). We solve the problem using Canonical duality theory. Numerical results which are obtained using the Invasive Weed Optimization algorithm, show that the proposed resource allocation algorithm not only outperforms classical algorithms in terms of power efficiency while satisfying the QoS requirements, but also performs closer to the optimal solution.
在本文中,我们研究了延迟服务质量(QoS)约束下LTE网络上行链路的功率高效资源分配。由于SC-FDMA (LTE网络中的上行链路空中接口)的特定约束,资源分配问题比较复杂,我们将资源分配问题表述为统计延迟QoS提供下上行链路和功率的最小化问题。我们用正则对偶理论解决了这个问题。利用入侵杂草优化算法得到的数值结果表明,本文提出的资源分配算法在满足QoS要求的同时,不仅在功耗方面优于经典算法,而且更接近于最优解。
{"title":"Power efficient uplink resource allocation in LTE networks under delay QoS constraints","authors":"Adnan Aijaz, M. R. Nakhai, H. Aghvami","doi":"10.1109/GLOCOM.2014.7036978","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036978","url":null,"abstract":"In this paper, we investigate power efficient resource allocation for the uplink of LTE networks under delay Quality-of-Service (QoS) constraints. We formulate the resource allocation problem as the minimization of sum power in the uplink under statistical delay QoS provisioning, which is complicated due to the specific constraints of SC-FDMA (uplink air interface in LTE networks). We solve the problem using Canonical duality theory. Numerical results which are obtained using the Invasive Weed Optimization algorithm, show that the proposed resource allocation algorithm not only outperforms classical algorithms in terms of power efficiency while satisfying the QoS requirements, but also performs closer to the optimal solution.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"26 1","pages":"1239-1244"},"PeriodicalIF":0.0,"publicationDate":"2014-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84970636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks 收获和干扰:提高无线能量收集合作网络的安全性
Pub Date : 2014-12-09 DOI: 10.1109/GLOCOM.2014.7037289
Hong Xing, Zheng Chu, Z. Ding, A. Nallanathan
The emerging radio signal enabled simultaneous wireless information and power transfer (SWIPT), has drawn significant attention. To achieve secrecy transmission by cooperative jamming, especially in the upcoming 5G networks with self-sustainable mobile base stations (BSs) and yet not to add extra power consumption, we propose in this paper a new relay protocol, i.e., harvest-and-jam (HJ), in a relay wiretap channel with an additional set of spare helpers. Specifically, in the first transmission phase, a single-antenna transmitter (Tx) transfers signals carrying both information and energy to a multi-antenna amplify-and-forward (AF) relay and a group of multi-antenna helpers; in the second transmission phase, the AF relay processes the information and forwards it to the receiver while each of the helpers generates an artificial noise (AN), the power of which is constrained by its previously harvested energy, to interfere with the eavesdropper. By optimizing the transmit beamforming matrix for the AF relay and the covariance matrix for the AN, we maximize the secrecy rate for the receiver subject to transmit power constraints for the AF relay and all helpers. The formulated problem is shown to be non-convex, for which we propose an iterative algorithm based on alternating optimization. Finally, the performance of the proposed scheme is evaluated by simulations as compared to other heuristic schemes.
