Change search
Refine search result
2345678 201 - 250 of 3161
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 201.
    Bastani, Saeed
    et al.
    The University of Sydney.
    Landfeldt, Björn
    Lund University.
    Rohner, Christian
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems.
    Gunningberg, Per
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems.
    A social node model for realising information dissemination strategies in delay tolerant networks2012In: Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, New york: ACM Press, 2012, 79-88 p.Conference paper (Refereed)
    Abstract [en]

    In Delay Tolerant Networks (DTNs) as an emerging content dissemination platform, mobile nodes opportunistically exchange content as they meet, with the intent of disseminating content among nodes that share common interests. During a meeting, nodes can exchange both content of direct interest to themselves as well as content that is of interest to a larger set of nodes that may be encountered in the future. The utility of DTN is governed by the content exchange opportunity (the amount of content that can be exchanged during a meeting) as well as the selection of content to be exchanged in order to maximise the interest nodes will have in information they are exposed to. Considering that there is a cost associated with the content exchange (e.g. battery usage, buffer occupancy or consumed transmission opportunity) the aim for nodes participating in content dissemination should be to maximise their payoff. In this paper, we contribute a generic framework for describing the characteristics of content exchange among participating nodes in a network. We incorporate a distributed information popularity measurement and the pairwise interaction of nodes modelled as a bargaining problem. The outcome of this process is the fair split up of dwelling time as a network resource and the selection of which content objects to exchange in order to maximise the nodes’ payoff. The framework is generally intended to be used as a capstone for investigation of content dissemination properties and various content exchange strategies in a DTN, a topic addressed in this paper and experiments conducted to validate the function and correctness of the proposed framework. 

  • 202. Bauer, K.
    et al.
    Boreli, R.
    Carlsson, N.
    Chen, Z.
    Francillon, A.
    Freudiger, J.
    Friedman, A.
    Gambs, S.
    Haddadi, H.
    Hecker, A.
    Hui, P.
    Kaafar, M. -A
    Köpf, B.
    Mahanti, A.
    Önen, M.
    Papadimitratos, Panagiotis
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Ries, S.
    Salamatian, K.
    Schneider, F.
    Shikfa, A.
    Shue, C.
    Strufe, T.
    Uhlig, S.
    Uzun, E.
    Xie, G.
    Welcome message from the PADE chairs2013In: Welcome message from the PADE chairs  (Editorial), IEEE Computer Society, 2013, lxi-lxii p.Conference paper (Other academic)
  • 203.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Harper, B.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Judge, J.
    Location Aware Mobile Computing1997In: Proceedings of ICT '97, IEEE , 1997, 1319-1324 p.Conference paper (Refereed)
  • 204.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Smith, Mark T.
    Location Augmented Mobile Computing and Communication Systems1997In: Proc. Third Asia-Pacific Conference on Communications (APCC’97), 1997, 827-831 p.Conference paper (Refereed)
  • 205.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Smith, Mark T.
    Location Based Personal Mobile Computing and Communication1998In: Proceedings of 9th IEEE Workshop on Local and Metropolitan Area Networks, IEEE , 1998, 23-24 p.Conference paper (Refereed)
  • 206.
    Beadle, H.W.P.
    et al.
    Wollongong University.
    Maguire Jr., Gerald Q.
    KTH, Superseded Departments, Teleinformatics.
    Smith, Mark T.
    Using location and environment awareness in mobile communications1997In: Proceedings of the International Conference on Information, Communications and Signal Processing, ICICS, IEEE , 1997, 1781-1785 p.Conference paper (Refereed)
    Abstract [en]

    We are investigating the use of badge based wearable computers to create highly mobile location and environment aware systems. When coupled to intelligent servers the badges provide an unparalleled platform for human centred information environments. This paper describes the architecture of the badge, its distributed computing environment, and presents initial results of application development trials conducted by a class of telecommunications students at KTH.

  • 207.
    Becker, Kalle
    KTH, Superseded Departments, Teleinformatics.
    Calling your mailbox1998Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This paper presents how the company for whom this work was preformed should act to add an email reading feature to their platform. It also includes an evaluation of the usability of such a system (called Popeye).

    A field trial with Popeye was carried out, and also analyzed to understand both how users want to use this kind of service and also to evaluate speech technology in such applications.

    This paper also briefly describes the platform and why it is a good idea to use Microsoft Transaction Server (MTS) together with COM when building large systems in a Windows NT environment.

    Two different approaches to creation of this feature are discussed and the design of a COM interface was done. This interface will let voice mail vendors connect with the system and this will minimize the hardware that the telecom operators will have to buy and maintain.

    The solution I prefer is the one that means that the company has to build a complete new product. This solution will be harder to implement but I think that it will give the company the most benefits in the end. My conclusions can be read in chapter 5.

  • 208. Beckman, C.
    et al.
    Borg, J.
    Johansson, J.
    Tecsor, Irina
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Design Considerations for the EISCAT_3D Phased Array Antenna2014In: 8th European Conference on Antennas and Propagation, EuCAP 2014, IEEE , 2014, 1700-1704 p.Conference paper (Refereed)
    Abstract [en]

    This paper presents a background and an overview of the initial design considerations for phased array antenna being designed for the New Generation multi-static, incoherent-scatter radar station - EISCAT-3D - in Northern Scandinavia. Its anticipated electrical, mechanical and environmental design requirements are given both by the physics as well as by the extreme climate in the subarctic region of northern Scandinavia.

