9 research outputs found

    Energy-efficient Wi-Fi Gateways for Federated Residential Networks

    Get PDF

    Cooperative Energy-efficient Management of Federated WiFi Networks

    Get PDF
    The proliferation of overlapping, always-on IEEE 802.11 access points (APs) in urban areas, can cause inefficient bandwidth usage and energy waste. Cooperation among APs could address these problems by allowing underused devices to hand over their wireless stations to nearby APs and temporarily switch off, while avoiding to overload a BSS and thus offloading congested APs. The federated house model provides an appealing backdrop to implement cooperation among APs. In this paper, we outline a distributed framework that assumes the presence of a multipurpose gateway with AP capabilities in every household. Our framework allows cooperation through the monitoring of local wireless resources and the triggering of offloading requests toward other federated gateways. Our simulation results show that, in realistic residential settings, the proposed framework yields an energy saving between 45 and 86 percent under typical usage patterns, while avoiding congestion and meeting user expectations in terms of throughput. Furthermore, we show the feasibility and the benefits of our framework with a real test-bed deployed on commodity hardware

    Advertisement Delivery and Display in Vehicular Networks

    Get PDF
    The role of vehicles has been rapidly expanding to become a different kind of utility, no longer just vehicles but nodes of the future Internet. The car producers and the research community are investing considerable time and resources in the design of new protocols and applications that meet customer demand, or that foster new forms of interaction between the moving customers and the rest of the world. Among the variety of new applications and business models, the spreading of advertisements is expected to play a crucial role. Indeed, advertising is already a significant source of revenue and it is currently used over many communication channels, such as the Internet and television. In this paper, we address the targeting of advertisements in vehicular networks, where advertisements are broadcasted by Access Points and then displayed to interested users. In particular, we describe the advertisement dissemination process by means of an optimization model aiming at maximizing the number of advertisements that are displayed to users within the advertisement target area and target time period. We then solve the optimization problem on an urban area, using realistic vehicular traffic traces. Our results highlight the importance of predicting vehicles mobility and the impact of the user interest distribution on the revenue that can be obtained from the advertisement service

    A-VIP: Anonymous Verification and Inference of Positions in Vehicular Networks

    Get PDF
    MiniconferenceInternational audienceKnowledge of the location of vehicles and tracking of the routes they follow are a requirement for a number of applications, including e-tolling and liability attribution in case of accidents. However, public disclosure of the identity and position of drivers jeopardizes user privacy, and securing the tracking through asymmetric cryptography may have an exceedingly high computational cost. Additionally, there is currently no way an authority can verify the correctness of the position information provided by a potentially misbehaving car. In this paper, we address all of the issues above by introducing A-VIP, a lightweight framework for privacy preserving and tracking of vehicles. A-VIP leverages anonymous position beacons from vehicles, and the cooperation of nearby cars collecting and reporting the beacons they hear. Such information allows an authority to verify the locations announced by vehicles, or to infer the actual ones if needed. We assess the effectiveness of A-VIP through both realistic simulation and testbed implementation results, analyzing also its resilience to adversarial attacks

    Area Formation and Content Assignment for LTE Broadcasting

    Get PDF
    Broadcasting and multicasting services in LTE networks are shaping up to be an effective way to provide popular content. A key requirement is that cells are aggregated into areas where a tight time synchronization among transmissions is enforced, so as to broadcast the same radio resources. Our paper addresses a facet of LTE broadcasting that has so far received little attention: the creation of broadcasting areas and the assignment of content to them in order to efficiently exploit radio resources and satisfy user requests. Our original clustering approach, named Single-Content Fusion, achieves these goals by initially aggregating cells into single-content areas and maximizing cell similarity in content interests. Aggregated areas are then merged into multiple-content areas by virtue of similar spatial coverage. We show the validity of our solution pointing out the advantages it provides in comparison to other approaches. We also discuss the impact of various system factors (e.g., number of served users, broadcast data rate, area size) and the scalability of our proposal in large, realistic scenarios with both static and time-varying user interest

    Efficient area formation for LTE broadcasting

    No full text
    An effective way to provide popular content in LTE networks is through broadcast and multicast services (a.k.a. eMBMS). This requires to aggregate cells into areas where transmissions are synchronized in time so that each area broadcasts the same set of content items, on the same radio resources. We look at an aspect of LTE broadcasting that has been scarcely addressed so far: how to form broadcasting areas and assign content to them so that radio resources are efficiently exploited and user requests satisfied. Due to its high complexity, we solve the problem through an original clustering heuristics, named Single-Content Fusion (SCF), that initially aggregates cells into single-content areas by maximizing cell similarity in content interests. Such areas are then merged into multiple-content areas leveraging similarity in spatial coverage. The validity of our solution is shown by the excellent match with the optimum in a toy scenario and by the remarkable advantages SCF provides in large-scale, real-world scenarios, in comparison to other heuristic approaches

    LookUp: Enabling Pedestrian Safety Services via Shoe Sensing

    No full text
    Motivated by safety challenges resulting from distracted pedestrians, this paper presents a sensing technology for fine-grained location classification in an urban environment. It seeks to detect the transitions from sidewalk locations to in-street locations, to enable applications such as alerting texting pedestrians when they step into the street. In this work, we use shoe-mounted inertial sensors for location classification based on surface gradient profile and step patterns. This approach is different from existing shoe sensing solutions that focus on dead reckoning and inertial navigation. The shoe sensors relay inertial sensor measurements to a smartphone, which extracts the step pattern and the inclination of the ground a pedestrian is walking on. This allows detecting transitions such as stepping over a curb or walking down sidewalk ramps that lead into the street. We carried out walking trials in metropolitan environments in United States (Manhattan) and Europe (Turin). The results from these experiments show that we can accurately determine transitions between sidewalk and street locations to identify pedestrian risk
    corecore