Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Li-Hsing Yen is active.

Publication


Featured researches published by Li-Hsing Yen.


ad hoc networks | 2006

Expected k-coverage in wireless sensor networks

Li-Hsing Yen; Chang Wu Yu; Yang-Min Cheng

We are concerned with wireless sensor networks where n sensors are independently and uniformly distributed at random in a finite plane. Events that are within a fixed distance from some sensor are assumed to be detectable and the sensor is said to cover that point. In this paper, we have formulated an exact mathematical expression for the expected area that can be covered by at least k out of n sensors. Our results are important in predicting the degree of coverage a sensor network may provide and in determining related parameters (sensory range, number of sensors, etc.) for a desired level of coverage. We demonstrate the utility of our results by presenting a node scheduling scheme that conserves energy while retaining network coverage. Additional simulation results have confirmed the accuracy of our analysis. � 2005 Elsevier B.V. All rights reserved.


IEEE Communications Magazine | 2005

Topology-aided cross-layer fast handoff designs for IEEE 802.11/mobile IP environments

Chien-Chao Tseng; Li-Hsing Yen; Hung-Hsin Chang; Kai-Cheng Hsu

This study first reviews state-of-the-art fast handoff techniques for IEEE 802.11 or Mobile IP networks. Based on that review, topology-aided cross-layer fast handoff designs are proposed for Mobile IP over IEEE 802.1.1 networks. Time-sensitive applications, such as voice over IP (VoIP), cannot tolerate the long layer-2 plus layer-3 handoff delays that arise in IEEE 802.11/Mobile IP environments. Cross-layer designs are increasingly adopted to shorten the handoff latency time. Handoff-related layer-2 triggers may reduce the delay between layer-2 handoff completion and the associated layer-3 handoff activation. Cross-layer topology information, such as the association between 802.11 access points and Mobile IP mobility agents, together with layer-2 triggers, can be utilized by a mobile node to start layer-3 handoff-related activities, such as agent discovery, address configuration, and registration, in parallel with or prior to those of layer-2 handoff. Experimental results indicate that the whole handoff. delay can meet the delay requirement of VoIP applications when layer-3 handoff activities occur prior to layer-2 handoffs.


IEEE Internet Computing | 2009

Load Balancing in IEEE 802.11 Networks

Li-Hsing Yen; Tse-Tsung Yeh; Kuang-Hui Chi

Because wireless stations independently select which access points to camp on, the total wireless station traffic on all available IEEE 802.11 network APs might be unevenly distributed. This load-balancing problem can lead to overloading and network congestion. This survey examines the problem, along with state-of-the-art network- and wireless-station-based solutions. It also presents experimental results using off-the-shelf IEEE 802.11 devices. As the results show, effectively balancing AP traffic loads can increase overall system throughputs.


IEEE Transactions on Vehicular Technology | 2011

Stability and Fairness of AP Selection Games in IEEE 802.11 Access Networks

Li-Hsing Yen; Jia-Jun Li; Che-Ming Lin

Wireless stations (WSs) in an IEEE 802.11 access network compete with each other for collective bandwidth offered by access points (APs). The competition involves selecting an AP with the consideration of potential link rate and workload status. From the perspective of system, a good AP selection policy should be stable, increase overall system throughput, and maintain bandwidth fairness among WSs. This paper models AP selections under the framework of game theory, where each WSs sole goal is to maximize its achievable throughput. The achievable throughput depends on not only the number of WSs that associate with the same AP but the set of link rates these WSs use as well. It is not a monotonically decreasing function of WS population when considering the effect of performance anomaly. We have proven the stability of this game (Nash equilibrium) and shown that selfish behavior of individual WSs in fact improves overall bandwidth fairness among WSs. Thorough simulations were conducted to demonstrate the validity of the analytical results and compare the performance of the proposed game with that of counterparts.


Mobile Networks and Applications | 1997

A protocol for causally ordered message delivery in mobile computing systems

Li-Hsing Yen; Ting-Lu Huang; Shu-Yuen Hwang

There is a growing trend in developing applications for mobile computing systems in which mobile host computers retain their network connections while in transit. This paper proposes an algorithm that enforces a useful property, namely, causal ordering, that delivers messages among mobile hosts. This property ensures that causally related messages directed to the same destination will be delivered in an order consistent with their causality, which is important in applications that involve human interaction such as mobile e‐mail and mobile teleconferencing. Such applications are envisioned by the proponents of Personal Communications Services (PCS). Without this property, users may receive and read original messages and the corresponding replies out of order. Our algorithm, when compared with previous proposals, provides an alternative with a low handoff cost, medium message overhead, and low probability of unnecessary inhibition in delivering messages.