  • 209.
    Beermann, Mikael
    KTH, Superseded Departments, Teleinformatics.
    Implementation of the Mobile Floating Agent Technique1996Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The computer has undergone an explosive development since they first arrived. Today nearly everybody uses computers more or less frequently. The trend is now that everyone has a little computer connected to others in a network. The computing power has become more decentralized, and therefore the need for communication has increased. Another thing that has changed the pattern is that the computers has become so small that it is no longer any problem to move them as long as one does not care about the network support, but of course one would like to have both the mobility and the network support.

    In my master thesis project I have implemented and evaluated parts of a new approach for dealing with the problems with mobility. This approach is called the mobile floating agent technique, and was developed by George Y. Liu at Ericsson Radio Systems AB, Kista. The main idea behind this is to have floating agents in the network, i.e. software entities that are virtually floating around in the network, arranging files and resources for the mobile user so that he can connect to a server in his neighbourhood, instead of connecting to his own server far away.  I have implemented a simple file system testbed that uses the floating agent technique for caching purposes. There are two reasons for doing this implementation. The reason is for evaluation of the caching features, and the second reason is to have a platform to implement more advanced agent functions on.

    The design of the system has been done in an object oriented style, and the implementation has been done in C++.The system consists of two parts. One part is the client software, which has been implemented in another project, but modified by me, and runs on aPC with the Windows95 OS. The other part is the network part of the system, i.e. the part of the system that is not running in the client, is made for running on an UNIX station. The network part of the system consists of two parts itself. There are mobile floating agent managers, that manages the whole system, and agents, that serves the mobile clients, and communicates with both the client software and the mobile floating agent managers.

    In the evaluation part of the project I have compared the delay acquired when accessing a file in a remote network with and without an agent. I finally came to the conclusion that the gain won with the use of caches in the agents is maybe not as large that one should use caching as the primary object of the agents.

  • 210.
    Beermann, Mikael
    KTH, Superseded Departments, Teleinformatics.
    Implementation of the Mobile Floating Agent Technique1996Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The computer has undergone an explosive development since they first arrived. Today nearly everybody uses computers more or less frequently. The trend is now that everyone has a little computer connected to others in a network. The computing power has become more decentralized, and therefore the need for communication has increased. Another thing that has changed the pattern is that the computers has become so small that it is no longer any problem to move them as long as one does not care about the network support, but of course one would like to have both the mobility and the network support.

    In my master thesis project I have implemented and evaluated parts of a new approach for dealing with the problems with mobility. This approach is called the mobile floating agent technique, and was developed by George Y. Liu at Ericsson Radio Systems AB, Kista. The main idea behind this is to have floating agents in the network, i.e. software entities that are virtually floating around in the network, arranging files and resources for the mobile user so that he can connect to a server in his neighbourhood, instead of connecting to his own server far away.

    I have implemented a simple file system testbed that uses the floating agent technique for caching purposes. There are two reasons for doing this implementation. The reason is for evaluation of the caching features, and the second reason is to have a platform to implement more advanced agent functions on.

    The design of the system has been done in an object oriented style, and the implementation has been done in C++.The system consists of two parts. One part is the client software, which has been implemented in another project, but modified by me, and runs on aPC with the Windows95 OS. The other part is the network part of the system, i.e. the part of the system that is not running in the client, is made for running on an UNIX station. The network part of the system consists of two parts itself. There are mobile floating agent managers, that manages the whole system, and agents, that serves the mobile clients, and communicates with both the client software and the mobile floating agent managers.

    In the evaluation part of the project I have compared the delay acquired when accessing a file in a remote network with and without an agent. I finally came to the conclusion that the gain won with the use of caches in the agents is maybe not as large that one should use caching as the primary object of the agents.

  • 211. Behrooz, Alireza
    et al.
    Devlic, Alisa
    A Context-Aware Privacy Policy Language for Controlling Access to Context Information of Mobile Users2012In: Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers, Springer Berlin Heidelberg, 2012, 25-39 p.Conference paper (Refereed)
    Abstract [en]

    This paper introduces a Context-aware Privacy Policy Language (CPPL) that enables mobile users to control who can access their context information, at what detail, and in which situation by specifying their context-aware privacy rules. Context-aware privacy rules map a set of privacy rules to one or more user's situations, in which these rules are valid. Each time a user's situation changes, a list of valid rules is updated, leaving only a subset of the specified rules to be evaluated by a privacy framework upon arrival of a context query. In the existing context-dependent privacy policy languages a user's context is used as an additional condition parameter in a privacy rule, thus all the specified privacy rules have to be evaluated when a request to access a user's context arrives. Keeping the number of rules that need to be evaluated small is important because evaluation of a large number of privacy rules can potentially increase the response time to a context query. CPPL also enables rules to be defined based on a user's social relationship with a context requestor, which reduces the number of rules that need to be defined by a user and that consequently need to be evaluated by a privacy mechanism. This paper shows that when compared to the existing context-dependent privacy policy languages, this number of rules (that are encoded using CPPL) decreases with an increasing number of user-defined situations and requestors that are represented by a small number of social relationship groups.

  • 212.
    Bektesevic, Edin
    KTH, Superseded Departments, Teleinformatics.
    Embedded Linux for Purposes of Internet Appliances: (a.k.a. ‘The Wanderer Project’)1999Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    As the Internet continues to grow, now new Internet appliances are being marketed. At the same time, Linux is gradually becoming a competitive choice for desktop, server and embedded applications. How do these two facts relate to each other? What should be the position of Linux in Internet appliances, and how interesting is Linux? Where are the Internet appliances really positioned in terms of their needs for an operating system? How is Linux implemented in embedded applications?