新兴的无线电信号实现了同步无线信息和电力传输(SWIPT),引起了人们的极大关注。为了通过协同干扰实现保密传输,特别是在即将到来的具有自我可持续移动基站(BSs)的5G网络中,同时又不增加额外的功耗,我们在本文中提出了一种新的中继协议,即在具有额外一组备用助手的中继窃听信道中收获和干扰(HJ)。具体地说,在第一传输阶段,单天线发射机(Tx)将携带信息和能量的信号传输给多天线放大转发(AF)中继和一组多天线辅助器;在第二个传输阶段,自动对焦中继处理信息并将其转发给接收者,而每个助手都会产生人工噪声(an),其功率受其先前收集的能量的限制,以干扰窃听者。通过优化AF中继的发射波束形成矩阵和AN的协方差矩阵,我们在AF中继和所有辅助器的发射功率约束下,最大限度地提高了接收端的保密率。本文提出了一种基于交替优化的迭代算法。最后,通过仿真与其他启发式算法进行了性能比较。
{"title":"Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks","authors":"Hong Xing, Zheng Chu, Z. Ding, A. Nallanathan","doi":"10.1109/GLOCOM.2014.7037289","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037289","url":null,"abstract":"The emerging radio signal enabled simultaneous wireless information and power transfer (SWIPT), has drawn significant attention. To achieve secrecy transmission by cooperative jamming, especially in the upcoming 5G networks with self-sustainable mobile base stations (BSs) and yet not to add extra power consumption, we propose in this paper a new relay protocol, i.e., harvest-and-jam (HJ), in a relay wiretap channel with an additional set of spare helpers. Specifically, in the first transmission phase, a single-antenna transmitter (Tx) transfers signals carrying both information and energy to a multi-antenna amplify-and-forward (AF) relay and a group of multi-antenna helpers; in the second transmission phase, the AF relay processes the information and forwards it to the receiver while each of the helpers generates an artificial noise (AN), the power of which is constrained by its previously harvested energy, to interfere with the eavesdropper. By optimizing the transmit beamforming matrix for the AF relay and the covariance matrix for the AN, we maximize the secrecy rate for the receiver subject to transmit power constraints for the AF relay and all helpers. The formulated problem is shown to be non-convex, for which we propose an iterative algorithm based on alternating optimization. Finally, the performance of the proposed scheme is evaluated by simulations as compared to other heuristic schemes.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"28 1","pages":"3145-3150"},"PeriodicalIF":0.0,"publicationDate":"2014-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78134255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Two-way relaying networks with wireless power transfer: Policies design and throughput analysis 具有无线电力传输的双向中继网络:策略设计和吞吐量分析
Pub Date : 2014-12-09 DOI: 10.1109/GLOCOM.2014.7037438
Yuanwei Liu, Lifeng Wang, M. Elkashlan, T. Duong, A. Nallanathan
This paper exploits an amplify-and-forward (AF) two-way relaying network (TWRN), where an energy constrained relay node harvests energy with wireless power transfer. Two bidirectional protocols, multiple access broadcast (MABC) protocol and time division broadcast (TDBC) protocol, are considered. Three wireless power transfer policies, namely, dual-source (DS) power transfer; single-fixed-source (SFS) power transfer; and single-best-source (SBS) power transfer are proposed and well-designed based on time switching receiver architecture. We derive analytical expressions to determine the throughput both for delay-limited transmission and delay-tolerant transmission. Numerical results corroborate our analysis and show that MABC protocol achieves a higher throughput than TDBC protocol. An important observation is that SBS policy offers a good tradeoff between throughput and power.
本文研究了一种放大转发(AF)双向中继网络(TWRN),其中能量受限的中继节点通过无线电力传输获取能量。考虑了两种双向协议,即多址广播(MABC)协议和时分广播(TDBC)协议。三种无线电力传输策略,即双源(DS)电力传输;单固定源(SFS)输电;提出并设计了基于时交换接收机结构的单最优源功率传输。导出了确定延迟限制传输和延迟容忍传输吞吐量的解析表达式。数值结果证实了我们的分析,并表明MABC协议比TDBC协议实现了更高的吞吐量。一个重要的观察结果是,SBS策略在吞吐量和功率之间提供了一个很好的权衡。
{"title":"Two-way relaying networks with wireless power transfer: Policies design and throughput analysis","authors":"Yuanwei Liu, Lifeng Wang, M. Elkashlan, T. Duong, A. Nallanathan","doi":"10.1109/GLOCOM.2014.7037438","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037438","url":null,"abstract":"This paper exploits an amplify-and-forward (AF) two-way relaying network (TWRN), where an energy constrained relay node harvests energy with wireless power transfer. Two bidirectional protocols, multiple access broadcast (MABC) protocol and time division broadcast (TDBC) protocol, are considered. Three wireless power transfer policies, namely, dual-source (DS) power transfer; single-fixed-source (SFS) power transfer; and single-best-source (SBS) power transfer are proposed and well-designed based on time switching receiver architecture. We derive analytical expressions to determine the throughput both for delay-limited transmission and delay-tolerant transmission. Numerical results corroborate our analysis and show that MABC protocol achieves a higher throughput than TDBC protocol. An important observation is that SBS policy offers a good tradeoff between throughput and power.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"14 1","pages":"4030-4035"},"PeriodicalIF":0.0,"publicationDate":"2014-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87739660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
