By Topic

2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems

Date 24-26 Oct. 2007

Filter Results

Displaying Results 1 - 25 of 69
  • [Title page]

    Publication Year: 2007, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2007, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (120 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (223 KB)
    Freely Available from IEEE
  • Message from the Program Committee Chairs

    Publication Year: 2007, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (133 KB) | HTML iconHTML
    Freely Available from IEEE
  • Steering Committee and Scientific Reviewers

    Publication Year: 2007, Page(s):vi - vii
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):viii - xiii
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • Dynamic Power Management with Scheduled Switching Modes in Wireless Sensor Networks

    Publication Year: 2007, Page(s):1 - 8
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    A wireless sensor network (WSN) comprises many sensor nodes each one containing a processing unit, one or more sensors, a power unit, and a radio for data communication. Nodes are power constrained, because they run on batteries, that in many cases cannot be easily replaced. This paper presents a novel dynamic power management technique, named Dynamic Power Management with Scheduled Switching Mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks

    Publication Year: 2007, Page(s):9 - 14
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our knowledge, all existing solutions are based on specific assumptions (e.g., slotted networks) and/or require specific hardware (e.g., GPS) for speed evaluation. One of the key aspects of our... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timestepped Stochastic Simulation of 802.11 WLANs

    Publication Year: 2007, Page(s):15 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    We present Timestepped stochastic simulation (TSS) for 802.11 WLANs. TSS overcomes scalability problems of packet-level simulation by generating a sample path of the system state S(t) at time t = delta, 2delta, . . . , rather than at each packet transmission. In each timestep [t, t + delta], the distribution Pr( S(t + delta) | S(t) ) is obtained analytically, and S(t + delta) is sampled from it. O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distance Reduction in Mobile Wireless Communication: Lower Bound Analysis and Practical Attainment

    Publication Year: 2007, Page(s):23 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    The transmission energy required for a wireless communication increases superlinearly with the communication distance. In a mobile wireless network, nodal movement can be exploited to greatly reduce the energy required by postponing communication until the sender moves close to a target receiver, subject to application deadline constraints. In this paper, we characterize the fundamental performanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of TCP Performance in MANETs using an Optimized Scalable Simulation Model

    Publication Year: 2007, Page(s):31 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    We present an optimized scalable simulation model for TCP, developed in OPNET, and investigate its performance in the case of OLSR mobile ad-hoc networks (MANETs). The key idea for the model's construction is to represent each node by a subqueue, in the simulation model. Thus, the exchange of packets in the network is literally a set of enqueue/dequeue operations among the subqueues. The physical,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Quality of Service in MAC 802.11 Layer

    Publication Year: 2007, Page(s):38 - 45
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Quality of service (QoS) in wireless 802.11 networks cannot be achieved without the support for service differentiation at the medium access layer. IEEE802.11 suffers from QoS limitations that have often been summarized in the literature. We present simulation results to show the effectiveness of several proposed techniques of improving the QoS in the IEEE802.11 protocol. Specifically, we closely ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement Based Physical Layer Modeling for Wireless Network Simulations

    Publication Year: 2007, Page(s):46 - 53
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Simulation methods have become an integral part of almost all aspects of networking research and particularly in the area of wireless networks. Any new protocol or methodology that is proposed for wireless networks almost always will be demonstrated using simulations. However, there is little evidence that existing models of physical layer signal propagation and signal strength calculations produc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Interference in Wireless Ad Hoc Networks

    Publication Year: 2007, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    We present interference analysis for wireless ad hoc networks and show that, depending on the path loss parameter (alpha), the average signal to noise and interference ratio (SNIR) either remains constant, or decays, when the number of interferers scales to infinity in the network, for nodes communicating with their close neighbors. Thus, communication is feasible in dense networks as long as alph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hierarchical Connected Dominating Set Based Clustering Algorithm for Mobile Ad Hoc Networks

    Publication Year: 2007, Page(s):60 - 66
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    We propose a hierarchical connected dominating set (CDS) based algorithm for clustering in mobile ad hoc networks (MANETs). Our algorithm is an extension of our previous connected dominating set based clustering (CDSC) algorithm [1]. We extended the levels of the CDS to two levels and improved functionality at each level by providing additional rules to make sure that every node belongs to a singl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Analysis of a WiMAX Mesh Based Cellular Radio Access Networks

    Publication Year: 2007, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    This paper aims to design a self-configuring cellular radio access network. It is a WiMAX based meshed network where base stations form a Cellular IP, all radio network. We then take advantage of mesh networks fast-deployment and self-organising properties, and of cellular networks high mobility support. In the proposed model, WiMAX nodes, or SSs, form the wireless mesh network and in the other ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Comparison of Error Compensation Techniques with Multipath Transmission in Wireless Multimedia Sensor Networks

    Publication Year: 2007, Page(s):73 - 86
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (510 KB) | HTML iconHTML

    Due to the proliferation of the multimedia applications over unreliable medium like wireless networks, robust image and video communication have become more important. In this paper, we consider the transmission distortions on the multimedia data due to both channel impairments and instant node failures for Wireless Multimedia Sensor Networks (WMSN). Two techniques are investigated to compensate t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Efficent TDMA Design Under Real-Time Constraints in Wireless Sensor Networks

    Publication Year: 2007, Page(s):80 - 87
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    Many wireless sensor networks (WSNs) are used to collect and aggregate data from potentially hostile environments. Catering to this, early application scenarios did not put tight constraints on performance properties like delay, but rather focused on ruggedness and energy conservation. Yet, there is a growing number of sceanarios like e.g. production monitoring, intrusion detection, or health care... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of IEEE 802.11e Contention Free Bursting Scheme with Heterogeneous Stations

    Publication Year: 2007, Page(s):88 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Contention free bursting (CFB) is an innovative quality-of-service (QoS) scheme specified in the IEEE 802.11e standard. To reduce the contention overheads, this scheme enables the stations that gain the channel to transmit multiple frames back-to-back in a burst. Most existing analytical models of the CFB scheme have been developed under the assumption of identical stations with saturated traffic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Wireless MAC Protocols Using a Search Based Framework

    Publication Year: 2007, Page(s):95 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Previously, we have developed a framework to perform systematic analysis of CSMA/CA based wireless MAC protocols. The framework first identifies protocol states that meet our study objective of minimizing a given performance metric. It then applies search techniques and heuristics to construct sequences of protocol events in a given topology that satisfy our objective. In this paper, we demonstrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiobjective Analysis in Wireless Mesh Networks

    Publication Year: 2007, Page(s):103 - 108
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Wireless Mesh Networks are a scalable and cost-effective solution for next-generation wireless networking. In the present work, we consider the Round Weighting Problem (RWP) which solves a joint routing and scheduling problem to satisfy a given demand subjected to the multi-access interferences. We propose a multiobjective approach that deals with two objectives. The first one is to balance the lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simulation Model for the IEEE 802.15.4 protocol: Delay/Throughput Evaluation of the GTS Mechanism

    Publication Year: 2007, Page(s):109 - 116
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    The IEEE 802.15.4 protocol has the ability to support time-sensitive wireless sensor network (WSN) applications due to the guaranteed time slot (GTS) medium access control mechanism. Recently, several analytical and simulation models of the IEEE 802.15.4 protocol have been proposed. Nevertheless, currently available simulation models for this protocol are both inaccurate and incomplete, and in par... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing The Performance of Nonuniformly Deployed Sensor Network by Locating Bottleneck Areas for Partial Redeployment

    Publication Year: 2007, Page(s):117 - 123
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (150 KB) | HTML iconHTML

    The distribution of the sensor locations may be nonuniform under some terrain imposed physical constraints or different sensing quality requirements in different parts of a wireless sensor network. Given such a nonuniformly deployed sensor network, some bottleneck areas will form soon after the network becomes operational. Those areas will severely decrease the lifetime of the network. We propose ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient External Table Reordering

    Publication Year: 2007, Page(s):124 - 131
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    A novel extension to binary-tree table organization suitable for external storage providing successful searches for nearly full tables requiring less than two accesses is presented. The generalizes the "efficient ordering of hash tables" effort presented in 1979. Both the experimental and analytical results demonstrate the reductions possible. This method places no restrictions on the the table co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Proxy Caching Object Replacement: Frontier Analysis to Discover the Good-Enough Algorithms

    Publication Year: 2007, Page(s):132 - 137
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    Object replacement strategies are considered as key performance factors of a web proxy caching application. Several algorithms have been proposed, analyzed and simulated during the last decade, in order to decide upon the champion one. In this paper, we recommend the methodology of Data Envelopment Analysis as a powerful tool, with a complementary activity to that of trace driven simulation, which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.