    These are just some of the questions posed during this MSc. Project that this report aims to answer. In addition, we will examine how Linux is used in embedded applications and what it provides in terms of achieving their goals. Also, we will take a look at the compression methods that can be used for system size reduction and analyze their costs.

    The report will show that Linux is a competitive alternative for devices like WebPAD, that it leaves space for further time and cost efficient improvements, and that Internet appliances can get most of the benefits of Linux during its further evolution relatively cheaply.

  • 213.
    Bellagamba, Elisa
    et al.
    Ericsson Research.
    Andersson, Loa
    Ericsson AB.
    Sköldström, Pontus
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Network Systems Laboratory (NS Lab).
    Ward, Dave
    Drake, John
    Configuration of Pro-Active Operations, Administration, and Maintenance (OAM) Functions for MPLS-based Transport Networks using LSP Ping2013Other (Other (popular science, discussion, etc.))
  • 214. Bellagamba, Elisa
    et al.
    Kempf, James
    Sköldström, Pontus
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture (Closed 20120101), Telecommunication Systems Laboratory, TSLab (closed 2012-01-01).
    Link Failure Detection and Traffic Redirection in an Openflow Network2010Patent (Other (popular science, discussion, etc.))
    Abstract [en]

    Failure detection and traffic redirection are implemented in an OpenFlow switch. Link failure detection packets, such as Bidirectional Forwarding Detection (BFD) packets, are periodically sent out on links to peer OpenFlow switches, such as via the Multi-protocol Label Switching (MPLS) Transport Profile (MPLS-TP). Link failure detection packets are received from the peer OpenFlow switches on the links, and monitored. A link failure is detected if no incoming link failure detection packets are received on a link for a predetermined interval. In the event of a link failure, traffic is redirected from the failed link to a backup link by altering entries on a flow table of the OpenFlow switch.

  • 215.
    Bellalta, Boris
    et al.
    Universitat Pompeu Fabra, Barcelona, Spain.
    Barcelo, Jaume
    Universidad Carlos III, Madrid, Spain.
    Staehle, Dirk
    University of Wurzburg, Wurzburg, Germany.
    Vinel, Alexey
    Department of Communications Engineering, Tampere University of Technology, Tampere, Finland.
    Oliver, Miquel
    Universitat Pompeu Fabra, Barcelona, Spain.
    On the performance of packet aggregation in IEEE 802.11ac MU-MIMO WLANs2012In: IEEE Communications Letters, ISSN 1089-7798, Vol. 16, no 10, 1588-1591 p.Article in journal (Refereed)
    Abstract [en]

    Multi-user spatial multiplexing combined with packet aggregation can significantly increase the performance of Wireless Local Area Networks (WLANs). In this letter, we present and evaluate a simple technique to perform packet aggregation in IEEE 802.11ac MU-MIMO (Multi-user Multiple Input Multiple Output) WLANs. Results show that in non-saturation conditions both the number of active stations (STAs) and the queue size have a significant impact on the system performance. If the number of STAs is excessively high, the heterogeneity of destinations in the packets contained in the queue makes it difficult to take full advantage of packet aggregation. This effect can be alleviated by increasing the queue size, which increases the chances of scheduling a large number of packets at each transmission, hence improving the system throughput at the cost of a higher delay. © 1997-2012 IEEE.

  • 216.
    Bellalta, Boris
    et al.
    Universitat Pompeu Fabra, Barcelona, Spain.
    Belyaev, Evgeny
    Tampere University of Technology, Finland.
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Performance evaluation of IEEE 802.11p-enabled vehicular video surveillance system2014In: IEEE Communications Letters, ISSN 1089-7798, Vol. 18, no 4, 708-711 p.Article in journal (Refereed)
    Abstract [en]

    Prospective IEEE 802.11p-based vehicular surveillance system, where video from the vehicle on-board camera is transmitted to the management center, is considered. Multi-hop transmission from the vehicle to the nearest roadside unit and then-via other roadside units-to the gateway is addressed. In this letter we assess the feasibility of such system by analyzing the video end-to-end distortion for a target vehicle, located several hops away from the gateway, when it is alone or there are also other vehicles transmitting video. We demonstrate the importance of dynamic adaptation of the video bit rate of each vehicle depending on the number and positions of the participating vehicles. © 2014 IEEE.

  • 217.
    Bellalta, Boris
    et al.
    Department of Information Technologies and Communications, Universitat Pompeu Fabra, Barcelona, Spain.
    Faridi, Azadeh
    Department of Information Technologies and Communications, Universitat Pompeu Fabra, Barcelona, Spain.
    Staehle, Dirk
    Department of Computer Science, University of Würzburg, Würzburg, Germany.
    Barcelo, Jaume
    Department of Information Technologies and Communications, Universitat Pompeu Fabra, Barcelona, Spain.
    Vinel, Alexey
    Department of Electronics and Communication Engineering, Tampere University of Technology, Tampere, Finland.
    Oliver, Miquel
    Department of Information Technologies and Communications, Universitat Pompeu Fabra, Barcelona, Spain.
    Performance analysis of CSMA/CA protocols with multi-packet transmission2013In: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 57, no 14, 2675-2688 p.Article in journal (Refereed)
    Abstract [en]

    Wireless objects equipped with multiple antennas are able to simultaneously transmit multiple packets by exploiting the channel's spatial dimensions. In this paper, we study the benefits of such Multiple Packet Transmission (MPT) approach, when it is used in combination with a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol for fully interconnected networks, addressing the interactions between the two mechanisms and showing the performance gains that can be achieved. To this end, a very simple Media Access Control (MAC) protocol that captures the fundamental properties and tradeoffs of a CSMA/CA channel access protocol supporting MPT is introduced. Using this protocol as a reference, a new analytical model is presented for the case of non-saturated traffic sources with finite buffer space. Simulation results show that the analytical model is able to accurately characterize the steady-state behavior of the reference protocol for different number of antennas and different traffic loads, providing a useful tool for understanding the performance gains achieved by MAC protocols supporting MPT. © 2013 Elsevier B.V. All rights reserved.