Resource management in cognitive opportunistic access femtocells with imperfect spectrum sensing 不完全频谱感知下认知机会接入飞基站的资源管理
Pub Date : 2014-12-09 DOI: 10.1109/GLOCOM.2014.7037281
Haijun Zhang, Chunxiao Jiang, Xiaotao Mao, A. Nallanathan
Recently, cognitive radio enabled femtocell is regarded as a promising technique in wireless communications, where the issues of resource allocation and interference management have been investigated intensively. However, spectrum sensing errors are neglected in most of the existing works. In this paper, we propose a resource allocation scheme for orthogonal frequency division multiple access (OFDMA) based cognitive femtocells. The target is to maximize the sum rate of all femtocell users (FUs) under QoS constraints and co-tier/cross-tier interference constraints under imperfect channel sensing. The subchannel and power allocation problem is first modeled as a mixed integer programming problem, and then transformed into a convex optimization problem by relaxing subchannel sharing and imposing co-tier interference constraints, which is finally solved using the dual decomposition method. Based on the obtained solution, an iterative subchannel and power allocation algorithm is proposed. The effectiveness in terms of instantaneous maximum achievable rate of the proposed algorithm as compared with perfect spectrum sensing schemes is verified by simulations.
近年来,基于认知无线电的飞蜂窝技术被认为是一种很有前途的无线通信技术,其资源分配和干扰管理问题得到了广泛的研究。然而,现有的研究大多忽略了频谱感知误差。本文提出了一种基于正交频分多址(OFDMA)的认知飞基站资源分配方案。目标是在不完全信道感知的QoS约束和协层/跨层干扰约束下最大化所有飞蜂窝用户(FUs)的和速率。首先将子信道和功率分配问题建模为一个混合整数规划问题,然后通过放宽子信道共享和施加协层干扰约束,将子信道和功率分配问题转化为一个凸优化问题,最后利用对偶分解方法进行求解。在此基础上,提出了一种迭代子信道和功率分配算法。通过仿真验证了该算法在瞬时最大可达率方面的有效性。
{"title":"Resource management in cognitive opportunistic access femtocells with imperfect spectrum sensing","authors":"Haijun Zhang, Chunxiao Jiang, Xiaotao Mao, A. Nallanathan","doi":"10.1109/GLOCOM.2014.7037281","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037281","url":null,"abstract":"Recently, cognitive radio enabled femtocell is regarded as a promising technique in wireless communications, where the issues of resource allocation and interference management have been investigated intensively. However, spectrum sensing errors are neglected in most of the existing works. In this paper, we propose a resource allocation scheme for orthogonal frequency division multiple access (OFDMA) based cognitive femtocells. The target is to maximize the sum rate of all femtocell users (FUs) under QoS constraints and co-tier/cross-tier interference constraints under imperfect channel sensing. The subchannel and power allocation problem is first modeled as a mixed integer programming problem, and then transformed into a convex optimization problem by relaxing subchannel sharing and imposing co-tier interference constraints, which is finally solved using the dual decomposition method. Based on the obtained solution, an iterative subchannel and power allocation algorithm is proposed. The effectiveness in terms of instantaneous maximum achievable rate of the proposed algorithm as compared with perfect spectrum sensing schemes is verified by simulations.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"40 1","pages":"3098-3102"},"PeriodicalIF":0.0,"publicationDate":"2014-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88034584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance analysis of energy-efficient MAC protocols using bidirectional transmissions and sleep periods in IEEE 802.11 WLANs IEEE 802.11无线局域网中使用双向传输和睡眠周期的节能MAC协议的性能分析
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7036980
Raúl Palacios, El Moatez Billah Larbaa, J. Alonso-Zarate, F. Granelli
The Distributed Coordination Function (DCF) is the mandatory access method for any compliant device in Wireless Local Area Networks (WLANs) based on the IEEE 802.11 Standard. WLAN Access Points (APs) and stations (STAs) contend for the access to the wireless channel in order to transmit data by using a variation of Carrier Sense Multiple Access (CSMA). In doing so, they consume a significant amount of energy for continuously monitoring the channel state. In this paper we investigate backwards-compatible mechanisms to increase throughput and energy efficiency in WLANs during contention periods based on DCF. The first mechanism is called Bi-Directional DCF (BD-DCF) because it allows for bidirectional transmissions between APs and STAs with a single channel access invocation. The second mechanism is called Bi-Directional Sleep DCF (BDSL-DCF) as it allows overhearing STAs to enter the sleep state, i.e. switch off the radio transceiver, during bidirectional transmissions. We analyze the performance limits of the proposed protocols in terms of throughput and energy efficiency considering different values for the data packet length and data rate. The results of this work show that the BD-DCF and BDSL-DCF protocols can improve throughput up to 60% and energy efficiency up to 360% when compared to legacy DCF.
