Catálogo de publicaciones - libros

Compartir en
redes sociales


Wired: Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005, Proceedings

Torsten Braun ; Georg Carle ; Yevgeni Koucheryavy ; Vassilis Tsaoussidis (eds.)

En conferencia: 3º International Conference on Wired/Wireless Internet Communications (WWIC) . Xanthi, Greece . May 11, 2005 - May 13, 2005

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-25899-5

ISBN electrónico

978-3-540-32104-0

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2005

Tabla de contenidos

Traffic Characteristics Based Performance Analysis Model for Efficient Random Access in OFDMA-PHY System

Hyun-Hwa Seo; Byung-Han Ryu; Choong-Ho Cho; Hyong-Woo Lee

Currently, IEEE 802.16a wireless MAN supports the contention based OFDMA-CDMA ranging subsystem for ranging operation (Initial Ranging, Periodic Ranging, Bandwidth Request)[1]. This system uses essentially the slotted ALOHA protocol. However, the number of code-slots/frame for random access transmission tends to be much greater than one and a simple Markov chain analysis may not be numerically feasible. At the same time, the frame size in number of code-slots may be dynamically adjusted based on the traffic load. In order to evaluate delay-throughput performance and stability measure of the random access protocol, we first examine the possible traffic load to be carried throughput the ranging subchannel. We the present performance analysis and numerical examples.

- Session 6: Traffic Characterization and Modeling | Pp. 213-222

Collision Reduction Random Access Using m-Ary Split Algorithm in Wireless Access Network

You-Chang Ko; Eui-Seok Hwang; Jeong-Jae Won; Hyong-Woo Lee; Choong-Ho Cho

In the high performance radio access networks, the number of random access channels can be used for mobile stations to transmit their bandwidth requests in contention mode via multiple random access. In this paper a collision reduced random access scheme based on -art split algorithm in the centralized medium access control protocol is presented. In this method the splitting algorithm is used in two fold. On one hand the whole random access channels are exclusively separated into two parts; one is for initial contention where only initial access mobile stations can be served and the other is for retransmit contention where the mobile stations whose initial random access was not successful can join for their retransmission. On the other hand the -ary split algorithm applied in the retransmit contention area to resolve the collisions. By doing so the proposed scheme achieves considerably greater performance in terms of maximum throughput, mean access delay, and delay jitter, which is one of the important criteria for real-time traffic. Through numerical examples and computer simulations the effect of the various parameters of the algorithm, initial number of random access report(s) and the split size , on the system performance is examined.

- Session 6: Traffic Characterization and Modeling | Pp. 223-233

Simple, Accurate and Computationally Efficient Wireless Channel Modeling Algorithm

Dmitri Moltchanov; Yevgeni Koucheryavy; Jarmo Harju

We propose simple and computationally efficient wireless channel modeling algorithm. For this purpose we adopt the special case of the algorithm initially proposed in [1] and show that its complexity significantly decreases when the time-series is covariance stationary binary in nature. We show that for such time-series the solution of the inverse eigenvalue problem returns unique transition probability matrix of the modulating Markov chain that is capable to match statistical properties of empirical frame error processes. Our model explicitly takes into account autocorrelational and distributional properties of empirical data. We validate our model against empirical frame error traces of IEEE 802.11b wireless access technology operating in DCF mode over spread spectrum at 2Mbps and 5.5 Mbps bit rates. We also made available the C code of the model as well as pre-compiled binaries for Linux and Windows operating systems at http://www.cs.tut.fi/~moltchan.

- Session 6: Traffic Characterization and Modeling | Pp. 234-245

Efficient Multicast Trees with Local Knowledge on Wireless Ad Hoc Networks

Tansel Kaya; Philip J. Lin; Guevara Noubir; Wei Qian

In this paper we address the problem of establishing a cost efficient multicast tree among a group of stationary nodes in a multi-hop wireless network. The flooding of broadcast discovery messages is a major limitation to the scalability of most ad hoc protocols. To avoid massive flooding, we limit the reach of broadcast discovery messages, and consider the case were joining nodes can only learn limited information about the multicast group topology from neighbors within a fixed number of hops. We propose two algorithms that satisfy this constraint. We analyze the worst case cost of the established trees and prove that the first algorithm builds a minimal cost spanning tree, while the second builds a sub-optimal tree with a worst-case approximation ratio of O(log n/loglog n). The advantage of the second algorithm is that the communication requirement for a node to join the multicast tree is smaller. We simulate and compare the proposed algorithms. Finally, we discuss the implementation issues and scenarios for using each one of them. We also describe our secure multicast application that builds on top of the proposed protocols.

