Download Personal Wireless Communications: Pwc 05 - Proceedings of the 10th Ifip Conference PDF

TitlePersonal Wireless Communications: Pwc 05 - Proceedings of the 10th Ifip Conference
File Size26.4 MB
Total Pages543
Table of Contents
Wireless Sensors
	Energy-Efficient Application-Aware Communication for Wireless Sensor Networks R.M. Passos, C. J. N. Coelho, A.A.E Loureiro, R.A.E Mini (Federal University of Minas Gerais, Brazil)
		1. Introduction
		2. A New Application-Aware DPM Approach
		3. Performance Evaluation
		4. Conclusion and Future Work
	SDMA in Connections between Wireless Sensors and Wired Network V. Hasu, H. Koivo (Helsinki University of Technology, Finland)
		1. Introduction
		2. Link Between Wireless Sensors And Wired Network
		3. SDMA – Beamforming
		4. Simulation Study Of Line-Of-Sight Connections
			4.1 Simulation Specifications
			4.2 Results
			4.3 Extensions To SDMA/TDMA Systems With Power Control
		5. A Case Simulation Study Of Wireless Nodes In An Industrial Hall
			5.1 Simulation Specifications
			5.2 Results
		6. Conclusions
	A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks P. K. Loh, S. H. Long (Nanyang Technological University, Singapore); Y. Pan (Georgia State University, USA)
		1. Introduction
		2. Protocol Design Details
			2.1. Overview
			2.2. Setup Phase
			2.3. Route Management
				2.3.1. RouteLength Metric
				2.3.2. Routescore Metric
				2.3.3. Route Replacement
			2.4. Data Dissemination
			2.5. Route Update
		3. Simulation
			3.1. Results
		4. Conclusions
	Analysis of Coverage and Connectivity in Wireless Ad Hoc Sensor Networks J. Wang, L. Wang (Central South University, China); R. Xiao (National Nature Science Foundation of China, China)
		1. Introduction
		2. Network Model and Problem Statement
		3. The Proposed Solutions
			3.1. Coverage: Poccupyall(N) and Noccupyall(Pth)
			3.2. The probability Q(k) of k-cells Connection
			3.3. Connectivity and Coverage Pconn/p(P)
			3.4. Connectivity Pconn(N)
		4. Conclusion
	Cross-layer’s Paradigm Features in MANET: Benefits and Challenges L. Romdhani, C. Bonnet (EURECOM Institute, France)
		1. Introduction
		2. Limitations of Layered Approach in MANET
			2.1. Limitations Related to Physical Layer's Characteristics
			2.2. Limitations Related to MAC layer’s Characteristics
			2.3. Limitations Related to Routing Layer’s Characteristics
			2.4. Limitations Related to Transport Layer’s Characteristics
			2.5. Energy conservation
			2.6. Limitations Related to Application Layer’s Characteristics
		3. Review and Discussion of Cross-Layer Proposals
			3.1. Physical layer + MAC
			3.2. Physical layer + MAC + routing
			3.3. MAC + Routing + network layer
			3.4. Physical layer + MAC + Application
		4. The Implementation Cost of a Cross-Layer Architecture
		5. Achieving a good trade-off between complexity and enhancement in cross-layer architectures
		6. Conclusion
	Two Bandwidth-Violation Problems and Bandwidth-Satisfied Multicast Trees in MANETs C.C. Hu, G.H. Chen (National Taiwan University, Taiwan); E. H. K. Wu (National Central University, Taiwan)
		1. Introduction
		2. Bandwidth-reservation and related problems
		3. Heuristic algorithm
		4. Performance analysis
		5. Conclusions
	LAP-RRP: A Reliable Routing Protocol with Link Availability Prediction in MANET J. Wang, J. He (Central South University, China); X. Lu, (National University of Defense Technology, China)
		1. Introduction
		2. Network Model
		3. LAP-RRP Protocol
			3.1. Link Availability Prediction
			3.2. A Reliable Routing Protocol LAP-RRP
		4. Simulation Environment and Results
			4.1. Simulation environment and merits
			4.2. The analysis of simulation results
				(1) Network performance with different epochs
				(2) Network performance with different mobility speeds
				(3) Network performance with the number of nodes
		5. Conclusion
	An Efficient Load-Balancing Algorithm for Supporting QoS in MANET M. Brahma, K.W Kim, A. Abouaissa, P. Lorenz, (University of Haute Alsace, France); M.M.O. Lee (University of Dongshin, Korea)
		1. Introduction
		2. Previous and related Works
		3. Efficient load-Balancing algorithm in IEEE 802.11
			3.1. Scenario
			3.2. Message format and procedure of load-balancing
				Determine queue status
				Decision to send HELP message
		4. Performance evaluation
			4.1. Simulation configuration
			4.2. Numerical results of 20 nodes model
			4.3. Numerical results of a random topology model
		5. Conclusions
	A Bandwidth-Efficient Cross Layer Probability Routing for MANETs X. Wang, H. Yu, C. Ran, X. Zhang, W Qi, (Information Science and Engineering Institute, China)
		1. Introduction
			2.1. Computation of the available senrt/receive bandwidth of the node
			2.2. ABAPMN
			2.3. Modifications made for BECLPR based on AODV
		3. Performance evaluation
		4. Conclusions
Ad Hoc (I)
	Efficient Bandwidth Allocation for Basic Broadcast and Point-to-Point Services in the ADHOC MAC Protocol J. R. Ga'llego, A. Herna'ndez-Solana, M. Canales, A. Valdovinos, (University of Zaragoza, Spain); L. Campelli, M. Cesana, A. Capone, E Borgonovo (Politecnico di Milano, Italy)
		1. Introduction
		2. The ADHOC MAC Protocol
			2.1. Basic Operation Mode for BCH and point-to-point Communications
			2.2. Bandwidth allocation strategies
		3. Performance evaluation
			3.1. Bandwidth allocation evaluation
			3.2. Analysis of the point-to-point efficiency
		4. Conclusions
	Connectivity Aware Routing in Ad-hoc Networks J. Leguay, T. Friedman, S. Fdida, (University Pierre et Marie Curie, France); K Conan, A. Cotton, (Thales Communications, France)
		1. Introduction
		2. Motivations
		3. The QoS Routing Framework
		4. Connectivity Metrics
		5. Evaluation
			5.1. Metric performances
			5.2. Network simulations
		6. Discussion
		7. Conclusion and future work
	A New Approach for TDMA Scheduling in Ad-hoc Networks D.D. Vergados, D. J. Vergados, (University of the Aegean, Greece): C. Douligeris, (Univeristy of Piraeus, Greece)
		1. Introduction
		2. Network Model
		3. The proposed algorithm for Ad-hoc Networks
		4. Performance Analysis
			4.1. Complexity Analysis
			4.2. Frame Length
			4.3. Capacity
			4.4. Throughput
			4.5. Fairness Index
		5. Simulation Results
			5.1. Comparison with previous algorithms
			5.2. Simulation of random networks
		6. Conclusions
	A Self Organizing Algorithm for Ad-Hoc Networks N. Kettaf A. Abouaissa, P. Lorenz, (University of Haute Alsace, France); H. Guyennet, (University of Franche-Comte, France)
		1. Introduction
		2. Overview on existing works
		3. System model and assumptions
		4. Leader election algorithm
			4.1. Phase one: dynamic nodes grouping
				4.1.1. Signal power:
				4.1.2. Mobility:
			4.2. Phase two: leader election
		5. Simulations
			5.1. Simulation environment
		6. Results and Discussion
			6.1. Bandwidth
			6.2. Energy
			6.3. Throughput
		7. Conclusion and perspectives
	HDSR, Hierarchiacal Dynamic Source Routing for Heterogeneous Wireless Mobile Ad Hoc Networks M. Naserian, K.E. Tepe, M. Tarique, (University of Windsor, Canada)
		1. Introduction
		2. Hierarchical Dynamic Source Routing Protocol
		3. Simulation Model and Results
		4. Conclusion
Ad Hoc (II)
	Analyzing the Effect of Cooperation Approaches M. Frank, M. Holschbach, P. Martini, M. Plaggemeier, (University of Bonn, Germany)
		1. Introduction
		2. Related Work
		3. Modelling Ad Hoc Networks
		4. The Accuracy of the Model
		5 . Analyzing the Effects
			5.1. Networks without any Cooperation Approach
			5.2. Improving the Forwarding Behavior of one Class
