{"title":"A Placement Strategy for Accurate TOA Localization Algorithm","authors":"Yousi Zheng, Hang Wang, Lei Wan, Xiaofeng Zhong","doi":"10.1109/CNSR.2009.34","DOIUrl":"https://doi.org/10.1109/CNSR.2009.34","url":null,"abstract":"Nowadays, localization information is widely used in various location-dependant applications in Ad Hoc, wireless sensor networks (WSN), and other communication networks. Meanwhile, localization algorithm is becoming an important issue in wireless communication research. As one important part in localization algorithms, placement strategy can be simply used in real wireless communication networks. In this paper, we analyze the effect of beacon nodes placement strategy on location estimation accuracy. Based on this analysis, a placement strategy which can propose more accurate location estimation is proposed. This placement strategy need no additional hardware, and can be easily implemented. We also offer some simulation results based on Time of Arrival (TOA) algorithm to confirm the advantage of the placement strategy.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122969594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TCP Dynamics and Adaptive MAC Retry-Limit Aware Link-Layer Adaptation over IEEE 802.11 WLAN","authors":"Amir Shadmand, M. Shikh-Bahaei","doi":"10.1109/CNSR.2009.38","DOIUrl":"https://doi.org/10.1109/CNSR.2009.38","url":null,"abstract":"In this paper, we have developed a cross-layer approach which combines real-time Retry-Limit (RTL)adaptation at Medium Access Control (MAC) layer, with Transport Control Protocol (TCP) dynamics aware link adaptation at link-layer in IEEE 802.11 wireless local area networks (WLANs). TCP throughput can be enhanced by raising the ¿¿¿, but latency and bandwidth overheads due to retransmission increase with ¿¿¿ and additional control traffic must flow to request retransmissions. Thus, dynamic optimization of Retry-Limit setting within MAC layer is considered in conjunction with link adaptation based on the wireless channel conditions, traffic characteristic, and by invoking the knowledge of TCP protocols in order to achieve higher throughput at low frame loss rate.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121207645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moussa Ouedraogo, H. Mouratidis, D. Khadraoui, E. Dubois
{"title":"A Risk Based Approach for Security Assurance Evaluation of IT Systems","authors":"Moussa Ouedraogo, H. Mouratidis, D. Khadraoui, E. Dubois","doi":"10.1109/CNSR.2009.74","DOIUrl":"https://doi.org/10.1109/CNSR.2009.74","url":null,"abstract":"Research literature has argued the need for a methodology to measure security assurance levels of a system as vital in order to maintain and improve the overall system security. This paper proposes a risk-based security assurance metric and aggregation techniques to be incorporated in a methodology for the evaluation of IT systems security assurance.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128650182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measurement of MPEG-2 Video Streams through a Differentiated Service Domain","authors":"Shihyon Park, J. DeDourek","doi":"10.1109/CNSR.2009.17","DOIUrl":"https://doi.org/10.1109/CNSR.2009.17","url":null,"abstract":"There is growing popularity of real-time Internet traffic such as audio and video streams. Such traffic benefits from receiving a different level of service from the network than more traditional data traffic. Schemes for providing differing network service for different applications have been proposed under the name QoS (Quality of Service). We investigate the performance of one such scheme by using a testbed to transmit both video and data traffic. In this paper we report on measurement techniques used in the testbed to report on performance and describe several problems and their solution.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128469740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message-Streams Oriented Hybrid Slot Allocation Protocol for Tactical Data Link System","authors":"Wen-zheng Wang, Jing-lun Zhou, Long Zheng, P. Luo","doi":"10.1109/CNSR.2009.39","DOIUrl":"https://doi.org/10.1109/CNSR.2009.39","url":null,"abstract":"This paper presents a Message-streams Oriented Hybrid Slot Allocation Protocol (MOHSAP) for tactical data link system that combines a collision-free static slot allocation algorithm and a contention based dynamic slot allocation algorithm while retaining the advantages of each. For fixed message streams (FMS), this contains the key information generally in tactical data link system, MOHSAP assigns permanent slots by static slot allocation algorithm off-line to guarantee Quality of Service (QoS). For random message streams (RMS), MOHSAP uses its dynamic allocation mechanism to reuse bandwidth that would otherwise be wasted by a static slot allocation mechanism. Simulation results demonstrate that our proposed protocol can combine the advantages of two fundamentally different design philosophies without suffering from their drawbacks and meet the requirements of the QoS in tactical data link system.