mobile adhoc and sensor systems | 2004

Link probability, network coverage, and related properties of wireless ad hoc networks

Li-Hsing Yen; Chang Wu Yu

This paper has analyzed link probability, expected node degree, expected number of links, and expected area collectively covered by a finite number of nodes in wireless ad hoc networks. Apart from the formulation of exact mathematical expressions for these properties, we have disclosed two fundamental results: (1) Every possible link has an equal probability of occurrence. (2) It is the border effects that makes two links probabilistically dependent. Simulation results show that our analysis predicts related measure with accuracy.


wireless communications and networking conference | 2014

OpenNet: A simulator for software-defined wireless local area network

Min-Cheng Chan; Chien Chen; Jun-Xian Huang; Ted Kuo; Li-Hsing Yen; Chien-Chao Tseng

This study is motivated by a plan to install a software-defined wireless local area network (SDWLAN) on campus, which possesses a desired property that both data flow and device behaviors can be software-definable. Because the installation involves hundreds of access points, we must conduct simulations beforehand to verify the design and scalability of the target system. However, existing SDN simulator like Mininet does not support modeling of wireless channel and mobility. On the other hand, common network simulator like ns-3 only has limited support for software-defined controllers and does not fully implement handover process. We thus develop OpenNet, which connects Mininet to ns3 to enjoy both Mininets advantage of controller compatibility and ns-3s ability in the wireless/mobility modeling. OpenNet also complements ns-3 by adding probe mechanism, which is missing in the current ns-3 implementation. Our simulation result demonstrates the effectiveness of OpenNet.


Computer Communications | 2010

The room shortage problem of tree-based ZigBee/IEEE 802.15.4 wireless networks

Li-Hsing Yen; Wei-Ting Tsai

A number of IEEE 802.15.4 devices can form a tree topology as proposed by ZigBee specification. The ability to confine the shape and extent of the tree serves as the basis for address configuration and packet routing. This paper identifies the room shortage problem in tree-based ZigBee networks, which refers to the phenomenon that some devices are unable to get addresses while many addresses are still left unused. Room shortage problem occurs when pre-allocated address space does not well match the underlying physical topology. To alleviate the problem, we developed three alternatives to the standard addressing mechanism. These approaches manage address space with flexibility yet still support tree-based routing. Performance evaluations indicate that proposed approaches provide different levels of tradeoff between the ratio of addressable devices and storage overhead.


Wireless Personal Communications | 2009

Range-Based Sleep Scheduling (RBSS) for Wireless Sensor Networks

Li-Hsing Yen; Yang-Min Cheng

Sleep scheduling in a wireless sensor network is the process of deciding which nodes are eligible to sleep (enter power-saving mode) after random deployment to conserve energy while retaining network coverage. Most existing approaches toward this problem require sensor’s location information, which may be impractical considering costly locating overheads. This paper proposes range-based sleep scheduling (RBSS) protocol which needs sensor-to-sensor distance but no location information. RBSS attempts to approach an optimal sensor selection pattern that demands the fewest working (awake) sensors. Simulation results indicate that RBSS is comparable to its location-based counterpart in terms of coverage quality and the reduction of working sensors.


international conference on communications | 2003

An OVSF Code assignment scheme utilizing multiple Rake combiners for W-CDMA

Li-Hsing Yen; Ming-Chun Tsou

Orthogonal variable spreading factor (OVSF) codes have been proposed as the channelization codes used in the wideband CDMA access technology of IMT-2000. OVSF codes have the advantage of supporting variable bit rate services, which is important to emerging multimedia applications. The objective of OVSF code assignment algorithm is to minimize the probability of code request denial due to inappropriate resource allocation. In this paper, we propose an efficient OVSF code assignment scheme that utilizes multiple Rake combiners in user equipments. Our approach finds in constant time all feasible codewords for any particular request, trying to minimize both rate wastage and code fragments. The simulation result shows that our scheme outperforms previous work in the probability of request denial. The code management overhead is also minimal in our scheme.

Collaboration


Dive into the Li-Hsing Yen's collaboration.

Top Co-Authors

Avatar

Chien-Chao Tseng

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Kuang-Hui Chi

National Yunlin University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Min-Cheng Chan

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Che-Ming Lin

National University of Kaohsiung

View shared research outputs
Top Co-Authors

Avatar

Chia-Liang Lin

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Ming-Hung Wang

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge