Vous êtes sur la page 1sur 5

1.

An Optimal Scheduling Algorithm for Maximizing Throughput in WiMAXMesh Networks


Chih-Yung Chang; Ming-Hsien Li; Wen-Chuan Huang; Shih-Chieh Lee
Systems Journal, IEEE
Year: 2015, Volume: 9, Issue: 2
Pages: 542 - 555, DOI: 10.1109/JSYST.2013.2271386
IEEE Journals & Magazines
The WiMAX mesh network (WMN) architecture is defined in the IEEE 802.16 standard for increasing
network coverage and improving communication performance. In the past few years, several greedy or
heuristic algorithms have been proposed to cope with the scheduling problem in WMNs. However, their
performance highly depends on the network topology and bandwidth requests, and they do not achieve
optimal performance in all cases. This paper proposes an optimal scheduling algorithm called the
scheduling algorithm with dynamic programming approach (SADP), which exploits the opportunities of
spatial reuse and maximizes the network throughput based on the network topology and the uplink
bandwidth requests of each subscriber station. In addition, a heuristic scheduling algorithm (HSA) is
proposed to reduce the computing complexity. The performance results were approximate to the optimal
results. The simulation study reveals that the proposed SADP provides the WMN with maximal throughput
and shortest transmission time, and the proposed HSA likely achieves the optimal results.
2. On Mobility and Sleep-Mode Power-Saving Mechanisms in IEEE 802.16e/m Mobile Networks
Caishi Huang; Chin-Tau Lea; Wong, A.K.-S.
Systems Journal, IEEE
Year: 2015, Volume: 9, Issue: 3
Pages: 694 - 702, DOI: 10.1109/JSYST.2013.2285612
IEEE Journals & Magazines
Abstract
Sleep-mode power-saving mechanisms introduced by IEEE 802.16e/m aim to save power. Existing
studies on the sleep-mode performance only assume the intra-Base Station (BS) movement for a mobile
station. How the sleep-mode operation affects the handover and, sequentially, the power-saving efficiency
when the inter-BS movement is frequent has not been carefully investigated. In this paper, we develop an
analytical model describing the operation of various versions of IEEE 802.16e/m sleep-mode powersaving mechanisms and study their connection dropping probabilities and energy saving efficiencies. We
show that existing sleep-mode mechanisms do not work well and often lead to frequent connection drops
and low power-saving efficiency when mobility is high. Based on insights provided by the analytical model,
we propose to use the dynamic BS cluster scheme to improve the performance of the existing sleep-mode
schemes. The simulation results show that the proposed scheme can effectively solve the connection
dropping problem and, sequentially, significantly improve the power-saving efficiency even when the interBS crossing is frequent.

3. Compact Quad-Band Bandpass Filter for DCS/WLAN/WiMAX/5G Wi-Fi Application


Zhang, Y.; Gao, L.; Zhang, X.Y.
Microwave and Wireless Components Letters, IEEE
Year: 2015, Volume: PP, Issue: 99
Pages: 1 - 1, DOI: 10.1109/LMWC.2015.2463227
IEEE Early Access Articles
This letter presents a compact quad-band bandpass filter for DCS/WLAN/WiMAX/5G Wi-Fi applications. It
utilizes two resonators. One is a multi-stub-loaded resonator operating at the first, second and fourth
passband frequencies. The other one is a short-end stub-loaded resonator used to yield the third
passband. Among the four passbands, the highest one is designed to cover a wide bandwidth (5.155.85
GHz) for 5G Wi-Fi applications. The design procedures are discussed in detail and the simulated and
measured results are presented.
4. The fuzzy-controller for WiMAX networks
Semenova, O.; Semenov, A.; Voznyak, O.; Mostoviy, D.; Dudatyev, I.
Control and Communications (SIBCON), 2015 International Siberian Conference on
Year: 2015
Pages: 1 - 4, DOI: 10.1109/SIBCON.2015.7147214
IEEE Conference Publications
WiMAX is a broadband wireless last mile technology providing high speeds for long distances and offering
great flexibility. Scheduling in WiMAX became one of the most important tasks, because it is responsible
for distributing available resources among users. A high level of quality of service and scheduling support
is one of the most interesting features of the WiMAX standard. In modern telecommunication networks the
access control techniques are widely used. That is because using such devices instead of traditional ones
permits to increase accuracy and reliability of control. Fuzzy systems have replaced conventional
techniques in many engineering applications, especially in control systems. In the article it is suggested to
use a fuzzy controller for access control in WiMAX networks that allows avoiding congestion in networks.
The main objective of this work is providing an implementation of the WiMAX standard using the dynamic
fuzzy logic based priority scheduler. We propose to use a fuzzy controller having three input and one
output linguistic variables. Input linguistic variables of the controller are waiting time, queue length and
packet size, its output variable is priority. A block diagram of the fuzzy controller was developed. Linguistic
variables, terms and membership functions for input and output values have been defined. The Waiting

time linguistic variable has three terms: low, medium, high. The Queue length linguistic variable has three
terms: short, medium, long. The Packet size linguistic variable has three terms: small, medium, large. The
rules base consisting of twenty-seven rules has been developed. The fuzzy controller has been simulated
using Matlab 6.5. Results of the simulation prove the accuracy and reliability of the fuzzy-controller's
model.

5. Routing in Internet of Vehicles: A Review


Cheng, J.; Cheng, J.; Zhou, M.; Liu, F.; Gao, S.; Liu, C.
Intelligent Transportation Systems, IEEE Transactions on
Year: 2015, Volume: PP, Issue: 99
Pages: 1 - 14, DOI: 10.1109/TITS.2015.2423667
IEEE Early Access Articles
This work aims to provide a review of the routing protocols in the Internet of Vehicles (IoV) from routing
algorithms to their evaluation approaches. We provide five different taxonomies of routing protocols. First,
we classify them based on their transmission strategy into three categories: unicast, geocast, and
broadcast ones. Second, we classify them into four categories based on information required to perform
routing: topology-, position-, map-, and path-based ones. Third, we identify them in delay-sensitive and
delay-tolerant ones. Fourth, we discuss them according to their applicability in different dimensions, i.e., 1D, 2-D, and 3-D. Finally, we discuss their target networks, i.e., homogeneous and heterogeneous ones. As
the evaluation is also a vital part in IoV routing protocol studies, we examine the evaluation approaches,
i.e., simulation and real-world experiments. IoV includes not only the traditional vehicular ad hoc networks,
which usually involve a small-scale and homogeneous network, but also a much larger scale and
heterogeneous one. The composition of classical routing protocols and latest heterogeneous network
approaches is a promising topic in the future. This work should motivate IoV researchers, practitioners,
and new comers to develop IoV routing protocols and technologies.
6. Snitch: Design and development of a mobile robot for surveillance and reconnaissance
Karthikeyan, R.; Karthik, S.; Prasanna Vishal TR; Vignesh, S.
Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International
Conference on
Year: 2015
Pages: 1 - 4, DOI: 10.1109/ICIIECS.2015.7193127
IEEE Conference Publications

This paper describes a novel robot named Snitch capable of climbing walls, scaling horizontal and vertical
surfaces while automatically controlling surface transitions, and provides the controlling user with
surveillance of its location. Unlike other wall-climbing robots currently available using vacuum suction
technique and magnetic prosthesis, Snitch uses Microsuction Cups to provide adhesive force to traverse
across varied surfaces. The proposed model is also capable of capturing real-time images, video and
audio to provide surveillance over a person or area. A Raspberry Pi processor is used to control the robot
via a Wi-Fi network for a flawless data processing and transmission. This robot is suitable for military
applications like monitoring a person or place of interest, provide tactical advantage in hostile grounds or
during hostage situations.

7. A study on the possibility to use Raspberry Pi as a console server for remote access to devices in
virtual learning environments
Kyuchukova, Diyana; Hristov, Georgi; Zahariev, Plamen; Borisov, Svilen
Information Technology Based Higher Education and Training (ITHET), 2015 International Conference on
Year: 2015
Pages: 1 - 4, DOI: 10.1109/ITHET.2015.7217968
IEEE Conference Publications
During the last years many virtual laboratories have been developed, but not all of them were successfully
adopted. Designing, planning and creating a virtual laboratory can be a very difficult process, which can
get even more complicated if the laboratory has to provide access to real equipment. One of the most
problematic steps when developing such virtual laboratories is the selection of the right access method. At
the present moment of time there are many technologies that allow users to access devices remotely. One
of these possible solutions is to use the Telnet/SSH protocols for remote access. Nevertheless, the use of
these protocols require at least one active network interface per device, which in some cases can present
a problem. There are some other drawbacks of using Telnet/SSH for remote access as well - virtual
laboratories are often created with the purpose to be used in the education process, which means that the
users of these systems in most cases are students. These less experienced users might accidently delete
the configuration of the interface that is dedicated for the remote access, which will result in the immediate
loss of connection to the device and will require administrator intervention to fix this access issue. An
alternative solution to provide remote access is to use a console server. A detailed analysis on the
possibilities for remote access using console servers, present them as reliable, but also as a very
expensive solutions. In this paper we will investigate the possibilities to replace the expensive console
servers with much cheaper devices. One such device is the Raspberry Pi - a low cost device that was
developed to enhance the education process of children and students in the field of the computer
sciences and their related subjects. In this paper we will investigate and compare the characteristics of

the Raspberry Pi to the most widely used console servers and we will present a way to use
the Raspberry Pi as a console serve- for remote access to telecommunication routers and switches.

Vous aimerez peut-être aussi