			5.3. Improving the Forwarding Behavior of all Classes
			5.4. Increasing the Percentage of one class
		6. Simulation Results
		7. Conclusion and Next Steps
	Mobility Management in Multihops Wireless Access Networks F. Theoleyre, F. Valois (Inria Ares, France)
		1. Introduction
		2. Related Work
		3. Proposition
			3.1. Mobility Management
				3.1.1. Upload
				3.1.2. Download
				3.1.3. Ad HOC Routing
			3.2. Paging and Power-energy saving Schemes
		4. Performance Evaluation
		5. Conclusion
	Location Update Protection for Geographic Ad Hoc Routing Z. Zhou, K.C. Yow (Nanyang Technological University, Singapore)
		1. Introduction
		2. Threats of Geographic Routing
		3. Location Update Protection
			3.1. LLU-0
			3.2. LLU-1
			3.3. LLU-2
		4. Conclusion
	PEDCF: Predictive Enhanced Service Differentiation for IEEE 802.11 Wireless Ad-Hoc Networks based on AutoRegressive-Moving Average Processes N. Tabbane, S. Tabbane (SUP’COM, Tunisia); A. Mehaoua, (University of Versailles, France)
		1. Introduction
		2. The Predictive EDCF (PEDCF) scheme
			2.1. ARMA: mixed AutoRegressive-Moving Average model
			2.2. Setting CW after each Update Period Tupdate
			2.3. Complexity of PEDCF
		3. Simulation Methodology and Results
			3.1. Impact of the trafflc load
		4. Conclusion
IEEE 802.11
	A Carrier-Sense based Transmission Power Control Protocol for 802.11 Networks J. Rao, S. Biswas (Michigan State University, USA)
		1. Introduction
		2. Related Work
			3.1. Protocol Description
			3.2. Measurement based CTS Detection
		4. Performance Analysis
		5. Conclusions
	Chaos Shift Keying and IEEE 802.11a G. Plitsis (Aachen University of Technology, Germany)
		1. Introduction
		2. IEEE wireless LAN overview
		3. Chaotic modulation schemes
		4. The simulation model using chaos generators
		5. Spectrum results
		6. Conclusions
	Effect of Time-Correlated Errors on Power-Saving Mechanisms for IEEE 802.11 Infrastructure Networks G.A. Safdar, WG. Scanlon (The Queens University of Belfast, UK)
		1. Introduction
		2. PCF-PS and PCSAR Protocols
		3. Simulation Details
		4. Results and Discussion
			4.1. DL and UL Throughtput
			4.2. Access Delay
			4.3. Energy Consumption and Transmission Efficiency
		5. Conclusion
	COMPASS: Decentralized Management and Access Control for WLANs A. Hecker (Wavestorm, France); E.O. Blass (University of Karlsruhe, Germany); H. Labiod (ENST, France)
		1. Introduction
		2. COMPASS: Our New Proposed Architecture
			2.1. Main Idea
			2.2. Basic System Architecture
			2.3. Preliminary AP Configuration
			2.4. Bootstrapping (AP join)
			2.5. APLeave
			2.6. User A d d User Delete
			2.7. User Network Access
			2.8. Failure Management and Optimizations
		3. Discussion
		4. Conclusion
	QoS Provisioning Mechanisms for IEEE 802.11 WLAN: A Performance Evaluation J. Villalon, R Cuenca, L. Orozco-Barbosa (University De Castilla La Mancha, Spain)
		1. Introduction
		2. Priority-Based Distributed Mechanisms
			2.1. Deng et al. Mechanism
			2.2. Aad et al. Mechanisms
				2.2.1. Different backoff increase (referred from now on as Aad-Backoff scheme)
				2.2.2. Different CWmin (referred from now on as Aad-CWmin scheme)
				2.2.3. Different DIFS referred from now on as Aad-DIFS scheme)
			2.3. TCMA (Tiered Contention Multiple Access) Mechanism
		3. The Upcoming IEEE 802.11e Standard
		4. Performance Evaluation
		5. Conclusions
	Impact of Varying the Minimum Value of Contention Window (CWmin) of the IEEE 802.11 MAC Protocol on the QoS Parameters M. Saraireh, R. Saatchi, R. Strachan, S. Al-Khayatt (Sheffield Hallam University, UK)
		1. Introduction
		2. IEEE 802.11 MAC Protocol
		3. Experimental Procedures
		4. Results and Discussions
			4.1. Throughput
			4.2. End-to-End Delay and Jitter
			4.3. Packet Drop
		5. Fuzzy Logic Based Approach for Optimising CWmin Value