分布式协调功能(DCF)是基于IEEE 802.11标准的无线局域网(wlan)中任何兼容设备的强制接入方法。无线局域网接入点(ap)和站点(sta)争夺无线信道的访问权,以便通过使用载波感知多址(CSMA)的一种变体来传输数据。在这样做的过程中,它们消耗了大量的能量来连续监视通道状态。在本文中,我们研究了向后兼容机制,以提高wlan在DCF竞争期间的吞吐量和能源效率。第一种机制称为双向DCF (BD-DCF),因为它允许通过单个通道访问调用在ap和sta之间进行双向传输。第二种机制被称为双向休眠DCF (BDSL-DCF),因为它允许侦听sta在双向传输期间进入休眠状态,即关闭无线电收发器。考虑到数据包长度和数据速率的不同值,我们从吞吐量和能量效率方面分析了所提出协议的性能限制。这项工作的结果表明,与传统的DCF相比,BD-DCF和BDSL-DCF协议可以提高高达60%的吞吐量和高达360%的能源效率。
{"title":"Performance analysis of energy-efficient MAC protocols using bidirectional transmissions and sleep periods in IEEE 802.11 WLANs","authors":"Raúl Palacios, El Moatez Billah Larbaa, J. Alonso-Zarate, F. Granelli","doi":"10.1109/GLOCOM.2014.7036980","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036980","url":null,"abstract":"The Distributed Coordination Function (DCF) is the mandatory access method for any compliant device in Wireless Local Area Networks (WLANs) based on the IEEE 802.11 Standard. WLAN Access Points (APs) and stations (STAs) contend for the access to the wireless channel in order to transmit data by using a variation of Carrier Sense Multiple Access (CSMA). In doing so, they consume a significant amount of energy for continuously monitoring the channel state. In this paper we investigate backwards-compatible mechanisms to increase throughput and energy efficiency in WLANs during contention periods based on DCF. The first mechanism is called Bi-Directional DCF (BD-DCF) because it allows for bidirectional transmissions between APs and STAs with a single channel access invocation. The second mechanism is called Bi-Directional Sleep DCF (BDSL-DCF) as it allows overhearing STAs to enter the sleep state, i.e. switch off the radio transceiver, during bidirectional transmissions. We analyze the performance limits of the proposed protocols in terms of throughput and energy efficiency considering different values for the data packet length and data rate. The results of this work show that the BD-DCF and BDSL-DCF protocols can improve throughput up to 60% and energy efficiency up to 360% when compared to legacy DCF.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"6 1","pages":"1252-1258"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82275247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Self organising network techniques to maximise traffic offload onto a 3G/WCDMA small cell network using MDT UE measurement reports 自组织网络技术,利用MDT终端测量报告,最大限度地将流量卸载到3G/WCDMA小型蜂窝网络上
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7037136
R. Joyce, Li X. Zhang
This paper presents a number of Self-Organising Network (SON) based methods using a 3GPP Minimisation of Drive Testing (MDT) approach or similar and the analysis of these geo-located UE measurements to maximise traffic offload onto lamppost mounted 3G/WCDMA microcells. Simulations have been performed for a real 3G/WCDMA microcell deployment in a busy area of central London and the results suggest that for the network studied a traffic increase on the microcell layer of up to 175% is achievable through the novel SON methods presented.
本文介绍了一些基于自组织网络(SON)的方法,使用3GPP最小化驾驶测试(MDT)方法或类似方法,并分析这些地理定位UE测量,以最大限度地将流量卸载到安装在灯柱上的3G/WCDMA微蜂窝。对在伦敦市中心繁忙地区部署的真实3G/WCDMA微蜂窝进行了仿真,结果表明,通过提出的新型SON方法,所研究的网络在微蜂窝层上的流量增加可达175%。
{"title":"Self organising network techniques to maximise traffic offload onto a 3G/WCDMA small cell network using MDT UE measurement reports","authors":"R. Joyce, Li X. Zhang","doi":"10.1109/GLOCOM.2014.7037136","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037136","url":null,"abstract":"This paper presents a number of Self-Organising Network (SON) based methods using a 3GPP Minimisation of Drive Testing (MDT) approach or similar and the analysis of these geo-located UE measurements to maximise traffic offload onto lamppost mounted 3G/WCDMA microcells. Simulations have been performed for a real 3G/WCDMA microcell deployment in a busy area of central London and the results suggest that for the network studied a traffic increase on the microcell layer of up to 175% is achievable through the novel SON methods presented.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"23 1","pages":"2212-2217"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90282839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An extended Hop-by-hop interest shaping mechanism for content-centric networking 一种扩展的逐跳兴趣塑造机制,用于以内容为中心的网络
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7389766
Natalya Rozhnova, S. Fdida
The evolution of the Internet has triggered a significant activity exploring new architectures among which the concept of Information-Centric-Networks (ICN) has emerged. Considering the various ICN solutions, Content-Centric Networking (CCN) is the one that received most attention. The design of CCN is progressing albeit many important issues still deserve a careful analysis and design. In this paper, we cover the important problem of congestion control in CCN and develop our hop-by-hop Interest Shaping mechanism (HoBHIS) framework. We present the foundation and general properties of our solution. We then study the behaviour of HoBHIS and demonstrate the fairness of resource sharing in presence of multiple active conversations. Further, we introduce a mechanism to control the user behavior in order to limit its ability to submit requests in excess creating a potential risk for buffer overflow. We demonstrate the effectiveness of the proposed solutions and provide a performance analysis using the implementation of our schemes in ndnSIM. We show that HoBHIS provides an adequate and efficient solution to the general problem of congestion control in CCN.
互联网的发展引发了一场探索新架构的重要活动,其中出现了信息中心网络(ICN)的概念。在各种ICN解决方案中,以内容为中心的网络(CCN)是最受关注的一种。CCN的设计正在取得进展,但仍有许多重要问题值得仔细分析和设计。在本文中,我们讨论了CCN中拥塞控制的重要问题,并开发了我们的逐跳兴趣塑造机制(HoBHIS)框架。我们给出了解的基础和一般性质。然后,我们研究了HoBHIS的行为,并证明了在多个活跃对话存在下资源共享的公平性。此外,我们引入了一种机制来控制用户行为,以限制其提交过多请求的能力,从而产生缓冲区溢出的潜在风险。我们展示了所提出的解决方案的有效性,并通过在nnsim中实施我们的方案提供了性能分析。结果表明,HoBHIS为CCN中一般的拥塞控制问题提供了充分有效的解决方案。
{"title":"An extended Hop-by-hop interest shaping mechanism for content-centric networking","authors":"Natalya Rozhnova, S. Fdida","doi":"10.1109/GLOCOM.2014.7389766","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7389766","url":null,"abstract":"The evolution of the Internet has triggered a significant activity exploring new architectures among which the concept of Information-Centric-Networks (ICN) has emerged. Considering the various ICN solutions, Content-Centric Networking (CCN) is the one that received most attention. The design of CCN is progressing albeit many important issues still deserve a careful analysis and design. In this paper, we cover the important problem of congestion control in CCN and develop our hop-by-hop Interest Shaping mechanism (HoBHIS) framework. We present the foundation and general properties of our solution. We then study the behaviour of HoBHIS and demonstrate the fairness of resource sharing in presence of multiple active conversations. Further, we introduce a mechanism to control the user behavior in order to limit its ability to submit requests in excess creating a potential risk for buffer overflow. We demonstrate the effectiveness of the proposed solutions and provide a performance analysis using the implementation of our schemes in ndnSIM. We show that HoBHIS provides an adequate and efficient solution to the general problem of congestion control in CCN.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"19 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89292461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Analysis of dependency evaluation models for eHealth services 电子医疗服务依赖评估模型分析
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7037172
H. Mshali, Tayeb Lemlouma, D. Magoni
This work focuses on the evaluation of the need and help required by elderly and dependent persons. We study the most widely used evaluation models in the health domain. We propose a new algorithm to assess and compare the performance of these models and the possibility to use them in future eHealth systems and platforms. The objective is to shed some light on the weakness of existing models and to gain a better knowledge about the context of persons in order to provide them with eHealth services that match their context and meet their needs.
