468 research outputs found

    Optimal Content Downloading in Vehicular Networks

    Get PDF
    We consider a system where users aboard communication-enabled vehicles are interested in downloading different contents from Internet-based servers. This scenario captures many of the infotainment services that vehicular communication is envisioned to enable, including news reporting, navigation maps and software updating, or multimedia file downloading. In this paper, we outline the performance limits of such a vehicular content downloading system by modelling the downloading process as an optimization problem, and maximizing the overall system throughput. Our approach allows us to investigate the impact of different factors, such as the roadside infrastructure deployment, the vehicle-to-vehicle relaying, and the penetration rate of the communication technology, even in presence of large instances of the problem. Results highlight the existence of two operational regimes at different penetration rates and the importance of an efficient, yet 2-hop constrained, vehicle-to-vehicle relaying

    Energy-efficient Wi-Fi Gateways for Federated Residential Networks

    Get PDF

    Persistent Localized Broadcasting in VANETs

    Get PDF
    We present a communication protocol, called LINGER, for persistent dissemination of delay-tolerant information to vehicular users, within a geographical area of interest. The goal of LINGER is to dispatch and confine information in localized areas of a mobile network with minimal protocol overhead and without requiring knowledge of the vehicles' routes or destinations. LINGER does not require roadside infrastructure support: it selects mobile nodes in a distributed, cooperative way and lets them act as "information bearers", providing uninterrupted information availability within a desired region. We analyze the performance of our dissemination mechanism through extensive simulations, in complex vehicular scenarios with realistic node mobility. The results demonstrate that LINGER represents a viable, appealing alternative to infrastructure-based solutions, as it can successfully drive the information toward a region of interest from a far away source and keep it local with negligible overhead. We show the effectiveness of such an approach in the support of localized broadcasting, in terms of both percentage of informed vehicles and information delivery delay, and we compare its performance to that of a dedicated, state-of-the-art protoco

    Detection of a Stellar Stream Behind Open Cluster NGC 188: Another Part of the Monoceros Stream

    Full text link
    We present results from a WIYN/OPTIC photometric and astrometric survey of the field of the open cluster NGC 188 ((l,b) = (122.8\arcdeg, 22.5\arcdeg)). We combine these results with the proper-motion and photometry catalog of Platais et al. and demonstrate the existence of a stellar overdensity in the background of NGC 188. The theoretical isochrone fits to the color-magnitude diagram of the overdensity are consistent with an age between 6 and 10 Gyr and an intermediately metal poor population ([Fe/H] = -0.5 to -1.0). The distance to the overdensity is estimated to be between 10.0 and 12.6 kpc. The proper-motions indicate that the stellar population of the overdensity is kinematically cold. The distance estimate and the absolute proper motion of the overdensity agree reasonably well with the predictions of the Pe\~{n}arrubia et al. model of the formation of the Monoceros stream. Orbits for this material constructed with plausible radial-velocity values, indicate that dynamically, this material is unlikely to belong to the thick disk. Taken together, this evidence suggests that the newly-found overdensity is part of the Monoceros stream.Comment: accepted by A

    Macroscopic detection of the strong stochasticity threshold in Fermi-Pasta-Ulam chains of oscillators

    Full text link
    The largest Lyapunov exponent of a system composed by a heavy impurity embedded in a chain of anharmonic nearest-neighbor Fermi-Pasta-Ulam oscillators is numerically computed for various values of the impurity mass MM. A crossover between weak and strong chaos is obtained at the same value ϵT\epsilon_{_T} of the energy density ϵ\epsilon (energy per degree of freedom) for all the considered values of the impurity mass MM. The threshold \epsi lon_{_T} coincides with the value of the energy density ϵ\epsilon at which a change of scaling of the relaxation time of the momentum autocorrelation function of the impurity ocurrs and that was obtained in a previous work ~[M. Romero-Bastida and E. Braun, Phys. Rev. E {\bf65}, 036228 (2002)]. The complete Lyapunov spectrum does not depend significantly on the impurity mass MM. These results suggest that the impurity does not contribute significantly to the dynamical instability (chaos) of the chain and can be considered as a probe for the dynamics of the system to which the impurity is coupled. Finally, it is shown that the Kolmogorov-Sinai entropy of the chain has a crossover from weak to strong chaos at the same value of the energy density that the crossover value ϵT\epsilon_{_T} of largest Lyapunov exponent. Implications of this result are discussed.Comment: 6 pages, 5 figures, revtex4 styl

    A simple topological model with continuous phase transition

    Full text link
    In the area of topological and geometric treatment of phase transitions and symmetry breaking in Hamiltonian systems, in a recent paper some general sufficient conditions for these phenomena in Z2\mathbb{Z}_2-symmetric systems (i.e. invariant under reflection of coordinates) have been found out. In this paper we present a simple topological model satisfying the above conditions hoping to enlighten the mechanism which causes this phenomenon in more general physical models. The symmetry breaking is testified by a continuous magnetization with a nonanalytic point in correspondence of a critical temperature which divides the broken symmetry phase from the unbroken one. A particularity with respect to the common pictures of a phase transition is that the nonanalyticity of the magnetization is not accompanied by a nonanalytic behavior of the free energy.Comment: 17 pages, 7 figure

    Topological conditions for discrete symmetry breaking and phase transitions

    Full text link
    In the framework of a recently proposed topological approach to phase transitions, some sufficient conditions ensuring the presence of the spontaneous breaking of a Z_2 symmetry and of a symmetry-breaking phase transition are introduced and discussed. A very simple model, which we refer to as the hypercubic model, is introduced and solved. The main purpose of this model is that of illustrating the content of the sufficient conditions, but it is interesting also in itself due to its simplicity. Then some mean-field models already known in the literature are discussed in the light of the sufficient conditions introduced here

    Towards D2D-Enhanced Heterogeneous Networks

    Get PDF
    In this paper, we examine upcoming 5G networks where the support of device-to-device (D2D) communication is expected to be a key asset for operators and users alike. Firstly, we argue the need to functionally integrate D2D and infrastructure-to-device (I2D) modes. Next, we address practical issues such as integrated resource scheduling of D2D communication within heterogeneous networks, proposing an extension of the proportional fairness algorithm, which we call multi-modal proportional fairness (MMPF). We evaluate the impact of D2D in a two-tier scenario combining macro- and micro- coverage, finding that, although I2D retains a clear edge for general-purpose downloading, D2D is an appealing solution for localized transfers as well as for viral content

    A-VIP: Anonymous Verification and Inference of Positions in Vehicular Networks

    Get PDF
    MiniconferenceInternational audienceKnowledge of the location of vehicles and tracking of the routes they follow are a requirement for a number of applications, including e-tolling and liability attribution in case of accidents. However, public disclosure of the identity and position of drivers jeopardizes user privacy, and securing the tracking through asymmetric cryptography may have an exceedingly high computational cost. Additionally, there is currently no way an authority can verify the correctness of the position information provided by a potentially misbehaving car. In this paper, we address all of the issues above by introducing A-VIP, a lightweight framework for privacy preserving and tracking of vehicles. A-VIP leverages anonymous position beacons from vehicles, and the cooperation of nearby cars collecting and reporting the beacons they hear. Such information allows an authority to verify the locations announced by vehicles, or to infer the actual ones if needed. We assess the effectiveness of A-VIP through both realistic simulation and testbed implementation results, analyzing also its resilience to adversarial attacks

    A Holistic View of ITS-Enhanced Charging Markets

    Get PDF
    We consider a network of electric vehicles (EVs) and its components: vehicles, charging stations, and coalitions of stations. For such a setting, we propose a model in which individual stations, coalitions of stations, and vehicles interact in a market revolving around the energy for battery recharge. We start by separately studying 1) how autonomously operated charging stations form coalitions; 2) the price policy enacted by such coalitions; and 3) how vehicles select the charging station to use, working toward a time/price tradeoff. Our main goal is to investigate how equilibrium in such a market can be reached. We also address the issue of computational complexity, showing that, through our model, equilibria can be found in polynomial time. We evaluate our model in a realistic scenario, focusing on its ability to capture the advantages of the availability of an intelligent transportation system supporting the EV drivers. The model also mimics the anticompetitive behavior that charging stations are likely to follow, and it highlights the effect of possible countermeasures to such a behavior
    corecore