		6. Conclusion and Future Work
	Statistical QoS Guarantees in Bluetooth under Co-channel Interference J.L. Sevillano, D. Cascado, F. Diaz del Rio, S. Vicente, G. Jimenez, A. Civit-Balcells (University de Sevilla, Spain)
		1. Introduction
		2. Worst-case Response Time
		3. Considering Co-Channel Interference
		4. Conclusions
	Performances Evaluation of the Asynchronous Bluetooth Links in a Real Time Environment T. Khoutaif, F. Peyrard (Research Icare Team, France)
		1. Introduction
		2. Real time system and RTAI
			2.1. RTAI structure
			2.2. Serialport interruptions under RTAI
			2.3. Conclusion
		3. Bluetooth communicating systems
			3.1. Communication channels
			3.2. Simplified protocol architecture
		4. Real time modules to control Bluetooth peripherals
			4.1. HCI interface and packets
			4.2. Piloting the Bluetooth modules in real time
		5. Communicating real time tasks
		6. Evaluations of performances
			6.1. Measurements on the wired medium
			6.2. Measurements with Bluetooth
		7. Conclusion
	System Simulations of DS-TRD and TH-PPM for Ultra-Wide Band (UWB) Wireless Communications S. Vasana, K. Phillips (University of North Florida, USA)
		1. Introduction
		2. TRD Modulation For DS-UWB
		4. System Performance Comparison
		5. Conclusion
	Global Solution for the Support of QoS by IEEE 802.11 Wireless Local Area Networks A. Bedoui (ENIT, Tunisia); K. Barkaoui (CNAM, France); K. Djouani (University of Paris 12, France)
		1. Introduction
		2. Necessity of an integrated approach ofthe channelaccess problem
			2.1. PHY- MAC interaction
				2.1.1. SW and MVP Parameters
				2.1.2. MIMO fir the WFj Technology
				2.1.3. SNRparameter
			2.2. Network - MACInteracthn
				2.2.1. Network Packets - MAC Frames
				2.2.2. RTS/ClSSames
				2.2.3. Synthesis
		3. Conclusion
	Cross-Layer Design for Dynamic Resource Allocation in Wireless Networks J.Y Kim, A. Saidi, R.J. Landry (The MITRE Corporation, USA)
		1. Introduction
		2. Optimal Capacity Analysis
			2.1. Dynamic Bandwidth Allocation (DBA)
			2.2. Dynamic Time Allocation (DTA)
		3. Effective Capacity
			3.1. Contention Resolution for DBA
			3.2. Contention Resolution for DTA
			3.3. Residual Resource Utilization
		4. Delay Analysis of Cross-Layer Design
		5. Results
			5.1. Cross-Layer Design (CLD)
		6. Conclusions and Future Studies
	Coverage Area Analysis of Soft Handoff on Cellular CDMA Systems T.L. Sheu, J.H. Hou (National Sun Yat-Sen University, Taiwan)
		1. Introduction
		2. Soft Handoff Model
		3. Performance Evaluation
		4. Analytical Results and Discussions
		5. Conclusions
	LMS vs. RLS for Adaptive MMSE Multiuser Detection over Time Varying Communications Channels Z.B. Krusevac, P.B. Rapajic, R.A. Kennedy, (National ICT Australia and University of New South Wales, Australia)
		1. Introduction
		2. The Adaptive MMSE Receiver
		3. LMS Adaptive Algorithm
		4. RLS Adaptive Algorithm
		5 . Simulation results and analysis
		6. Conclusion
	Performance Analysis of a Preemptive Handoff Scheme for Multi Traffic Wireless Mobile Networks D.D. Vergados, A. Sgora (University of the Aegean, Greece)
		1. Introduction
		2. The System Model
		3. The traffic model
			3.1. Cell Dwell Time
			3.2. Handoff Area Dwell Time
			3.3. Channel Holding Time
			3.4. Arrival Process of Service Calls
			3.5. Performance Analysis
			3.6. Numerical and Simulation Results
			3.7. Conclusion
	Performance Analysis of DS-CDMA Systems in Multiple-Cell with Correlated Fading Channels J.I.-Z. Chen, N. Chi-Kuang, F.C. Chung (Da Yeh University, Taiwan)
		1. Introduction
		2. DS-CDMA system models description
			2.1. Transmitter and receiver model
			2.2. DS-CDMA channel model
			2.3. Gaussian approximation
			2.4. Joint pdf of correlated fading channel