  • 218.
    Bellalta, Boris
    et al.
    Pompeu Fabra University, Barcelona, Spain.
    Vinel, Alexey
    Chatzimisios, Periklis
    Alexander Technological Educational Institute of Thessaloniki, Thessaloniki, Greece.
    Bruno, Raffaele
    Istituto di Informatica e Telematica (IIT) / Consiglio Nazionale delle Ricerche (CNR), Pisa, Italy.
    Wang, Chonggang
    InterDigital Communications, King of Prussia, PA, USA.
    Research advances and standardization activities in WLANs2014In: Computer Communications, ISSN 0140-3664, E-ISSN 1873-703X, Vol. 39, 1-2 p.Article in journal (Refereed)
  • 219.
    Bellalta, Boris
    et al.
    Universitat Pompeu Fabra, Barcelona, Spain.
    Vinel, AlexeyDepartment of Communications Engineering, Tampere University of Technology, Finland.Jonsson, MagnusHalmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).Barcelo, JaumeUniversitat Pompeu Fabra, Barcelona, Spain.Maslennikov, RomanUniversity of Nizhny Novgorod, Russia.Chatzimisios, PeriklisAlexander Technological Educational Institute of Thessaloniki Sindos, Greece.Malone, DavidNational University of Ireland, Maynooth, Ireland.
    Multiple Access Communications: 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012. Proceedings2012Conference proceedings (editor) (Refereed)
    Abstract [en]

    The proceedings contain 18 papers. The topics discussed include: network coding as a WiMAX link reliability mechanism; initialization procedure of wireless network coding with hierarchical decode and forward strategy in random connectivity networks; a coded DHA FH OFDMA system with a noncoherent ML detector under multitone jamming; analysis of inter-RSU beaconing interference in VANETs; survey of energy efficient tracking and localization techniques in buildings using optical and wireless communication media; network coding as a WiMAX link reliability mechanism: an experimental demonstration; spectrum sensing with USRP-E110; power control for wireless networks with a limited number of channels; a measurement study for predicting throughput from LQI and RSSI; reality considerations when designing a TDMA-FDMA based link-layer for real-time WSN; and wireless groupcast routing with palette of transmission methods.

  • 220.
    Bellalta, Boris
    et al.
    Universitat Pompeu Fabra, Barcelona, Spain .
    Vinel, Alexey
    Department of Communications Engineering, Tampere University of Technology, Tampere, Finland.
    Oliver, Miquel
    Universitat Pompeu Fabra, Barcelona, Spain .
    An upper-bound queueing model for Multi-rate Downlink SDMA systems2010In: 2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT 2010, 2010, 1212-1217 p.Conference paper (Refereed)
  • 221.
    Bellalta, Boris
    et al.
    Universitat Pompeu Fabra, Barcelona, Spain.
    Zocca, Alessandro
    Eindhoven University of Technology, Eindhoven, The Netherlands.
    Cano, Cristina
    Hamilton Institute, Maynooth, Ireland.
    Checco, Alessandro
    Hamilton Institute, Maynooth, Ireland.
    Barcelo, Jaume
    Universitat Pompeu Fabra, Barcelona, Spain.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Throughput Analysis in CSMA/CA Networks Using Continuous Time Markov Networks: A Tutorial2014In: Wireless Networking for Moving Objects / [ed] Ivan Ganchev, Marília Curado, Andreas Kassler, Cham: Springer, 2014, 115-133 p.Chapter in book (Refereed)
    Abstract [en]

    This book chapter introduces the use of Continuous Time Markov Networks (CTMN) to analytically capture the operation of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) networks. It is of tutorial nature, and it aims to be an introduction on this topic, providing a clear and easy-to-follow description. To illustrate how CTMN can be used, we introduce a set of representative and cutting-edge scenarios, such as Vehicular Ad-hoc Networks (VANETs), Power Line Communication networks and multiple overlapping Wireless Local Area Networks (WLANs). For each scenario, we describe the specific CTMN, obtain its stationary distribution and compute the throughput achieved by each node in the network. Taking the per-node throughput as reference, we discuss how the complex interactions between nodes using CSMA/CA have an impact on system performance.