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"557 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117237064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optical Access-Metro Network Architecture Based on Passive Access and Burst-Mode Transmission","authors":"C. Roger, J. Orozco, P. Niger","doi":"10.1109/CNSR.2009.18","DOIUrl":"https://doi.org/10.1109/CNSR.2009.18","url":null,"abstract":"A network architecture that integrates several WDM PON access segments in a metropolitan area network and uses optical circuit/burst switching is presented here. This architecture targets the delivery of very high speed end to end optical communications between the edge nodes connecting the end users. The combination of circuit switching and burst transmission allows the simultaneous delivery of real-time applications (VoIP, Video) and other data-oriented applications (Internet, peer-to-peer). In the proposed architecture there is a clear separation of the functions in data plane and a control plane. A centralized control entity manages the overall architecture. A dedicated aggregation node acts as a gateway to external networks. After a presentation of the proposed network architecture, this paper focuses on the performance evaluation of the control plane using simulation. Our results show that the queuing delay remains acceptable even under heavy traffic loads.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"9 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Mizanian, Reza Hajisheykhi, M. Baharloo, A. Jahangir
{"title":"RACE: A Real-Time Scheduling Policy and Communication Architecture for Large-Scale Wireless Sensor Networks","authors":"K. Mizanian, Reza Hajisheykhi, M. Baharloo, A. Jahangir","doi":"10.1109/CNSR.2009.84","DOIUrl":"https://doi.org/10.1109/CNSR.2009.84","url":null,"abstract":"In wireless sensor networks (WSN), individual sensor nodes are inherently unreliable and have very limited capabilities to ensure real-time properties. In fact, one of the most predominant limitations in wireless sensor networks is energy consumption, which hinders the capacity of the network to provide real-time guarantees (e.g. low duty-cycles, low transmission range). Many approaches have been proposed to deal with energy/latency trade-offs, but they are likely to be insufficient for the applications where reduced delay guarantee is the main concern. We present and evaluate a packet scheduling policy and routing algorithm called RACE that inherently accounts for time constraints. We show that this algorithm is particularly suitable for communication in sensor networks in which a large number of wireless devices are seamlessly integrated into a physical space to perform real-time monitoring and control. Detailed simulations of representative sensor network environments demonstrate that RACE significantly reduces the end-to-end deadline and miss ratio in the sensor network. Also RACE will balance load and energy consumption of network and life time of network will be increased.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126642463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianfei Liu, Jia-yu Liu, Tingting Zhang, Jing-chun Li
{"title":"Application of Cross-Correlation Algorithm in Radio Weak Signal Detection","authors":"Jianfei Liu, Jia-yu Liu, Tingting Zhang, Jing-chun Li","doi":"10.1109/CNSR.2009.78","DOIUrl":"https://doi.org/10.1109/CNSR.2009.78","url":null,"abstract":"Signal detection in low signal to noise ratio (SNR) is widely concerned. In this paper, an algorithm for weak signals detection based on Cross-correlation analysis is proposed. The simulation results show that this algorithm is a fairly effective method for improving the ratios of signal to noise. Using this algorithm in radio monitoring, we can raise the sensitivity of the monitoring system and extend the regional coverage of the radio base station.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127263822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Routing in Wireless Sensor Networks through Virtual Backbone","authors":"S. Hussain, Mubashsharul Shafique","doi":"10.1109/CNSR.2009.82","DOIUrl":"https://doi.org/10.1109/CNSR.2009.82","url":null,"abstract":"In this work we construct a graph model for a dense Wireless Sensor Network (WSN) in an industrial facility and investigate energy efficient routing path for network communication. The main objective is to conserve the overall energy of network so that it can last longer. We used Connected Dominating Set (CDS) because it provides smaller network backbone compared to Minimum Spanning Tree (MST). We designed a distributed CDS construction algorithm. The simulation results show that the proposed algorithm creates more efficient CDS as compared to the traditional CDS generating algorithm such as BFS.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"1992 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers","authors":"Joaquín García, M. Barbeau, E. Kranakis","doi":"10.1109/CNSR.2009.23","DOIUrl":"https://doi.org/10.1109/CNSR.2009.23","url":null,"abstract":"We provide in this paper three algorithms that enable the sensor nodes of a Wireless Sensor Network (WSN) to determine their location in presence of neighbor sensors that may lie about their position. Our algorithms minimize the number of trusted nodes required by regular nodes to complete their process of localization. The algorithms always work for a given number of neighbors provided that the number of liars is below a certain threshold value, which is also determined.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120973051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}