Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005.

23-26 Sept. 2005

Go

Filter Results

Displaying Results 1 - 25 of 187
  • The research of the implement of UMTS QoS DiffServ on IXP2400

    Publication Year: 2005, Page(s):840 - 843
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    A demand feature of the Universal Mobile Telecommunications System (UMTS) is to support different levels of quality of service (QoS) as required by subscribers and their applications. To provide QoS, the UMTS backbone network needs an efficient QoS mechanism and a hardware platform to provide the demanded level of services on the UMTS core network. Network processors are emerging as programmable a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A solution for supporting QoS in Web server cluster

    Publication Year: 2005, Page(s):834 - 839
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Web server cluster has been widely used to increase the performance of Web server. Moreover, as the Web has become an important business service delivery infrastructure, the need for supporting quality of service (QoS) in Web service has become more strident recently. In this paper, we propose a solution for supporting QoS in Web server cluster called QWSC, and implement a prototype of QWSC. Our o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature analysis of the transmission of voice/data in a frame

    Publication Year: 2005, Page(s):1122 - 1124
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB)

    In order to improve the utilization ratio of network resources, in this paper, we propose a method to transmit voice and data in a frame using the silence times in voice. We followed it analyzing the major elements that affect voice transmission, get proper voice packet size, and reduce the voice transmission delay. And we get the best record point from the relational curve between voice delay and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on the pieces on seed for mobile peer-to-peer file sharing applications

    Publication Year: 2005, Page(s):829 - 833
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Piece selection is one of fundamental operations for mobile P2P file sharing applications, to some extent, it would affect the integrity of file what users obtain. Having investigated the feature of piece selection algorithm of BitTorrent carefully, a new piece selection algorithm based on seed control is presented in this paper. Comparing with the piece selection algorithm of BitTorrent, the prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput-based and power-based load control in HSUPA

    Publication Year: 2005, Page(s):969 - 973
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1456 KB) | HTML iconHTML

    This paper studies the load control strategies in high speed uplink packet access (HSUPA), which will be included in Release 6 of 3GPP WCDMA. We compare the performance of throughput-based and power-based load control approaches in HSUPA with different soft handover window sizes and scheduling schemes. It is concluded that power-based load control outperforms throughput-based power control for the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cluster based routing in Bluetooth ad-hoc network

    Publication Year: 2005, Page(s):747 - 752
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    In this paper, we propose a new cluster based routing algorithm for Bluetooth ad-hoc network. SCRP is the proposed algorithm that consists of scatternet initialization, routing account and route repair. Bluetooth units can utilize SCRP to construct ad-hoc network and communicate with each other. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inter-satellite link design for the LEO/MEO two-layered satellite network

    Publication Year: 2005, Page(s):1072 - 1075
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Inter-satellite link (ISL) design is an important part of the design for satellite networks. Dynamic characteristic of ISLs affects the network performance. We propose an ISL link stability model in this paper. Based on the stability model, a link design scheme for satellite networks is presented. The scheme includes static and dynamic link design phases where static and dynamic types of ISLs are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The comparison of performances when WCDMA and HSDPA coexist in two different environments

    Publication Year: 2005, Page(s):824 - 828
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    This paper evaluates the performances of WCDMA (wideband code division multiple access) and HSDPA (high speed downlink packet access) when they coexist in different environments: HSDPA layout is adopted in macro cell and micro cell (Manhattan model) respectively, while WCDMA layout is always adopted in macro cell. We adopt a static system level simulation to analyze the changing of performances be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accurate geometrical analysis of sector dwell time distribution

    Publication Year: 2005, Page(s):994 - 998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    In this paper, we present accurate evaluation of sector dwell time distribution based on geometric analysis methods. Considering the nature geometric characteristic of the deployed sector pattern, and the distribution of the mobiles' position and moving direction in the given sector, we derive the accurate formulas of the probability density function of sector cell dwell time. Some numerical resul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive load-balancing approach for ad hoc networks

    Publication Year: 2005, Page(s):743 - 746
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    Routing protocol is a challenging issue in ad hoc networks. It has been studied thoroughly these years. However, most routing protocols in ad hoc network do not consider the problem of load balance. In this paper, we present an effective scheme to balance the load in ad hoc network. The new scheme can be applied in most on-demand routing protocols. It is implemented in the process of route request... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networking and routing for mesh wireless network

    Publication Year: 2005, Page(s):1068 - 1071
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Mesh topology is optionally supported in the broadband wireless access (BWA) networks standardized by IEEE 802.16 and is now studied by IEEE 802.15 wireless personal network (WPAN) and IEEE 802.16e mobile BWA (MBWA). This paper presents our research results about how to networking in the IEEE mesh wireless network and make decisions of route which take advantages of information supplied by the net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of TCP segment size and routing change on congestion control protocol performance in mobile ad hoc networks

    Publication Year: 2005, Page(s):820 - 823
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    TCP (transmission control protocol) congestion control algorithms are simulated and analyzed in mobile ad hoc networks. The main research concentrates on the impact of TCP segment size on congestion control protocol performance. The protocols analyzed here include the Reno, SACK and Vegas protocol. The simulation and comprehensive analysis show that the impact of TCP segment size on congestion con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The improved RCT approach for multi-cell coverage prediction and early results

    Publication Year: 2005, Page(s):960 - 963
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Different from conventional coverage prediction methods based on the empirical models or the physical models, a novel method based on radio computerized tomography (RCT) technique and corresponding algorithm for coverage prediction of cellular mobile radio (CMR) system are presented in this paper. This method can provide coverage predictions for several cells at one time. As shown by experiments f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on network traffic prediction techniques

    Publication Year: 2005, Page(s):1041 - 1044
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    We briefly describe a number of traffic predictors (such as ARIMA, FARIMA, ANN and wavelet-based predictors) and analyze their computational complexity. We compare their performance with MSE, NMSE and computational complexity by simulating the predictors on four wireless network traffic traces and decide the most suitable network traffic predictor based on acceptable performance and accuracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Disjoint multi-path QoS routing in ad hoc networks

    Publication Year: 2005, Page(s):739 - 742
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    In this paper, we investigate a disjoint multi-path QoS routing in ad hoc networks, which reactively collects link-state information from source to destination. We propose a route discovery algorithm to find multiple disjoint paths, which can offer most aggregate resources to meet the QoS requirement of a call. We also propose a method for choosing proper paths, namely LBHBF. The simulation result... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mean field network based QoS routing scheme in wireless mesh networks

    Publication Year: 2005, Page(s):1110 - 1113
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    Multi-constrained quality-of-service routing (QoSR) is to find a feasible path that satisfies multiple constraints simultaneously, as an NPC problem, which is also a big challenge for wireless mesh networks. There are few methods, which can solve this problem effectively so far. In this paper, we propose a novel routing scheme based on mean field network (MFN_RS) to solve this problem. This a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of ad hoc networks based on SPN

    Publication Year: 2005, Page(s):816 - 819
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    This paper presents a stochastic Petri net-based approach for performance evaluation of ad hoc networks. The approach exploits the symmetry in ad hoc networks, and accurately models the semantics of activities of a node. The numerical results of the SPN model show a good match to simulation results of NS2, especially under heavy traffic. Because of its easiness and accuracy, the proposed approach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On connectivity for wireless sensor networks localization

    Publication Year: 2005, Page(s):879 - 882
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    Node localization in wireless sensor networks has been a topic of active research in recent years. Network connectivity has been shown to be effective with respect to increasing localization performance via redundant nodes. In this paper, we study the connectivity of wireless sensor networks from a network self-localization prospective. To the best of our knowledge, theoretic analyses of the netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of call admission control scheme for voice/data integration on mobile communication system

    Publication Year: 2005, Page(s):956 - 959
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    The analytical results for call admission control algorithms performances are obtained under some specific assumption such as the average channel holding times for new calls and handoff calls are equal in a cell. It is observed, however, the assumptions of above may not be valid in some real systems due to users' mobility and irregular cell shape. In this paper, we propose a call admission control... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A stable clustering formation in mobile ad hoc network

    Publication Year: 2005, Page(s):714 - 718
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    We propose a novel clustering algorithm in mobile ad hoc network in this paper. By selecting the node optimally in both time connectivity and space connectivity as the cluster head, the resulting clustering algorithm can provide a generic and stable cluster structure for the upper-layer protocols. For this clustering scheme, we give analytical model and evaluate the performance by simulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel active queue management scheme based on self-similar traffic rate estimation

    Publication Year: 2005, Page(s):991 - 994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    In this paper, we firstly propose self-similar traffic rate estimating algorithm PLMA for active queue management scheme to regulate packet marking probability. This algorithm improves the availability of the rate estimation algorithm under the self-similar traffic condition. Then, we design a robust AQM mechanism based on rate estimated by the PLMA, which enable router to be more responsive to va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile IP network based on hierarchical MPLS

    Publication Year: 2005, Page(s):1014 - 1017
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    In this paper, we proposed a new scheme that supports micro mobility and macro mobility. By using this scheme, we do not have to communicate with the home agent of the mobile host when the mobile host moves from one MPLS subnet to another. Through simulations, we demonstrated that by using MINHM, we could provide lower end-to-end delay and delay jitter to the traffic during handoff periods. Thus, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An entropy-based model to support QoS multicast optimization algorithm for mobile ad hoc networks

    Publication Year: 2005, Page(s):735 - 738
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    A mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. There is no static infrastructure such as base station as that was in cell mobile communication. Due to the dynamic nature of the network topology and restricted resources, quality of service (QoS) and multicast routing in MANET is a challenging task. In this paper, we present an entropy-based mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile agent-based policy management for wireless sensor networks

    Publication Year: 2005, Page(s):1207 - 1210
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Wireless sensor network is a revolution of information sensing and collecting. This kind of networks is composed of hundreds and thousands of sensor nodes in small size with ubiquitous sensing and computing capabilities. The task of management of wireless sensor networks in environments with hundreds and thousands of sensor nodes is very complex. Until now, wireless sensor networks and their appli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy model and control of nonlinear networked control systems

    Publication Year: 2005, Page(s):1106 - 1109
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Tins paper is concerned with a class of nonlinear networked control systems with network-induced delay shorter than one sample period. Based on the assumptions that the actuator node is time-driven and the controller node is event-driven, a Takagi-Sugeno (T-S) fuzzy model is used to approximate the nonlinear networked systems with delay. By means of Lyapunov functions, a method for designing a fuz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.