这项工作的重点是评估老年人和受抚养人的需要和需要的帮助。我们研究了健康领域中最广泛使用的评估模型。我们提出了一种新的算法来评估和比较这些模型的性能,以及在未来的电子卫生系统和平台中使用它们的可能性。其目标是阐明现有模式的弱点,更好地了解人们的情况,以便向他们提供符合其情况和满足其需求的电子保健服务。
{"title":"Analysis of dependency evaluation models for eHealth services","authors":"H. Mshali, Tayeb Lemlouma, D. Magoni","doi":"10.1109/GLOCOM.2014.7037172","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037172","url":null,"abstract":"This work focuses on the evaluation of the need and help required by elderly and dependent persons. We study the most widely used evaluation models in the health domain. We propose a new algorithm to assess and compare the performance of these models and the possibility to use them in future eHealth systems and platforms. The objective is to shed some light on the weakness of existing models and to gain a better knowledge about the context of persons in order to provide them with eHealth services that match their context and meet their needs.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"27 1","pages":"2429-2435"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77253451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SOCRATIC: A social approach to network coding rate control 网络编码速率控制的社会方法
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7036833
Samuel B. Wood, H. Sadjadpour, J. Garcia-Luna-Aceves
Tactical and emergency-response networks require efficient communication without a managed infrastructure. Recent work demonstrates that applying information-centric paradigms to the tactical edge can provide performance benefits over traditional address centric approaches. We propose SOCRATIC (SOCial RATe control for Information Centric networks), an approach that unifies replication and network coding to disseminate content by taking advantage of social content and context heuristics. SOCRATIC replicates network encoded blocks according to a popularity index metric that is shared during neighbor discovery. The number of encoded blocks that is relayed to a node depends on its own interest in a data object and its social popularity, i.e., how often and for how long the node meets other nodes. These blocks are subsequently replicated towards the subscriber if a stable path exists. We evaluate an implementation of SOCRATIC through network emulation of a tactical scenario and demonstrate that it can achieve better performance than traditional socially agnostic approaches.
