2009 Seventh Annual Communication Networks and Services Research Conference最新文献

筛选
英文 中文
A Placement Strategy for Accurate TOA Localization Algorithm 一种精确TOA定位算法的定位策略
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.34
Yousi Zheng, Hang Wang, Lei Wan, Xiaofeng Zhong
{"title":"A Placement Strategy for Accurate TOA Localization Algorithm","authors":"Yousi Zheng, Hang Wang, Lei Wan, Xiaofeng Zhong","doi":"10.1109/CNSR.2009.34","DOIUrl":"https://doi.org/10.1109/CNSR.2009.34","url":null,"abstract":"Nowadays, localization information is widely used in various location-dependant applications in Ad Hoc, wireless sensor networks (WSN), and other communication networks. Meanwhile, localization algorithm is becoming an important issue in wireless communication research. As one important part in localization algorithms, placement strategy can be simply used in real wireless communication networks. In this paper, we analyze the effect of beacon nodes placement strategy on location estimation accuracy. Based on this analysis, a placement strategy which can propose more accurate location estimation is proposed. This placement strategy need no additional hardware, and can be easily implemented. We also offer some simulation results based on Time of Arrival (TOA) algorithm to confirm the advantage of the placement strategy.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122969594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
TCP Dynamics and Adaptive MAC Retry-Limit Aware Link-Layer Adaptation over IEEE 802.11 WLAN 基于IEEE 802.11 WLAN的TCP动态和自适应MAC重试限制的链路层自适应
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.38
Amir Shadmand, M. Shikh-Bahaei
{"title":"TCP Dynamics and Adaptive MAC Retry-Limit Aware Link-Layer Adaptation over IEEE 802.11 WLAN","authors":"Amir Shadmand, M. Shikh-Bahaei","doi":"10.1109/CNSR.2009.38","DOIUrl":"https://doi.org/10.1109/CNSR.2009.38","url":null,"abstract":"In this paper, we have developed a cross-layer approach which combines real-time Retry-Limit (RTL)adaptation at Medium Access Control (MAC) layer, with Transport Control Protocol (TCP) dynamics aware link adaptation at link-layer in IEEE 802.11 wireless local area networks (WLANs). TCP throughput can be enhanced by raising the ¿¿¿, but latency and bandwidth overheads due to retransmission increase with ¿¿¿ and additional control traffic must flow to request retransmissions. Thus, dynamic optimization of Retry-Limit setting within MAC layer is considered in conjunction with link adaptation based on the wireless channel conditions, traffic characteristic, and by invoking the knowledge of TCP protocols in order to achieve higher throughput at low frame loss rate.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121207645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Risk Based Approach for Security Assurance Evaluation of IT Systems 基于风险的IT系统安全保障评估方法
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.74
Moussa Ouedraogo, H. Mouratidis, D. Khadraoui, E. Dubois
{"title":"A Risk Based Approach for Security Assurance Evaluation of IT Systems","authors":"Moussa Ouedraogo, H. Mouratidis, D. Khadraoui, E. Dubois","doi":"10.1109/CNSR.2009.74","DOIUrl":"https://doi.org/10.1109/CNSR.2009.74","url":null,"abstract":"Research literature has argued the need for a methodology to measure security assurance levels of a system as vital in order to maintain and improve the overall system security. This paper proposes a risk-based security assurance metric and aggregation techniques to be incorporated in a methodology for the evaluation of IT systems security assurance.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128650182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Measurement of MPEG-2 Video Streams through a Differentiated Service Domain 基于差异化服务域的MPEG-2视频流测量
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.17
Shihyon Park, J. DeDourek
{"title":"Measurement of MPEG-2 Video Streams through a Differentiated Service Domain","authors":"Shihyon Park, J. DeDourek","doi":"10.1109/CNSR.2009.17","DOIUrl":"https://doi.org/10.1109/CNSR.2009.17","url":null,"abstract":"There is growing popularity of real-time Internet traffic such as audio and video streams. Such traffic benefits from receiving a different level of service from the network than more traditional data traffic. Schemes for providing differing network service for different applications have been proposed under the name QoS (Quality of Service). We investigate the performance of one such scheme by using a testbed to transmit both video and data traffic. In this paper we report on measurement techniques used in the testbed to report on performance and describe several problems and their solution.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128469740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Message-Streams Oriented Hybrid Slot Allocation Protocol for Tactical Data Link System 战术数据链系统中面向消息流的混合槽分配协议
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.39
Wen-zheng Wang, Jing-lun Zhou, Long Zheng, P. Luo
{"title":"Message-Streams Oriented Hybrid Slot Allocation Protocol for Tactical Data Link System","authors":"Wen-zheng Wang, Jing-lun Zhou, Long Zheng, P. Luo","doi":"10.1109/CNSR.2009.39","DOIUrl":"https://doi.org/10.1109/CNSR.2009.39","url":null,"abstract":"This paper presents a Message-streams Oriented Hybrid Slot Allocation Protocol (MOHSAP) for tactical data link system that combines a collision-free static slot allocation algorithm and a contention based dynamic slot allocation algorithm while retaining the advantages of each. For fixed message streams (FMS), this contains the key information generally in tactical data link system, MOHSAP assigns permanent slots by static slot allocation algorithm off-line to guarantee Quality of Service (QoS). For random message streams (RMS), MOHSAP uses its dynamic allocation mechanism to reuse bandwidth that would otherwise be wasted by a static slot allocation mechanism. Simulation results demonstrate that our proposed protocol can combine the advantages of two fundamentally different design philosophies without suffering from their drawbacks and meet the requirements of the QoS in tactical data link system.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"557 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117237064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Optical Access-Metro Network Architecture Based on Passive Access and Burst-Mode Transmission 基于无源接入和突发模式传输的光接入-城域网络架构
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.18
C. Roger, J. Orozco, P. Niger
{"title":"Optical Access-Metro Network Architecture Based on Passive Access and Burst-Mode Transmission","authors":"C. Roger, J. Orozco, P. Niger","doi":"10.1109/CNSR.2009.18","DOIUrl":"https://doi.org/10.1109/CNSR.2009.18","url":null,"abstract":"A network architecture that integrates several WDM PON access segments in a metropolitan area network and uses optical circuit/burst switching is presented here. This architecture targets the delivery of very high speed end to end optical communications between the edge nodes connecting the end users. The combination of circuit switching and burst transmission allows the simultaneous delivery of real-time applications (VoIP, Video) and other data-oriented applications (Internet, peer-to-peer). In the proposed architecture there is a clear separation of the functions in data plane and a control plane. A centralized control entity manages the overall architecture. A dedicated aggregation node acts as a gateway to external networks. After a presentation of the proposed network architecture, this paper focuses on the performance evaluation of the control plane using simulation. Our results show that the queuing delay remains acceptable even under heavy traffic loads.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"9 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
RACE: A Real-Time Scheduling Policy and Communication Architecture for Large-Scale Wireless Sensor Networks RACE:大规模无线传感器网络的实时调度策略和通信体系结构
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.84
K. Mizanian, Reza Hajisheykhi, M. Baharloo, A. Jahangir
{"title":"RACE: A Real-Time Scheduling Policy and Communication Architecture for Large-Scale Wireless Sensor Networks","authors":"K. Mizanian, Reza Hajisheykhi, M. Baharloo, A. Jahangir","doi":"10.1109/CNSR.2009.84","DOIUrl":"https://doi.org/10.1109/CNSR.2009.84","url":null,"abstract":"In wireless sensor networks (WSN), individual sensor nodes are inherently unreliable and have very limited capabilities to ensure real-time properties. In fact, one of the most predominant limitations in wireless sensor networks is energy consumption, which hinders the capacity of the network to provide real-time guarantees (e.g. low duty-cycles, low transmission range). Many approaches have been proposed to deal with energy/latency trade-offs, but they are likely to be insufficient for the applications where reduced delay guarantee is the main concern. We present and evaluate a packet scheduling policy and routing algorithm called RACE that inherently accounts for time constraints. We show that this algorithm is particularly suitable for communication in sensor networks in which a large number of wireless devices are seamlessly integrated into a physical space to perform real-time monitoring and control. Detailed simulations of representative sensor network environments demonstrate that RACE significantly reduces the end-to-end deadline and miss ratio in the sensor network. Also RACE will balance load and energy consumption of network and life time of network will be increased.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126642463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Application of Cross-Correlation Algorithm in Radio Weak Signal Detection 相互关算法在无线电微弱信号检测中的应用
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.78
Jianfei Liu, Jia-yu Liu, Tingting Zhang, Jing-chun Li
{"title":"Application of Cross-Correlation Algorithm in Radio Weak Signal Detection","authors":"Jianfei Liu, Jia-yu Liu, Tingting Zhang, Jing-chun Li","doi":"10.1109/CNSR.2009.78","DOIUrl":"https://doi.org/10.1109/CNSR.2009.78","url":null,"abstract":"Signal detection in low signal to noise ratio (SNR) is widely concerned. In this paper, an algorithm for weak signals detection based on Cross-correlation analysis is proposed. The simulation results show that this algorithm is a fairly effective method for improving the ratios of signal to noise. Using this algorithm in radio monitoring, we can raise the sensitivity of the monitoring system and extend the regional coverage of the radio base station.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127263822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Energy Efficient Routing in Wireless Sensor Networks through Virtual Backbone 基于虚拟骨干网的无线传感器网络节能路由
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.82
S. Hussain, Mubashsharul Shafique
{"title":"Energy Efficient Routing in Wireless Sensor Networks through Virtual Backbone","authors":"S. Hussain, Mubashsharul Shafique","doi":"10.1109/CNSR.2009.82","DOIUrl":"https://doi.org/10.1109/CNSR.2009.82","url":null,"abstract":"In this work we construct a graph model for a dense Wireless Sensor Network (WSN) in an industrial facility and investigate energy efficient routing path for network communication. The main objective is to conserve the overall energy of network so that it can last longer. We used Connected Dominating Set (CDS) because it provides smaller network backbone compared to Minimum Spanning Tree (MST). We designed a distributed CDS construction algorithm. The simulation results show that the proposed algorithm creates more efficient CDS as compared to the traditional CDS generating algorithm such as BFS.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"1992 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers 有限真值者无线传感器网络中节点的安全定位
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.23
Joaquín García, M. Barbeau, E. Kranakis
{"title":"Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers","authors":"Joaquín García, M. Barbeau, E. Kranakis","doi":"10.1109/CNSR.2009.23","DOIUrl":"https://doi.org/10.1109/CNSR.2009.23","url":null,"abstract":"We provide in this paper three algorithms that enable the sensor nodes of a Wireless Sensor Network (WSN) to determine their location in presence of neighbor sensors that may lie about their position. Our algorithms minimize the number of trusted nodes required by regular nodes to complete their process of localization. The algorithms always work for a given number of neighbors provided that the number of liars is below a certain threshold value, which is also determined.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120973051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信