  • 222.
    Beltramelli, Luca
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Österberg, Patrik
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Jennehag, Ulf
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Hybrid MAC Mechanism for Energy Efficient Communication in IEEE 802.11ah2017In: Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT), IEEE, 2017, 1295-1300 p., 7915550Conference paper (Refereed)
    Abstract [en]

    Many applications for machine-to-machine (M2M) communications are characterized by large numbers of devices with sporadic transmissions and subjected to low energy budgets. This work addresses the importance of energy consumption by proposing a new Medium Access Control (MAC) mechanism for improving the energy efficiency of IEEE 802.11ah, a standard targeting M2M communication. We propose to use the features of IEEE 802.11ah MAC to realize a hybrid contention-reservation mechanism for the transmission of uplink traffic. In the proposed mechanism, any device with a buffered packet will first notify the Access Point (AP) during a contention phase before being given a reserved timeslot for the data transmission. We develop a mathematical model to analyse the energy consumption ofthe proposed mechanism and of IEEE 802.11ah. The results show that for a monitoring scenario, the proposed contention reservation mechanism reduces the energy consumption for a successful uplink data transmission by up to 55%.

  • 223. Beltran, M
    et al.
    Deng, L
    Pang, Xiaodan
    RISE ACREO AB.
    Zhang, X
    Arlunno, V
    Zhao, Y
    Yu, X
    Llorente, R
    Liu, D
    Tafur Monroy, I
    Single- and Multiband OFDM Photonic Wireless Links in the 75-110 GHz Band EmployingOptical Combs2012In: IEEE Photonics Journal, Vol. 4, no 5, 2027-2036 p.Article in journal (Refereed)
  • 224. Beltrán, Marta
    et al.
    Deng, Lei
    Pang, Xiaodan
    RISE ACREO AB.
    Zhang, Xu
    Arlunno, Valeria
    Zhao, Ying
    Yu, Xianbin
    Llorente, Roberto
    Liu, Deming
    Tafur Monroy, Idelfonso
    38.2-Gb/s Optical-Wireless Transmission in 75-110 GHz Based on Electrical OFDM with Optical Comb Expansion2012In: Optical Fiber Communication Conference, 2012Conference paper (Refereed)
  • 225.
    Belyaev, Evgeny
    et al.
    Department of Signal Processing, Tampere University of Technology, Tampere, Finland.
    Molchanov, Pavlo
    Department of Signal Processing, Tampere University of Technology, Tampere, Finland.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Department of Electronics and Communication Engineering, Tampere University of Technology, Tampere, Finland.
    Koucheryavy, Yevgeni
    Department of Electronics and Communication Engineering, Tampere University of Technology, Tampere, Finland.
    The Use of Automotive Radars in Video-Based Overtaking Assistance Applications2013In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 14, no 3, 1035-1042 p., 649464Article in journal (Refereed)
    Abstract [en]

    Overtaking on rural roads may cause severe accidents when oncoming traffic is detected by a driver too late, or its speed is underestimated. Recently proposed cooperative overtaking assistance systems are based on real-time video transmission, where a video stream captured with a camera installed at the windshield of a vehicle is compressed, broadcast through the wireless channel, and displayed to the drivers of vehicles driving behind. In such a system, it is of ultimate importance to deliver video information about the opposite lane with low end-to-end latency and good visual quality. In this paper, we propose reallocating the wireless channel resources in favor of the part of the captured video frame containing the image of the oncoming vehicle. To achieve this goal, we apply automotive radar for oncoming vehicle detection, and we use the image of this vehicle as a region-of-interest (ROI) for the video rate control. We present the theoretical framework, which describes the basics of such an approach and can serve as a useful guideline for the future practical implementation of the overtaking assistance systems. The benefits of our proposal are demonstrated in relation to the practical scenario of H.264/Advance Video Coding (AVC), IEEE 802.11p/Wireless Access for Vehicular Environments (WAVE) intervehicle communication standards, and currently used automotive radars.

  • 226.
    Belyaev, Evgeny
    et al.
    Technical University of Denmark, Lyngby, Denmark.
    Moreschini, Sergio
    Tampere University of Technology, Tampere, Finland.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Uncoordinated multi-user video streaming in VANETs using Skype2017In: 2017 IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2017Conference paper (Refereed)
    Abstract [en]

    Real-time video delivery in Vehicle-to-Infrastructure (V2I) scenario enables a variety of multimedia vehicular services. We conduct experiments with Dedicated Short Range Communications (DSRC) transceivers located in the mutual proximity and exchanging Skype video calls traffic. We demonstrate that the lack of coordination between the users both at the application as well as Medium Access Control (MAC) layers results in problems with quality of service provisioning even for the setup without vehicular mobility. © Copyright 2017 IEEE

  • 227.
    Belyaev, Evgeny
    et al.
    Tampere University of Technology, Tampere, Finland.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Poster: Target Packet Loss Selection for Inter-Packet Loss Protection for Video Streaming Over VANETs2014In: 2014 IEEE Vehicular Networking Conference (VNC) / [ed] Falko Dressler, Onur Altintas, Suman Banerjee, Björn Scheuermann & David Eckhoff, Piscataway, N.J.: IEEE Press, 2014, 197-198 p.Conference paper (Refereed)
    Abstract [en]

    This work is dedicated to a live video streaming in vehicular networks where the application-based inter-packet forward error correction is used for the packet loss protection. A practical way to apply such a protection at the video encoder side for the unknown channel loss rate is proposed. Experimental results which demonstrate the performance for the proposed approach for a scalable extension of the H.264/AVC standard (H.264/SVC) and for the non-standardized video codec based on three-dimensional discrete wavelet transform (3-D DWT) are provided.

  • 228.
    Belyaev, Evgeny
    et al.
    Tampere University of Technology, Tampere, Finland .
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Tampere University of Technology, Tampere, Finland.
    Egiazarian, Karen
    Tampere University of Technology, Tampere, Finland.
    Koucheryavy, Yevgeni
    Tampere University of Technology, Tampere, Finland.
    Power Control in See-Through Overtaking Assistance System2013In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 17, no 3, 612-615 p., 6423758Article in journal (Refereed)
    Abstract [en]

    In recently proposed cooperative overtaking assistance systems a video stream captured by a windshield-mounted camera in a vehicle is compressed and broadcast to the vehicle driving behind it, where it is displayed to the driver. It has been shown that this system can provide robust operation if video codec channel adaptation is undertaken by exploiting information from the cooperative awareness messages about any forthcoming increases in the multiple access channel load. In this letter we demonstrate the gains achievable in system performance when the video transmitter power control is also used. © 1997-2012 IEEE.

  • 229.
    Belyaev, Evgeny
    et al.
    Tampere University of Technology, Tempere, Finland.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Sjöberg, Katrin
    Volvo GTT, Göteborg, Sweden.
    Live video streaming in IEEE 802.11p vehicular networks: Demonstration of an automotive surveillance application2014In: Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on, Piscataway, United States: IEEE Press, 2014, 131-132 p.Conference paper (Refereed)
    Abstract [en]

    Prospective IEEE 802.11p-enabled automotive video applications are identified. Preliminary experimental results of inter-vehicular live video streaming for surveillance applications are presented. A test-bed for the demonstration of the achievable visual quality under different channel conditions is described.

  • 230.
    Belyaev, Evgeny
    et al.
    Tampere University of Technology, Tampere, Finland.
    Vinel, Alexey
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Surak, Adam
    Tampere University of Technology, Tampere, Finland.
    Gabbouj, Moncef
    Tampere University of Technology, Tampere, Finland.
    Jonsson, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Egiazarian, Karen
    Tampere University of Technology, Tampere, Finland.
    Robust vehicle-to-infrastructure video transmission for road surveillance applications2015In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 64, no 7, 2991-3003 p.Article in journal (Refereed)
    Abstract [en]

    IEEE 802.11p vehicle-to-vehicle and vehicle-to-infrastructure communication technology is currently an emerging research topic in both industry and academia. Respective spectrum allocation of 10 MHz channels in the 5.9 GHz band for USA and Europe allows considering inter-vehicle transmission of a live video information as a basis, which enables a new class of safety and infotainment automotive applications such as road video surveillance. This paper is first of its kind where such a video transmission system is developed and experimentally validated. We propose a low-complexity unequal packet loss protection and rate control algorithms for a scalable video coding based on the three-dimensional discrete wavelet transform. We show that in comparison with a scalable extension of the H.264/AVC standard the new codec is less sensitive to packet losses, has less computational complexity and provides comparable performance in case of unequal packet loss protection. It is specially designed to cope with severe channel fading typical for dynamic vehicular environments and has a low complexity, making it a feasible solution for real-time automotive surveillance applications. Extensive measurements obtained in realistic city traffic scenarios demonstrate that good visual quality and continuous playback is possible when the moving vehicle is in the radius of 600 meters from the roadside unit. ©2014 IEEE

  • 231.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    A low complexity antenna diversity receiver for OFDM based systems2001In: IEEE International Conference on Communications, 2001, 1147-1151 p.Conference paper (Refereed)
    Abstract [en]

    A low complexity antenna diversity architecture with a new combining technique suitable for orthogonal frequency division (OFDM) based systems is introduced in this paper. For a two branch antenna diversity, this structure requires only one FFT at the receiver and allows optimum maximum ratio combining. For systems with a higher number of antennas, the number of required FFTs when using such technique is reduced by half as compared to the conventional case where a different FFT is used for each receive antenna. As a result a considerable reduction in processing complexity is obtained especially for systems with high number of subcarriers. This method can also be seen as a way of increasing the number of antennas in OFDM transceivers without any major complexity increase. Thus, a considerable increase in diversity gain can be achieved

  • 232.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Bounds on the Distribution of a Sum of Independent Lognormal Random Variables2001In: IEEE Transactions on Communications, ISSN 0090-6778, E-ISSN 1558-0857, Vol. 49, no 6, 975-978 p.Article in journal (Refereed)
    Abstract [en]

    The distribution function of a sum of lognormal random variables (RVs) appears in several communication problems. Approximations are usually used for such distribution as no closed form nor bounds exist. Bounds can be very useful in assessing the performance of any given system. In this letter, we derive upper and lower bounds on the distribution function of a sum of independent lognormal RVs. These bounds are given in a closed form and can be used in studying the performance of cellular radio and broadcasting systems.

  • 233.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Channel estimation for HIPERLAN/2 with transmitter diversity2002Conference paper (Refereed)
  • 234.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Channel estimation for HIPERLAN/2 with transmitter diversity2002In: 2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, 26-30 p.Conference paper (Refereed)
    Abstract [en]

    In this paper we propose a channel estimation technique for OFDM based systems, such as HIPERLAN/2 and IEEE 802.11a, with transmitter diversity. The proposed technique estimates all channel frequency responses, corresponding to each transmitter and receiver antenna pair, required for space-time processing In this OFDM based system. This technique is able to extract the channel state Information for two transmitter antennas using the same preamble as defined in the standard of HIPERLAN/2. The feasibility of this channel estimation method Is made possible by exploiting the structure of the OFDM modulation scheme. The results showed that the accuracy provided by this proposed method is comparable to that obtained when a single transmitter antenna is used.