- Session 7: Ad hoc Networks | Pp. 246-257

Limiting Control Overheads Based on Link Stability for Improved Performance in Mobile Ad Hoc Networks

Hwee Xian Tan; Winston K. G. Seah

The widespread use of Mobile Ad Hoc Networks (MANETs) in many fields of applications has led to the continuous development of routing protocols which can perform well when deployed under different scenarios, as well as offer better Quality of Service (QoS) support. In this paper, we focus on how link stability is utilized as a metric to provide accurate feedback on the network. We then introduce two mechanisms – L-REQ (Limited forwarding of Route Requests) and L-REP (Limited initiation of Route Replies by intermediate nodes) – which make use of link stability to dynamically adapt the characteristic behaviour of existing protocols to achieve better network performance. The two adaptive schemes are then applied to the Ad Hoc On Demand Distance Vector (AODV) routing protocol as proof of concept.

- Session 7: Ad hoc Networks | Pp. 258-268

Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks

Rosa Mavropodi; Panayiotis Kotzanikolaou; Christos Douligeris

In the Mobile Ad Hoc Network (MANET) paradigm, multipath routing protocols were initially proposed due to QoS needs, since they do not require initiation of the route discovery process after each link disconnection. Moreover, research on MANET routing security has shown that multipath routing provides increased resilience against security attacks of collaborating malicious nodes. Towards this direction, several secure multipath routing protocols have been recently proposed in the literature, which indeed provide such increased security protection for critical applications. However, embedding security mechanisms always imposes extra burden to the route discovery process. In this paper, we evaluate the performance of the existing secure multipath routing protocols for MANET through extensive simulations in various traffic scenarios.

- Session 7: Ad hoc Networks | Pp. 269-278

Lecture Notes in Computer Science:Packet Error Rate Analysis of IEEE 802.15.4 Under IEEE 802.11b Interference

Soo Young Shin; Sunghyun Choi; Hong Seong Park; Wook Hyun Kwon

In this paper, the packet error rate (PER) of IEEE 802.15.4 low rate wireless personal area network (WPAN) under the interference of IEEE 802.11b wireless local area network (WLAN) is analyzed. The PER is obtained from the bit error rate (BER) and the collision time. The BER is obtained from signal to noise and interference ratio. The power spectral density of the IEEE 802.11b is considered in order to determine in-band interference power of the IEEE 802.11b to the IEEE 802.15.4. The simulation results are shown to validate the numerical analysis.

- Session 8: IEEE 802.11 and Other Wireless MAC Protocols | Pp. 279-288

On the Service Differentiation Capabilities of EY-NPMA and 802.11 DCF

Orestis Tsigkas; Fotini-Niovi Pavlidou; Gerasimos Dimitriadis

Most existing WLAN access mechanisms cannot provide QoS assurances. Even those that are QoS aware can only provide relative service differentiation. Based on EY-NPMA, the HIPERLAN Medium Access Control algorithm, we propose a dynamic priority medium access scheme to provide time-bounded services. By approximating an ideal Earliest Deadline First (EDF) scheduler, the proposed scheme can offer delay and delay jitter assurances while achieving high medium utilization. Furthermore, we compare our scheme with a mechanism that enhances the IEEE 802.11 MAC protocol with QoS support. Simulation studies document and confirm the positive characteristics of the proposed mechanism.

- Session 8: IEEE 802.11 and Other Wireless MAC Protocols | Pp. 289-299

Mitigating Interference Between IEEE 802.16 Systems Operating in License-Exempt Mode

Omar Ashagi; Seán Murphy; Liam Murphy

A rudimentary approach to mitigate interference issues in license-exempt 802.16 systems is presented. This approach operates by permitting each (BS), and associated (SSs) to remain inactive for a specified fraction of the time. Other systems can then transmit with a reduced likelihood of interference. A simulator was developed to determine how this system performs. The results show that the throughput of the system is very sensitive to the fraction of time each BS is active; the system throughput is maximised when each BS is active less than 40% of the time for the scenarios studied. The results demonstrate a discrepancy between uplink and downlink throughput which can be attributed to the greater amount of overheads in the uplink. Finally, the results show that broadcast information being transmitted periodically at full power has a significant detrimental impact on the system.

- Session 8: IEEE 802.11 and Other Wireless MAC Protocols | Pp. 300-311

ECN Marking for Congestion Control in Multihop Wireless Networks

Vasilios A. Siris; Despina Triantafyllidou

In this paper we propose an approach to increase TCP’s fairness in multihop wireless networks, using ECN as a congestion signalling mechanism. The novel idea we introduce is that the marking probability at a wireless node is a function of the aggregate utilization in the node’s neighborhood, which is determined by the sum of the receiving rates of all nodes within its collision domain. A node’s received rate can be communicated to neighboring nodes by piggy-backing it on control packets, such as CTS and RTS messages, or data packets. Simulation results demonstrate that our approach can improve TCP’s fairness in a multihop wireless network compared to drop tail queueing, while achieving the same aggregate throughput. Moreover, the proposed approach yields smaller average packet delay and delay jitter compared to drop tail queueing.

- Session 8: IEEE 802.11 and Other Wireless MAC Protocols | Pp. 312-322