战术和应急网络需要在没有托管基础设施的情况下进行有效的通信。最近的研究表明,将以信息为中心的范式应用于战术优势可以提供优于传统以地址为中心方法的性能优势。我们提出了SOCRATIC(信息中心网络的社会速率控制),这是一种利用社会内容和上下文启发式来统一复制和网络编码以传播内容的方法。SOCRATIC根据邻居发现过程中共享的流行指数度量来复制网络编码块。传递给节点的编码块的数量取决于节点自己对数据对象的兴趣及其社会流行程度,即节点与其他节点相遇的频率和时间。如果存在稳定的路径,则随后将这些块复制到订阅者。我们通过战术场景的网络仿真来评估SOCRATIC的实现,并证明它可以比传统的社会不可知方法获得更好的性能。
{"title":"SOCRATIC: A social approach to network coding rate control","authors":"Samuel B. Wood, H. Sadjadpour, J. Garcia-Luna-Aceves","doi":"10.1109/GLOCOM.2014.7036833","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036833","url":null,"abstract":"Tactical and emergency-response networks require efficient communication without a managed infrastructure. Recent work demonstrates that applying information-centric paradigms to the tactical edge can provide performance benefits over traditional address centric approaches. We propose SOCRATIC (SOCial RATe control for Information Centric networks), an approach that unifies replication and network coding to disseminate content by taking advantage of social content and context heuristics. SOCRATIC replicates network encoded blocks according to a popularity index metric that is shared during neighbor discovery. The number of encoded blocks that is relayed to a node depends on its own interest in a data object and its social popularity, i.e., how often and for how long the node meets other nodes. These blocks are subsequently replicated towards the subscriber if a stable path exists. We evaluate an implementation of SOCRATIC through network emulation of a tactical scenario and demonstrate that it can achieve better performance than traditional socially agnostic approaches.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"41 1","pages":"352-356"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87280302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outage analysis of integrated mesh LTE femtocell networks 综合网状LTE飞蜂窝网络的中断分析
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7036805
A. Busson, Lynda Zitoune, V. Vèque, B. Jabbari
The femtocell - Wi-Fi integration is a promising approach to solve the problem of inter-tier or intra-tier interference in heterogeneous networks. In this paper, multimode femtocell base stations are deployed which form a Wi-Fi mesh network to communicate between themselves while deploying cellular technology (e.g., LTE) for communications with mobile users, thus ensuring ultimately connectivity between mobile users and their macro base stations to improve the network coverage. We propose a tractable model for coverage/outage to evaluate the benefits of such integration in terms of SINR and received signal strength. Our work is based on point processes in two-dimensional plane that models locations of femtocell - Wi-Fi (also referred to as multimode) nodes. The proposed model is more realistic than the classical Poisson point process, as the distribution of points is more homogeneous and it ensures that the nodes are not too close to each other. The derivation of coverage/outage formula allows us to determine operational parameter ranges for the Wi-Fi network to form a mesh network. In addition, it helps in the design of the femtocell network to ensure a suitable coverage for users in terms of SINR and received signal strength.
femtocell - Wi-Fi集成是解决异构网络层间或层内干扰问题的一种很有前途的方法。本文通过部署多模femtocell基站,形成Wi-Fi网状网络相互通信,同时部署蜂窝技术(如LTE)与移动用户通信,最终保证移动用户与其宏基站之间的连通性,提高网络覆盖。我们提出了一个可处理的覆盖/中断模型,以评估这种集成在信噪比和接收信号强度方面的好处。我们的工作是基于二维平面上的点过程,它模拟了femtocell - Wi-Fi(也称为多模)节点的位置。该模型比经典泊松点过程更符合实际,因为点的分布更均匀,并且保证了节点之间不会太靠近。通过推导覆盖/中断公式,我们可以确定Wi-Fi网络形成网状网络的运行参数范围。此外,它有助于femtocell网络的设计,以确保在信噪比和接收信号强度方面为用户提供合适的覆盖。
{"title":"Outage analysis of integrated mesh LTE femtocell networks","authors":"A. Busson, Lynda Zitoune, V. Vèque, B. Jabbari","doi":"10.1109/GLOCOM.2014.7036805","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036805","url":null,"abstract":"The femtocell - Wi-Fi integration is a promising approach to solve the problem of inter-tier or intra-tier interference in heterogeneous networks. In this paper, multimode femtocell base stations are deployed which form a Wi-Fi mesh network to communicate between themselves while deploying cellular technology (e.g., LTE) for communications with mobile users, thus ensuring ultimately connectivity between mobile users and their macro base stations to improve the network coverage. We propose a tractable model for coverage/outage to evaluate the benefits of such integration in terms of SINR and received signal strength. Our work is based on point processes in two-dimensional plane that models locations of femtocell - Wi-Fi (also referred to as multimode) nodes. The proposed model is more realistic than the classical Poisson point process, as the distribution of points is more homogeneous and it ensures that the nodes are not too close to each other. The derivation of coverage/outage formula allows us to determine operational parameter ranges for the Wi-Fi network to form a mesh network. In addition, it helps in the design of the femtocell network to ensure a suitable coverage for users in terms of SINR and received signal strength.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"30 1","pages":"187-192"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83402354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2014 IEEE Global Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1