  • 235.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Channel estimation for OFDM based systems with transmitter diversity2002In: 2002 IEEE International Conference on Systems, Man and Cybernetics,, 2002, 397-402 p.Conference paper (Refereed)
  • 236.
    Ben Slimane, Slimane
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Peak-to-average power ratio reduction of OFDM signals using broadband pulse shaping2002In: IEEE 56TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2002, VOLS 1-4, PROCEEDINGS, 2002, 889-893 p.Conference paper (Refereed)
    Abstract [en]

    Orthogonal Frequency Division Multiplexing (OFDM) techniques allow the transmission of high data rates over broadband radio channels subject to multipath fading without the need for powerful channel equalization. However, they are very sensitive to nonlinear effects due to the high Peak-to-Average Power Ratio (PAPR) owned by the transmitted signal. This paper proposes an efficient technique for reducing the PAPR of OFDM signals. The proposed technique is very effective and flexible. The method avoids the use of extra Inverse Fast Fourier Transformations (IFFTs) as was done in some previously published techniques but instead is based on a proper selection of the time waveforms of the different sub-carriers of the OFDM modulation scheme. Thus, its implementation complexity is much low in comparison to the previous published methods. A closed form relation between the maximum PAPR and the used pulse shaping waveform is derived. The obtained results show that with broadband pulse shaping, the PAPR of OFDM modulated signals can be made very close to that of single carrier signals. The improved statistics of the PAPR in the transmitted signal is demonstrated through numerical results for some sets of time waveforms. The significant improvement in PAPR given by the present technique permits to reduce the complexity and cost of the transmitter significantly. In that, pulse shaping can be used not only to shape the spectrum of the transmitted signal but also to reduce its PAPR.

  • 237.
    Ben Slimane, Slimane
    et al.
    KTH, Superseded Departments, Signals, Sensors and Systems.
    Janssen, G.J.M.
    Delft University.
    Power optimization of M-PSK cochannel signals for a narrowband multiuser detector2001In: IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings, 2001, 247-250 p.Conference paper (Refereed)
    Abstract [en]

    An analytical method is presented to determine the optimum received power values for multiple cochannel multilevel phase-shift-keying (M-PSK) modulated signals. The aim is to achieve equal symbol error probability (SEP) for each of the signals when applying a narrowband multiuser detector based on successive cancellations. Power relations based on two approximations are derived and used to compute the average SEP for the different cochannel signals. The derived power relations are also compared against optimum power relations obtained through computer simulations

  • 238.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    A doubly stochastic Poisson model for self-similar traffic1995In: IEEE International Conference on Communications, 1995, 456-460 p.Conference paper (Refereed)
    Abstract [en]

    This paper presents a data traffic model capable of describing the long-range dependence and self-similar burstiness structure found in measurement studies of packet data traffic. The model introduced is based on doubly stochastic Poisson processes. The intensity of arrivals is modeled as a continuous stochastic process. This process satisfies most of the properties found in the measurement studies, namely long-range dependence and self-similarity. The generality and simplicity of this model makes it attractive in data traffic modeling

  • 239.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Coded quadrature pulse-overlapping modulation techniques for personal communications1992In: 1st International Conference on Universal Personal Communications, 1992. ICUPC '92 Proceedings, 1992, 11-03/1-11-03/5 p.Conference paper (Refereed)
    Abstract [en]

    Hard-limited quadrature pulse-overlapping modulation (QPOM) techniques have a constant envelope, good spectral properties and good performance especially in fading channels. These modulation techniques are suitable to applications using nonlinear or saturated power amplifiers to obtain high power and bandwidth efficiencies. A technique to combine convolutional codes and QPOM schemes to further improve its performance in fading channels is introduced and evaluated. At first, the QPOM scheme is decomposed into an encoder followed by a memoryless modulator. Then, the binary convolutional encoder is concatenated to the QPOM encoder and considered as one entity to be optimized. Performance of the coded QPOM scheme is analyzed and compared to uncoded QPOM and coded QPSK schemes

  • 240.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    IJF-OQPSK modulation schemes with MLSE receivers for portable/mobile communications1992Conference paper (Refereed)
    Abstract [en]

    A receiver structure for constant enveloped IJF-OQPSK modulation under fading channel conditions is introduced. Its performance in AWGN and Rayleigh fading channels was analyzed and verified by computer simulations. Results show the relation between the performance of the system and the memory introduced by the double-interval overlapping pulse shape. By properly using this memory, it is possible to achieve superior performance compared to conventional schemes. Even though no coding has been used, comparable results to coded schemes was obtained with no extra redundancy. Therefore, the complexity caused by multilevel modulation can be avoided, and transmission of signals with compact spectrum and good performance is possible. The constant envelope, compact spectrum, superior performance in fading channels and low complexity make the hardlimited IJF-OQPSK scheme a good choice for portable/mobile communications, to achieve low cost, small size, and high power and bandwidth efficiencies

  • 241.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Maximum likelihood sequence estimation of quadrature pulse-overlapping modulated signals for portable/mobile satellite1992In: IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, E-ISSN 1558-0008, Vol. 10, no 8Article in journal (Refereed)
  • 242.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Performance of 16-QAM signals on a fading mobile satellite channel1994In: AEU - International Journal of Electronics and Communications, ISSN 1434-8411, E-ISSN 1618-0399, Vol. 48, no 2, 68-75 p.Article in journal (Refereed)
  • 243.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Performance of 16-QPOM signals on a fading mobile satellite channel1993In: Proceedings of the IEEE Global Telecommunications Conference, IEEE , 1993, 1787-1791 p.Conference paper (Refereed)
    Abstract [en]

    Presents the bit error probability of 16-QPOM schemes over mobile satellite shadowed Rician fading channels. An upper bound on the pairwise error probability is derived, and then combined with the transfer function bounding technique. The derived upper bound is given in a closed form without the need of any numerical integration. This upper bound is then used to evaluate the performance of both linear and hard-limited 16-QPOM signals. Simulation results are also performed to verify the analytical results

  • 244.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Performance of 16-QPOM signals on a fading mobile satellite channel1993In: Proceedings of the IEEE 1993 Pacific Rim Conference on Communications, Computers and Signal Processing, 1993, 674-677 p.Conference paper (Refereed)
    Abstract [en]

    The authors present a maximum likelihood sequence estimation (MLSE) receiver structure for both linear and hard-limited 16-quadrature pulse overlapping modulation (QPOM) schemes. Using this structure, the performance of these schemes over shadowed Rician fading channels is studied. The structure of linear 16-QPOM schemes allowed the use of independent decoding for in-phase and quadrature components of the transmitted signal, thus reducing considerably the complexity of the MLSE receiver. The hard-limited 16-QPOM scheme used two hard-limited QPOM schemes in parallel. It is shown that an optimum MLSE receiver for this type of signal needs to consider both in-phase and quadrature components at the same time. Using the MLSE receiver, both schemes outperform conventional coherent 16-quadrature amplitude modulation (QAM)

  • 245.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Performance of quadrature pulse-overlapping modulated signals in Rayleigh fading channels1991In: IEEE Global Telecommunications Conference and Exhibition, 1991, 1802-1806 p.Conference paper (Refereed)
    Abstract [en]

    The authors discuss the average bit error probability of constant envelope quadrature pulse-overlapping modulation and maximum likelihood Viterbi decoding in a Rayleigh fading channel. The quadrature pulse-overlapping modulation is first decomposed into a linear encoder followed by a memoryless modulator. An upper bound on the average bit error probability as a function of the transfer function of the linear encoder is then developed under the assumption of using the Viterbi decoder with perfect fading amplitude measurement. Tightness of the bound was examined by means of computer simulation. A performance comparison with conventional quadrature phase shift keying is also provided

  • 246.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Quadrature Pulse-Overlapping Modulation Techniques1994In: Coded-Modulation Techniques for Fading Channels / [ed] S. Hamidreza Jamali, Tho Le-Ngoc, Kluwer Academic Publishers , 1994Chapter in book (Refereed)
  • 247.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Tight Bounds on the Error Probability of Coded Modulation Schemes in Rayleigh Fading Channels1995In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 44, no 1, 121-130 p.Article in journal (Refereed)
  • 248.
    Ben Slimane, Slimane
    et al.
    Concordia University.
    Le-Ngoc, Tho
    Concordia University.
    Tight bounds on the error probability of coded modulation schemes in Rayleigh fading channels1994Conference paper (Refereed)
    Abstract [en]

    This paper presents a tight upper bound on the bit error performance of coded modulation schemes in Rayleigh fading channels. Upper and lower bounds on the pairwise error probability are first derived. The upper bound is then expressed in a product form to be used with the transfer function bounding technique. This upper bound has the same simplicity as the union-Chernoff bound while providing closer results to the exact expression. Examples for 4-state and 8-state TCM 8PSK schemes are also given to illustrate the tightness and the application of this upper bound

  • 249. Bengtsson, Hoai
    et al.
    Chen, Lei
    Voronov, Alexey
    Englund, Cristofer
    RISE, Swedish ICT, Viktoria.
    Interaction Protocol for Highway Platoon Merge2015In: Intelligent Transportation Systems (ITSC), 2015 IEEE 18th International Conference on, 2015Conference paper (Refereed)
  • 250.
    Bennani, Zakaria
    KTH, Superseded Departments, Teleinformatics.
    Quality of Service Support for Wireless LANs2000Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    As the research and development of mobile computing is becoming increasingly interesting and important to corporations and private users, great efforts are being made to ensure that the wireless network technology is being developed to match the performance level showed by wired network technologies. Introducing wireless mobile computing into already existing and operational situations, that have up to date been taken care of with wired technology, should not mean a degradation of the existing performance level. In other words, there should not be any decrease in the quality of service experienced by the end users due to the mobility or wireless factor.

    When developing quality of service support mechanisms that use characteristics specific to the Internet Protocol, considerations have to be made to make certain that the solutions and implementations developed will be deployable with the next generation Internet Protocol, IPv6. Since the ever decreasing address space in IPv4 is becoming more and more of a problem, at some point migration to IPv6 has to be made. Therefore, this thesis will base its developments on the use of IPv6.

    The thesis concerns the problem of providing statistical QoS guarantees for multimedia applications running over a wireless LAN such as WaveLAN. Using the DiffServ model and support of IPv6, we develop mechanisms for managing QoS and mobility. With the use of pre-connection schemes and a domain routing approach, Mobile Node mobility and Handoffs are handled in such a way to diminish latencies that occur when in-LAN and cross-LAN handoffs are made. To handle QoS guarantees, a bandwidth broker placed in the Access Points manages bandwidth allocations for different cells and configures the traffic parameters of each mobile so that the usage of the wireless MAC layer is controlled. The border router is connected via ATM to core routers in several places in France. Experimentation on the platform involves a DIS application (Distributed Interactive Simulation) running at different sites.

    The development work is done on FreeBSD systems in C.

2345678 201 - 250 of 3161
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf