Wireless Network Research Papers - Academia.edu (original) (raw)

F. Granelli et al. (Eds.): MOBILIGHT 2009, LNICST 13, pp. 230–241, 2009. © ICST Institute for Computer Sciences, Social-Informatics and Telecommunication Engineering 2009 ... Self-management in Future Internet Wireless Networks: ...... more

F. Granelli et al. (Eds.): MOBILIGHT 2009, LNICST 13, pp. 230–241, 2009. © ICST Institute for Computer Sciences, Social-Informatics and Telecommunication Engineering 2009 ... Self-management in Future Internet Wireless Networks: ... Dynamic Resource Allocation and Traffic Routing ...

In this paper a new pedestrian mobility model for outdoor scenarios is presented. It captures realistic features like moving-in-groups, conscious traveling and smart traveling. The routing algorithm proposed within the model works under a... more

In this paper a new pedestrian mobility model for outdoor scenarios is presented. It captures realistic features like moving-in-groups, conscious traveling and smart traveling. The routing algorithm proposed within the model works under a step by step approach, leading users to their destination while, at the same time, using more attractable streets from a pedestrian point of view. The model concept is perfectly generic and applicable to any pedestrian outdoor scenario, provided that the street database and pedestrian traffic information is available. The mobility model was validated using Lisbon's downtown as a case study. The output shows a high correlation between simulated and real data, thus validating the approach.

... convergence of services and growing development of applica-tions based on a combination of ... the issue of simplifying the regulatory framework to adapt to this new situation [3 ... 737, “Review of Spectrum and Regulatory... more

... convergence of services and growing development of applica-tions based on a combination of ... the issue of simplifying the regulatory framework to adapt to this new situation [3 ... 737, “Review of Spectrum and Regulatory Requirements to Facilitate World-wide Harmonization of ...

A wireless network consisting of large number of small sensors with low-power transceivers. These devices rely on battery power so that; improvement in the energy of these networks becomes important. Wireless sensor network (WSN) require... more

A wireless network consisting of large number of small sensors with low-power transceivers. These devices rely on battery power so that; improvement in the energy of these networks becomes important. Wireless sensor network (WSN) require various power management protocols to reduce the power consumption. In this paper we study that different number of clustering algorithm leads to different network performance on the energy balancing, energy consumption and network lifetime. We propose a Multi-hop Hierarchical Stable Election Protocol (MHSEP) for wireless sensor networks to enhance the network lifetime and avoid the formation of energy holes. Classical clustering protocols assume that all the nodes in a system are equipped with the equal amount of energy and as a result, network cannot take full advantage of the presence of node heterogeneity in system. Our proposed protocol is a heterogeneous-aware protocol to increase the time-interval before the death of first node (we refer to a...

With the advent of the IEEE 802.11 wireless networks that provide high speed connectivity, demand for supporting multiple real-time traffic appli-cations over wireless LANs has been increasing. A natural question is how to provide fair... more

With the advent of the IEEE 802.11 wireless networks that provide high speed connectivity, demand for supporting multiple real-time traffic appli-cations over wireless LANs has been increasing. A natural question is how to provide fair resource allocation to real-time traffic in wireless LANs. Wireless networks are subject to unpredictable location-dependent error bursts, which is different from wired networks. We propose a fair real-time scheduling model whose goal is to minimize the maximum loss rate among all the flows and additionally to maximize the overall throughput. We de-velop algorithms for this scheduling model that takes the wireless channel error characteristics into consideration. I.

We investigate microdiversity-augmented macrodiversity techniques in wireless communication networks. The setup consists of K widely separated access ports each carrying N antennas. The conventional selection macrodiversity (Scheme I) and... more

We investigate microdiversity-augmented macrodiversity techniques in wireless communication networks. The setup consists of K widely separated access ports each carrying N antennas. The conventional selection macrodiversity (Scheme I) and two proposed methods (Scheme II and Scheme III) for port selection are investigated and their performance are compared. Scheme II utilizes the advancement in distributed antennas and radio-on-fiber technologies whereas Scheme III utilizes these technologies in a way similar to the soft handover of CDMA systems. After the port selection, the microdiversity uses n strongest signals (n les N) of the selected port for diversity combining if practical constraints preclude the use of all N signals. Analytical performance expressions for the probability of error and outage probability for Scheme I are developed. Simulations are used to investigate Scheme II and Scheme III and it is observed that these latter schemes exhibit performance superiority over the conventional macrodiversity selection method. The power savings obtained using the proposed architecture and new selection schemes could be used either for coverage extension or to increase capacity in wireless networks

Abstract Next-generation wireless networks will integrate multiple wireless access technologies to provide seamless mobility to mobile users with high-speed wireless connectivity. This will give rise to a heterogeneous wireless access... more

Abstract Next-generation wireless networks will integrate multiple wireless access technologies to provide seamless mobility to mobile users with high-speed wireless connectivity. This will give rise to a heterogeneous wireless access environment where ...

Wireless Sensor Networks (WSN) is a research hotspot in recent years and has yielded many fruitful results. However, the biomedical applications of WSN haven’t received significant development due to its many unique challenges for the... more

Wireless Sensor Networks (WSN) is a research hotspot in recent years and has yielded many fruitful results. However, the biomedical applications of WSN haven’t received significant development due to its many unique challenges for the engineers and physicians. In this paper, a system architecture solution of body area network (BAN), our so called project “MediMesh”, is presented. A biomedical dedicated BAN node hardware platform is devised to fit the medical monitoring application. The sensor node is built up especially for healthcare monitoring while the biocompatibility and portability are considered. A light weight network protocol is designed considering the radiation effect and communication overhead. After data acquisition from sink stations, a data publishing system based on web service technology is implemented for typical hospital environment. The publishing of biomedical data is realized through 3 phases: first storing the data automatically in a database, then creating information sharing service by using Web Service technology, and finally allowing data access by the physicians and end users.

The power control of wireless networks is formulated using a stochastic optimal control framework, in which the evolution of the channel is described by stochastic differential equations. Under this scenario, average and probabilistic... more

The power control of wireless networks is formulated using a stochastic optimal control framework, in which the evolution of the channel is described by stochastic differential equations. Under this scenario, average and probabilistic Quality of Service (QoS) measures are introduced to evaluate the performance of any control strategy, while a solution of the stochastic optimal power control is obtained through

The tremendous advances in wireless networks, mobile computing, and sensor networks, along with the rapid growth of small, portable and powerful computing devices, offers more and more opportunities for pervasive computing and... more

The tremendous advances in wireless networks, mobile computing, and sensor networks, along with the rapid growth of small, portable and powerful computing devices, offers more and more opportunities for pervasive computing and communications. This topic deals with cutting-edge research in various aspects related to the theory and practice of mobile computing or wireless and mobile networking. These aspects include architectures, algorithms, networks, protocols, modeling and performance issues, data management, ...

Broadband wireless communications services provided from a High Altitude Long Operation (HALOTM) aircraft are now feasible. The authors emphasize the conceptual design of a “bandwidth-on-demand” wireless network whose data rates to and... more

Broadband wireless communications services provided from a High Altitude Long Operation (HALOTM) aircraft are now feasible. The authors emphasize the conceptual design of a “bandwidth-on-demand” wireless network whose data rates to and from the user is in the multi-megabit per second range. The network uses the millimeter wave range of the spectrum (>20 GHz). The HALO TM aircraft is specially designed for stratospheric operation (>50,000 feet). The HALOTM aircraft fuselage houses packet switching circuitry and fast digital network functions. The communications antenna and related components are located in a pod suspended below the aircraft fuselage. To offer “ubiquitous” service throughout a large region, the HALOTM antenna utilizes multiple spot beams arranged in a typical cellular pattern. Broadband channels to users in adjacent cells are separated in frequency. As the beams traverse over a user location, the virtual path through the packet switch is changed to perform a bea...

Several trends in biomedical computing are converging in a way that will require new approaches to telehealth image display. Image viewing is becoming an "anytime, anywhere" activity. In addition, organizations are beginning to... more

Several trends in biomedical computing are converging in a way that will require new approaches to telehealth image display. Image viewing is becoming an "anytime, anywhere" activity. In addition, organizations are beginning to recognize that healthcare providers are highly mobile and optimal care requires providing information wherever the provider and patient are. Thin-client computing is one way to support image viewing this complex environment. However little is known about the behavior of thin client systems in supporting image transfer in modern heterogeneous networks. Our results show that using thin-clients can deliver acceptable performance over conditions commonly seen in wireless networks if newer protocols optimized for these conditions are used.

Autonomous systems present the future of wireless networks and applications. Systems that are able to go anywhere and be truly "autonomous" have a huge advantage over those dependent on finite... more

Autonomous systems present the future of wireless networks and applications. Systems that are able to go anywhere and be truly "autonomous" have a huge advantage over those dependent on finite power sources. They do not require regular maintenance of a battery; therefore they can be put into places where it might be difficult to replace components. The question is "How

This paper describes an attack concept termed Drive-by Pharming where an attacker sets up a web page that, when simply viewed by the victim (on a JavaScript-enabled browser), attempts to change the DNS server settings on the victim’s home... more

This paper describes an attack concept termed Drive-by Pharming where an attacker sets up a web page that, when simply viewed by the victim (on a JavaScript-enabled browser), attempts to change the DNS server settings on the victim’s home broadband router. As a result, future DNS queries are resolved by a DNS server of the attacker’s choice. The attacker can direct the victim’s Internet traffic and point the victim to the attacker’s own web sites regardless of what domain the victim thinks he is actually going to, potentially leading to the compromise of the victim’s credentials. The same attack methodology can be used to make other changes to the router, like replacing its firmware. Routers could then host malicious web pages or engage in click fraud. Since the attack is mounted through viewing a web page, it does not require the attacker to have any physical proximity to the victim nor does it require the explicit download of traditional malicious software. The attack works under the reasonable assumption that the victim has not changed the default management password on their broadband router.

We are nowadays immersed in a great number of networks that permit us to have access to the information systems. Although it is a reality, there is a lack of interoperability between different networks, which would allow us a more... more

We are nowadays immersed in a great number of networks that permit us to have access to the information systems. Although it is a reality, there is a lack of interoperability between different networks, which would allow us a more universal access to the information systems. This paper presents an hybrid network architecture in order to achieve the integration of