		3. Average BER performance analysis
		4. Numerical results
		5. Conclusions
Cellular Networks
	Multimedia Transmission over Third Generation Cellular Networks A. Alexiou, C. Bouras, V. Igglesis (Research Academic Computer Technology Institute, Greece)
		1. Introduction
		2. Analytical computation of packet service time for MPEG-4 video traffic
		3. Simulation model
		4. Experiments
			4.1. MPEG-4 video transmission without background trafflc
			4.2. MPEG-4 video transmission with the presence of additional background traffic
		5. Conclusions and future work
	Distributed Content Sharing in Cellular Networks B. Bakos, L. Farkas, J.K. Nurminen (Nokia Research Center, Hungary); K. Marossy (Nokia Technology Plaforms, Hungary)
		1. Introduction
		2. Parallel Index Clusters (PIC)
		3. Index update topologies
		4. Query topologies
		5. Traffic analysis and simulation: determining optimal cluster sizes
			5.1. Index update traffic
			5.2. Query trafflc
			5.3. Traffic objectives and balancing strategies
			5.4. Optimal cluster size and optimal number of clusters
		6. Conclusions and further work
	On UMTS HSDPA Performance P. Matusz, J. Wozniak (Gdansk University of Technology, Poland)
		1. Introduction
		2. MAC-hs scheduling algorithm
		3. Conclusions
	Supporting Flexible Network Operator Policies in EGPRS Trough Admission Control D. Todinca, I. Sora (University Politehnica Timisoara, Romania); P. Perry, J. Murphy (University College Dublin, Ireland)
		1. Introduction
		2. Fuzzy logic for admission control ’
		3. The flexibility and adaptability of our fuzzy admission control algorithm
		4. Simulation results
			4.1. The simulation model
			4.2. Simulation conditions
			4.3. The results
		5. Conclusions
	Performance and Quality of Service Management in GPRS Network O. El Ghandour M. Fikry (Helwan University, Egypt); S. El-Ramly (Ain Shams University, Egypt)
		III. Signaling Plane in GPRS Network
Mobile Networks (I)
	Enabling Mobile IPv6 in Operational Environments X. Fu (University of Gottingen, Germany); H. Tschofenig, S. Thiruvengadam (Siemens AG, Germany); W Yao, (Brunel University Wenbing, UK)
		1. Introduction
		2. Mobile IPv6 Bootstrapping
			2.1. Protocol for Carrying Authentication for Network Access
			2.2. Extensions to PANA for MIPv6 bootstrapping
		3. Middlebox Traversal in Mobile IPv6
			3.1. NSIS NAT/Firewall Signaling
			3.2. Providing MIPv6 Firewall Traversal by NSIS Signaling
		4. An architecture for enabling MIPV6 deployment
		5. Summary and Future Work
	Performance Evaluation of Tunnel-based Fast Handovers for Mobile IPv6 in Wireless LANs H. Lu, J. Li, P. Hong (University of Science and Technology of China, China)
		1. Introduction
		2. Performance Analysis
			2.1. Basic Mobile IPv6 Handovers in WLANs
			2.2. Tunnel-Based Fast Handovers for Mobile IPv6 in WLANs
		3. Experiment Results
			3.1. WLANs Testbed Configuration and Components
			3.2. Experiment Results
		4. Conclusion
	Mobile IPv6-type Route Optimization Scheme for Network Mobility (NEMO) Support B. P. Kafle (The Graduate University for Advanced Studies, Japan); E. Kamioka, S. Yamada (National Institute of Informatics, Japan)
		1. Introduction
		2. Proposed Route Optimization Scheme
			2.1. Route Optimization Operation
			2.2. Advantages and Disadvantage
		3. Performance Evaluation
		4. Conclusion
	Comparative Analysis of Handoff Delay of MIFA and MIP A. Diab, A. Mitschele-Thiel, R. Boeringer (Ilmenau University of Technology, Germany)
		1. Introduction
		2. Mobile IP Fast Authentication Protocol (MIFA)
		3. Performance Analysis
			3.1. Basic Assumptions
			3.2. MIP Model
			3.3. MIFA Model
			3.4. Performance Comparison of MIFA with MIP
		4. Conclusion
	Integration the Protocols HMIPv6 and Diffserv over M-MPLS in Order to Provide QoS in IP Network Mobility J. H. Ortiz (University Polytechnic of Madrid, Spain)
