By Topic

World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2013 IEEE 14th International Symposium and Workshops on a

Date 4-7 June 2013

Filter Results

Displaying Results 1 - 25 of 151
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (64 KB)  
    Freely Available from IEEE
  • Welcome message from the WoWMoM 2013 General Chair

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • Welcome message from the WoWMoM 2013 program chairs

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (85 KB)  
    Freely Available from IEEE
  • Welcome message from the WoWMoM 2013 workshops chairs

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (82 KB)  
    Freely Available from IEEE
  • Deploying applications with Community-Lab in wireless community networks

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (270 KB) |  | HTML iconHTML  

    Community-Lab is a testbed for researchers to carry out experiments within wireless community networks. Community networks are an emergent model of infrastructures built with off-the-shelf communication equipment that aims to satisfy a community's demand for Internet access and ICT services. Community-Lab consists of a set of nodes that are integrated in existing community networks, thus giving researchers access to community networks and allowing them to conduct experimental evaluation of applications deployed there. ICT services and applications beyond Internet access are an important milestone - yet not completely reached - to add value to community networks. The challenging environment of community networks however needs a careful evaluation of application performance to make the user experience successful. This paper focuses on demonstrating the deployment of applications in Community-Lab. By means of selected applications, we show how Community-Lab can be used by researchers to perform experiments with applications in community networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DroidOppPathFinder: A context and social-aware path recommender system based on opportunistic sensing

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (509 KB) |  | HTML iconHTML  

    In this paper we present DroidOppPathFinder, a Mobile Social Network application designed to generate and share contents about paths for fitness activity in a city. The application is able to recommend the best path in a specific area by analyzing the user's preferences and real-time environmental characteristics collected by heterogeneous sensing devices and services through opportunistic sensing mechanisms. To this aim, DroidOppPathFinder is developed on top of our middleware CAMEO, which provides context- and social-aware functionalities to improve both the application's performances and the user experience. This work represents a real example of opportunistic sensing service as additional support to the development of MSN applications. In addition, it demonstrates an efficient management of heterogeneous sensing data and services on mobile devices in order to further enrich the context of both local and remote nodes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient wi-fi gateways for federated residential networks

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (448 KB) |  | HTML iconHTML  

    Cooperation among federated APs in dense urban areas can yield energy saving by allowing under-used devices to hand over their wireless stations (WS) to nearby APs and temporarily switch off while meeting user expectations in terms of throughput. We demonstrate the effectiveness and the benefits of our energy-efficient cooperative protocol through a real deployment emulating a residential scenario. The demo we propose is highly interactive, as users can generate traffic within a BSS through a wireless station, like a smartphone or a notebook, and observe, through a web interface, the protocol behavior and the network topology changes caused by the new traffic scenario. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving WiFi networking with concurrent connections and multipath TCP

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (536 KB) |  | HTML iconHTML  

    It is increasingly popular that there are multiple accessible access points (APs) surrounding a WiFi client. In an ideal case, the client would simultaneously connects to all the APs and maximize the connections' utilization, for example, aggregating the bandwidth of APs' backhauls, load balancing among the connections, etc. In this paper, we present WM (Wireless virtualization with Multipath TCP) a cross-layer approach that aims to improve performance of mobile WiFi users. The demonstration shows that aWiFi client equipped WM can keep multiple concurrent connections to APs by using wireless virtualization. Moreover, WM enhances the aggregated bandwidth and achieves seamless handover by adopting Multipath TCP. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility management in next generation mobile networks

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (672 KB) |  | HTML iconHTML  

    In this demo we propose a novel architecture suitable for deployment in future mobile networks based on the distributed mobility management (DMM) paradigm. In DMM, the IP anchoring point gets closer to users, with the aim to flatten the architecture and to truly enable the fixed/mobile convergence. DMM allows operators to tackle the explosion of data traffic without burdening the core part of the network, offering a common IP framework for mobility and heterogeneous access. As a use case scenario, this demo has shown a possible deployment for a content delivery network's nodes, in order to exploit the DMM benefits. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical node policing in 802.11WLANs

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (6730 KB) |  | HTML iconHTML  

    As open-source WiFi device drivers are increasingly available, wireless equipment can be configured to disobey the 802.11 specification, with the goal of achieving performance gains, to the detriment of fair users.We demonstrate a practical implementation of a node policing scheme that combats such selfish behaviour, using commercial off-the-shelf hardware and a modified firmware. With a small testbed, we show that access points running our scheme can detect misbehaving stations, inflict punishment upon them and effectively restore fairness in the network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical OFDMA in wireless networks with multiple transmitter-receiver pairs

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (306 KB) |  | HTML iconHTML  

    State-of-the-art physical layers such as OFDMA are widely used in infrastructure-based networks to enhance efficiency in one-to-many transmissions. Application to wireless mesh networks is highly promising, as the diversity increases in many-to-many scenarios. While theoretical work on OFDMA for this scenario exists, it has not yet been implemented in practice. In this demonstration, we show practical measurements of OFDMA in a topology with multiple transmitters and receivers, which represents a fully-connected segment of a mesh network. Moreover, we model our system analytically and in simulation. Our measurements show the validity of these models. We demonstrate over 90% reduction of the symbol error rate and a 29% channel capacity increase. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software tool for assessing secondary system opportunities in spectrum whitespaces

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (227 KB) |  | HTML iconHTML  

    The prospect of increasing wireless capacity via secondary access to spatio-temporally underutilized chunks of spectrum, so-called whitespaces, has been proposed as a central aspect of emerging radio systems in response to the imminent spectrum scarcity problem. In this demonstration we present a novel software tool that helps researchers, industry, and regulators in assessing the feasibility and value of secondary spectrum access beyond simple whitespace availability calculation. Whereas existing software applications merely provide visualization of estimated secondary spectrum over a geographic area, our tool uniquely enables a holistic evaluation of the realistic potential of whitespace technologies, by modelling the performance of entire secondary systems in the envisioned eco-system of dynamic spectrum access policy and technology. Our tool provides a unified and flexible software framework and assessment methodology to conduct such studies, and is composed of an extensive primary spectrum usage database, a graphical interface for user interaction, and an interface to an extensible MATLAB backend for numerical calculations. We showcase the deployment scenarios of cellular and Wi-Fi-like secondary networks in TVWS (TV whitespaces). We also compare the impact of employing FCC-type of regulatory rules (with a fixed power/no-talk distance configuration) against European WG-SE43 regulatory proposals (with probabilistic access and power control). The case studies we will demonstrate are based on real network configuration data of European and US TV networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical experience on radio backhaul for small cells

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1747 KB) |  | HTML iconHTML  

    Small Cell deployments will only be a reality if the cost of their backhaul can be kept low enough. Backhaul traffic aggregation on wireless links is the favored approach by the telecom operators, which demand minimum radio planning and unlicensed or light-licensed frequency of operation. In such conditions Non-Line-of-Sight links which support the traffic from many Small Cells will be common. However, the authors have tested that current under-6 GHz wireless backhaul solutions performance is in some circumstances poor, in particular in the case Non-Line-of-Sight propagation or when the link is interfered by other users operating in the same band. This paper highlights the need of improving the physical and medium access control layers of the wireless backhaul interfaces, and properly tuning the interference detection and channel selection procedures, in order meet telecom industry reliability and quality of service demands. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and simulation of the CLTD feedback from the Multiflow assisting cell

    Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (314 KB) |  | HTML iconHTML  

    The latest 3GPP Rel-11 is characterized by a number of new features, where a few of them specifically address UE performance at the cell edge. In particular, uplink CLTD aims at reducing the UE transmission power, and/or improving the received SINR, by steering a transmission beam towards the base station based by sending appropriate feedback information. At the same time, the downlink Multiflow improves noticeably the cell edge performance as a UE receives simultaneously data from two neighboring cells. What remains unclear and is still under study, is the overall system behavior when these features are combined together. Furthermore, there is a special interest in providing the CLTD feedback from the so-called Multiflow assisting cell, which can mitigate the link imbalance and enable Multiflow operation for larger handover areas. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced multi-domain access control for secure mobile collaboration through Linked Data cloud in manufacturing

    Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (739 KB) |  | HTML iconHTML  

    Collaborative networked organizations represent an important paradigm to help manufacturing companies to cope with the challenges of market turbulence. However, although manufacturing companies are increasingly aiming to implement mobile collaboration models, there are still some barriers that prevent manufacturers from effectively sharing big data leveraged in particular by the use of Internet of Things technologies. These barriers are basically related to the lack of security controls and lightweight data management enablers that would guarantee the protection of sensitive information published on the Linked Data cloud and leverage customers from the burden of linked data sharing. The aim of this paper is to present and discuss the industrial application of the necessary extensions to traditional role-based multi-domain access control approaches to enable secure and mobile collaboration among manufacturing enterprises in logistic, manufacturing and e-Commerce processes in the context of the Web of Data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting context information for V2X dissemination in vehicular networks

    Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (889 KB) |  | HTML iconHTML  

    Cooperative ITS systems are expected to highly improve the efficiency of road mobility. Wireless communications are used by these systems to disseminate centralized real-time traffic information to radio-equipped vehicles. Current proposals for traffic information dissemination either exploit dedicated cellular transmissions to interested vehicles, or cooperatively relay the information through vehicular ad-hoc networks. However, dedicated cellular transmissions may pose energy cost and traffic scalability issues to network operators. On the contrary, purely ad-hoc solutions may suffer from network disconnections and not always ensure adequate service reliability. To overcome these limitations, this paper introduces RoAHD, a hybrid approach in which a few messages injected through the cellular system are followed by a cooperative multi-hop dissemination in the vehicular network. RoAHD exploits multi-hop road connectivity information obtained at a low channel cost. Thanks to this knowledge, it is capable to operate smart injection decisions to ensure good levels of message delivery. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lossless compression technique for the fronthaul of LTE/LTE-advanced cloud-RAN architectures

    Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (300 KB) |  | HTML iconHTML  

    Some of the most advanced functionalities in LTE and LTE-Advanced wireless networks rely upon some kind of collaborative processing between cells, as happens in coordinated scheduling, Cooperative Multi-Point (CoMP), or enhanced Inter-Cell Interference Coordination (eICIC), among other techniques. In some of these functionalities the required amount of information exchange between cells is so high that centralized processing scenarios represent a more viable alternative, whereby central nodes perform baseband processing tasks and remote radio heads are connected to them via high-capacity fiber links (usually known as fronthaul links). The high fiber cost incurred by these so-called Cloud-RAN architectures is the main drawback for practical deployments, and compression techniques are therefore needed at the fronthaul network. The present paper explores a lossless compression technique for LTE and LTE-Advanced wireless networks where actual compression ratios depend upon the resources occupancy, thereby allowing for statistical multiplexing in the aggregation network which translates into significant cost reductions. Compression ratios as high as 30:1 can be achieved in lightly loaded LTE 2×2 MIMO cells while values around 6:1 are typically obtained for 50% cell loads. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic adaptive channel switching with time slice based predictors

    Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3047 KB) |  | HTML iconHTML  

    Channel switching in HSPA networks is used to reduce the channel occupancy when there is no data transfer for the given user, this way reducing battery consumption. This paper is the first dealing with another important aspect that is the CPU load on the radio network controller (RNC) caused by channel switching. This is an optimization task, in which both the channel switching and staying on the high-bandwidth channel have costs. In this paper we propose a system to minimize the costs by applying a predictor based method which uses time slice based features in order to reduce the high variance in the feature values. The proposed system is evaluated and compared to other state-of-the-art methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A logistic regression approach to location classification in OFDMA-based FFR systems

    Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (395 KB) |  | HTML iconHTML  

    In this paper, the problem of location classification in OFDMA-based FFR systems is considered for two FFR schemes, namely Strict FFR (FFR-A) and Soft Frequency Reuse (FFR-B). The FFR systems considered in the literature are mostly studied with static resource partitioning where a greater portion of the sub-carrier resources are reserved for users in the cell centre and a smaller portion for users near the edge. Once the resources are statically partitioned, they can then be allocated dynamically. In order to ensure proper resource allocation, the base station has to classify the location of the user as either cell-centre or cell-edge. A common practice is to use a one-dimensional threshold such as SINR, which is assumed to be a good indicator of distance. In this paper, the impact of misclassifying the user location on the overall system performance is studied. It is shown that in an urban environment with shadowing, the one-dimensional threshold approach gets the location classification right only 67% of the time and when compared to an ideal system based on accurate location, the overall cell throughput drops by 38% for FFR-A and 14% for FFR-B. Similarly, service rate drops of 24% and 28% are also observed for FFR-A and FFR-B respectively. A better technique based on a combination of two measurements, namely received power and SINR, is proposed where the higherdimensional threshold is determined through Logistic Regression. This new approach is shown to have a classification accuracy of more than 80%. As a result, the system performance is shown to be much better than the one-dimensional threshold approach and comparable to that based on accurate location. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel characteristic correlation approach for aggregating data in wireless sensor networks

    Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1625 KB) |  | HTML iconHTML  

    Numerous solutions have been proposed to improve the efficiency of wireless sensor networks (WSNs). Data aggregation, which reduces the data redundancy so as to mitigate energy consumption, is one of desirable solutions. One common feature of geographically close-by data known as spatial correlation, has been utilized for eliminating redundant information. To reduce redundancy and enhance eventual performance, we explore the possibility of combining sensing data with similar characteristics without considering spatial information.We define this relationship of data as characteristic correlation and propose an automatic procedure to discover characteristic correlation between sensor nodes (SNs) with limited overheads. Furthermore, we introduce a novel characteristic correlation based data aggregation approach that allows any SN to compress unlimited number of packets into virtual packets up to a constant number. With experimental and simulation results, our proposed approach is illustrated as an effective data aggregation method in term of data accuracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximation algorithms for Interference Aware Broadcast in wireless networks

    Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (434 KB) |  | HTML iconHTML  

    Broadcast is a fundamental operation in wireless networks and is well supported by the wireless channel. However, the interference resulting from a node's transmission pose a key challenge to the design of any broadcast algorithms/protocols. In particular, it is well known that a node's interference range is much larger than its transmission range and thus limits the number of transmitting and receiving nodes, which inevitably prolong broadcast. To this end, a number of past studies have designed broadcast algorithms that account for this interference range with the goal of deriving a broadcast schedule that minimizes latency. However, these works have only taken into account interference that occurs within the transmission range of a sender. Therefore, the resulting latency is non-optimal given that collision occurs at the receiver. In this paper, we address the Interference-Aware Broadcast Scheduling (IABS) problem, which aims to find a schedule with minimum broadcast latency subject to the constraint that a receiver is not within the interference range of any senders. We study the IABS problem under the protocol interference model, and present a constant approximation algorithm, called IABBS, and its enhanced version, IAEBS, that produces a maximum latency of at most 2⌊π/√(3)(α+1)2+ (π/2+1)(α+1)+1⌋ R, where α is the ratio between the interference range and the transmission range, i.e., α ≥ 1, and R is the radius of the network with respect to the source node of the broadcast. We have evaluated our algorithms under different network configurations and confirmed that the latencies achieved by our algorithms are much lower than existing schemes. In particular, compared to CABS, the best constant approximation broadcast algorithm to date, the broadcast latency achieved by IAEBS is 5 over 8 that of CABS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomic cognitive-based data dissemination in Opportunistic Networks

    Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (610 KB) |  | HTML iconHTML  

    Opportunistic Networks (OppNets) offer a very volatile and dynamic networking environment. Several applications proposed for OppNets - such as social networking, emergency management, pervasive and urban sensing - involve the problem of sharing content amongst interested users. Despite the fact that nodes have limited resources, existing solutions for content sharing require that the nodes maintain and exchange large amount of status information, but this limits the system scalability. In order to cope with this problem, in this paper we present and evaluate a solution based on cognitive heuristics. Cognitive heuristics are functional models of the mental processes, studied in the cognitive psychology field. They describe the behavior of the brain when decisions have to be taken quickly, in spite of incomplete information. In our solution, nodes maintain an aggregated information built up from observations of the encountered nodes. The aggregate status and a probabilistic decision process is the basis on which nodes apply cognitive heuristics to decide how to disseminate content items upon meeting with each other. These two features allow the proposed solution to drastically limit the state kept by each node, and to dynamically adapt to both the dynamics of item diffusion and the dynamically changing node interests. The performance of our solution is evaluated through simulation and compared with other solutions in the literature. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BASICS: Scheduling base stations to mitigate interferences in cellular networks

    Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (253 KB) |  | HTML iconHTML  

    The increasing demand for higher data rates in cellular network results in increasing network density. As a consequence, inter-cell interference is becoming the most serious obstacle towards spectral efficiency. Therefore, considering that radio resources are limited and expensive, new techniques are required for efficient radio resource allocation in next generation cellular networks. In this paper, we propose a pure frequency reuse 1 scheme based on base station scheduling rather than the commonly adopted user scheduling. In particular, we formulate a base station scheduling problem to determine which base stations can be scheduled to simultaneously transmit, without causing excessive interference to any user of any of the scheduled base stations. We show that finding the optimal base station scheduling is NP-hard, and formulate the BASICS (BAse Station Inter-Cell Scheduling) algorithm, a novel heuristic to approximate the optimal solution at low complexity cost. The proposed algorithm is in line with the ABSF (almost blank sub-frame) technique recently standardized at the 3GPP. By means of numerical and packet-level simulations, we prove the effectiveness and superiority of BASICS as compared to the state of the art of inter-cell interference mitigation schemes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross Technology Interference Mitigation in Body-to-Body Area Networks

    Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (382 KB) |  | HTML iconHTML  

    In recent years, Body-to-Body Networks (BBNs) have gained momentum as a means to monitor people behavior and simplify their interaction with the surrounding environment; thus representing a key element of the Internet of Things (IoT) networking paradigm. Within BBNs, several transmission technologies sharing the same unlicensed band (namely the ISM band) coexist, increasing dramatically the level of interference, which in turn negatively affects the network performance. In this paper, we consider an IoT system composed of several BBNs and we analyze the Cross Technology Interference (CTI) problem caused by the utilization of different transmission technologies that share the same radio spectrum. We formulate an optimization model considering both the Mutual and Cross Technology Interference in order to mitigate the overall level of interference within the IoT system, taking explicitly into account the node mobility. We further develop two heuristic approaches to solve efficiently the interference mitigation problem in large scale network scenarios. Numerical results show that the proposed heuristics represent two efficient and practical alternatives to the optimal solution for solving the CTI mitigation problem in large scale IoT scenarios. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision tree modeling for video routing in cognitive radio mesh networks

    Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (436 KB) |  | HTML iconHTML  

    Cognitive radio networks are developed to solve the under utilization problem of available spectrum. Typically, available spectrum is not fully utilized without supporting multimedia applications. In this work we translate video routing in a dynamic cognitive radio network into a decision theory problem. Then terminal analysis backward induction is used to produce our routing scheme that improves the peak signal-to-noise ratio of the received video. In the proposed Video aware Cognitive Routing strategy (VCR), two components are introduced that improve the precision of correct decision making in a highly dynamic environment; First, a sample and posterior distribution are introduced to explain the status of channels and nodes in supporting video frame quality of service. Second, a utility function is introduced to capture the effects of spectrum stability, fluctuation of bandwidth availability and path quality. In comparison to a deterministic routing scheme developed for dynamic environment (OSDRP), our simulation results show that VCR improves the video quality by at least 30% at the receiver. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.