		1. Introduction
		2. Scenarios of use
		3. Traffic models selected
		4. Description of trials done
		5. Description of the simulation
		6. Results of simulation
		7. Conclusions
Mobile Networks (II)
	An Agent-Based Framework for Mobile Multimedia Service Quality Monitoring and Diagnosis M. Li (Nokia Research Centel; USA)
		1. Introduction
		2. An Agent-based Framework for mobile service quality monitoring & Diagnosing
			2.1. Monitoring Agent
			2.2. Central Management Server
			2.3. Diagnostic agents
			2.4. Agent-sewer Communications
		3. Future work
		4. Conclusions
	Neural Network and Self-Learning Based Autonomic Radio Resource Management in Hybrid Wireless Networks C. Shen, D. Pesch, J. Irvine (Cork Institute of Technology, Ireland)
		1. Introduction
		2. Hybrid Wireless Networks with Dedicated Relay
		3. Using Autonomic Computing
		4. Self-Learning in Autonomic Elements
		5. Simulations
		6. Conclusion
	WebBee: An Architecture for Web Accessibility for Mobile Devices K. Upatkoon, W. Wang, S. Jamin (The University of Michigan, USA)
		1. Introduction
			1.1. Overview
			1.2. Scraping Scripts
		2. Implementation Details
			2.1. The WebBee Server
			2.2. Web Scraping Scripting Language
			2.3. Making Pages “Scrape-Friendly ”
		3. Conclusion
	Empowering Wireless UPnP Devices with Webprofiles J.I. Vazquez, D.L. De Ipina (Deusto University, Spain)
		1. Wireless UPnP
			1.1. Adapting the UPnP environment
		2. Passive Influence and Context-Aware Scenarios
			2.1. UPnP Passive Interaction
		3. Wireless UPnP Extended With Webprofiles
			3.1. Introduction to WebProjiles
			3.2. WebProfiles Negotiation
			3.3. UPnP Messages with WebProfiles
		4. Conclusions and Future Work
	UICC Communication in Mobile Devices Using Internet Protocols B.H. Nguyen, H.K. Lu (Axalto, Smart Cards Research, USA)
		1. Introduction
		2. Prior Arts
			2.1. Network Smart Card
			2.2. WebSIM
			2.3. CAT-TP
		3. Network Connection between Network SIM and Mobile Device
			3.1. Method Outline
			3.2. Communication Protocol Stacks
			3.3. Peer I/O
			3.4. Data Link Layer Connection
			3.5. IP Addresses and Routing
		4. Access Network SIM from a Computer
		5. Internet Access from the Network SIM
		6. Applications
		7. Conclusion
Mobile Networks (III)
	Modular Proxies for Service Adaptation and Session Continuation over Heterogeneous Networks T. Seipold, T. Tantidham (RWTH Aachen University of Technology, Germany)
		1. Introduction
		2. Related Work
		3. Middlegate
		4. Conclusion and Future Work
	A Channel Preemption Model for Multimedia Traffic in Mobile Wireless Networks T.L. Sheu, Y.J. Wu (National Sun Yat-Sen University, Taiwan)
		1. Introduction
		2. The Generalized Channel Preemption Model (GCPM)
		3. Analytical Model of the GCPM
		4. Analytical Results
		5. Conclusions
	Nonuniform-Detection-Based Fast Mobile IP Handoff for Wireless LANs B. Shen, H. Zhang, Y. Liu, Y. Zhao (Beijing Jiaotong University, China)
		1. Introduction
		2. Related Work
		3. Proposed Handoff Scheme
			3.1. The Basic Scheme
			3.2. Nonuniform Handoff Detection Model
			3.3. Address Mapping and Care-of Address Configuration
		4. Analysis and Simulation
			4.1. Performance Analysis of Handoff Detection
			4.2. Simulation and Results
		5. Conclusion and Future Work
	Analysis of ACD: Autonomous Collaborative Discovery of User and Network Information T. Zhang, S. Madhani (Telcordia Technologies, USA); S. Mohanty (Georgia Institute of Technology, USA)
			A. Information Creation Cost
			B. Information Query Cost
			A. Information Creation Cost
			B. Information Query Cost
	EasyMN: An Effective IP Mobility Solution for High-Mobility Network L. Wang, M. W. Xu, K. Xu (Tsinghua University, China)
		1. Introduction
		2. Related Work
		3. Proposed Solution-EasyMN
			3.1. Some Concepts
			3.2. Operation Principle of CN
			3.3. Operation Principle of BS_Server
			3.4. Operation Principle of BS Multicast Group
			3.5. Operation Principle of MN
		4. Analysis and Comparison
			4.1. Analysis and Comparison of the Location Management Loads
				4.1.1. FM - the location management load of MNs
				4.1.2. FB - the location management load of BSs
				4.1.3. FC - the location management load of CNs
				4.1.4. FO - the location management load of other parts
				4.1.5. The location management loads of two solutions
			4.2. Features of the Solution EasyMN
		5. Conclusion and Future Work
	Proposal of PAPR Reduction Method for OFDM Signal by Using Dummy Sub-carriers P. Boonsrimuang, K. Mori, H. Kobayashi (Mie University, Japan)
		1. Introduction
		2. System Model
		3. Proposal of Phase Optimization Method
		4. Performance Evaluations
		5. Conclusions
	Adaptive Scheduling for Heterogeneous Traffic Flows in Cellular Wireless OFDM-FDMA Systems S. Valentin, H. Karl (University of Paderborn, Germany); J. Gross, A. Wolisz (TU Berlin, Germany)
		1. Introduction
		2. System model
		3. Optimization Approach
			3.1. Dynamic subcarrier scheduling
			3.2. Traffic management for video streams
		4. Performance study
			4.1. Metrics and methodology
			4.2. Simulation parameterization
			4.3. Simulation results
		5. Conclusions
	The Power Spectral Density of the H-Ternary Line Code: A Simulation Model and Comparison A. Glass (Technical Studies Institute, UAE); N. Abdulaziz (University of Wollongong, UAE); E. Bastaki (Dubai Silicon Oasis, UAE)
		1. Introduction
		2. Encoding and Decoding Principles
			2.1. Encoder Operation
			2.2. Decoder Operation
		3. Review of Mathematical Analysis Models
		4. Simulation Model
		5. Comparison of Results and Discussion
		6. Conclusions
	An Optimized CPFSK-Receiver based on Pattern Classification in Combination with the Viterbi Algorithm D. Bruckmann (University of Wuppertal, Germany)
		1. Introduction
		2. Receiver configuration with zero crossing detection
		3. Pattern Classification Combined with the Viterbi Algorithm
		4. Performance results
		5. Summary
Document Text Contents
Page 271


2. Necessity of an integrated approach ofthe channelaccess problem

The majority of current researches concerning IEEE 802.1 1 Wireless Local
Area Networks try to improve the performances of the MAC sublayer or the
PHY layer without really taking into account their mutual interaction , the
interaction of the MAC sublayer with the Network layer and of the PHY layer
with environment (channel + wireless stations).
Since the MAC sublayer is located between the Physical and Network layers,
the improvement of its performances depends on information exchanged with
the two indicated layers. In this paper, we propose an integrated approach for
MAC QoS improvement based on integrating the information from the PHY
layer and information from the Network layer. The following figure represents
the interaction between the first 3 layers in order to improve MAC level output
and ensure QoS up to PHY layer:

I 0 0 s
EDCF Pakme ters 1 /

J 1 1 MW-Netwok
Figure 1. Control of QoS and interaction between layers.

2.1. PHY- MAC m era &on

2.1.1. SW and MVP Parameters
Our goal is to improve the MAC sublayer output by exploiting as well as
possible information obtained from the PHY layer. Therefore, it is necessary to
distinguish between the measured (or observed) parameters and those with
values defined by the standard. The table 1 gives MAC and PHY parameters.
The MVP-MAC can be measured according to the values given by the PHY
layer. SVP-PHY are fixed by the standard according to the defined physical
layer (DSSS, FHSS, IR, OFDM).

Similer Documents