{"title":"Resolving the access conflict for shared Ethernet communication channel","authors":"Jihane Maslouh, A. Errami, M. Khaldoun","doi":"10.1109/NGNS.2014.6990232","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990232","url":null,"abstract":"In this paper, we will show how Medium Access Control (MAC) is responsible for managing access to the communication channel for wired network. To ensure efficient transmission, each system must employ a MAC mechanism to arbitrate access to the shared medium in order to avoid data collisions and the same time efficiently share the transmission bandwidth. The purpose of this article is to provide a clear view and understanding of the solution provided, how it allows a strategy to ensure the uniqueness of channel access with fixed and predefined priority to be set up for each communication devices, and how we can exploit the collisions avoiding retransmissions every time to get the channel. Moreover, demonstrate the efficiency of the solution by calculating the performance metrics. It is also our purpose to discuss further prospects of the solution described in this article in order to indicate the trend toward a wireless networks.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122175570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new prototype development modeling-simulation of sensor networks","authors":"N. Mitta, Rachid El Gouri, L. Hlou","doi":"10.1109/NGNS.2014.6990218","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990218","url":null,"abstract":"This paper presents a simulation prototype design for wireless sensor networks (WSNs). It allows the performance evaluation (e.g., packet delivery rate, transmission latency and energy consumption) at high level, but with elaborate models of the hardware and software of sensor nodes. Many hardware components are modeled and the IEEE 802.15.4 standard is implemented. The prototype uses a clock based synchronization mechanism to support simulations with cycle accurate communication and approximate time computation. The performances have been compared with NS-3 and we find that the similar result (deviation less than 5%) at the same abstraction level, and tow time faster than NS-3. Moreover, with a hardware and software co-simulation feature, we have more detailed modeling of sensor nodes.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"345 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130212387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Toulni, B. Nsiri, M. Boulmalf, M. Bakhouya, T. Sadiki
{"title":"An approach to avoid traffic congestion using VANET","authors":"H. Toulni, B. Nsiri, M. Boulmalf, M. Bakhouya, T. Sadiki","doi":"10.1109/NGNS.2014.6990245","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990245","url":null,"abstract":"Roads' overload remains a major challenge although they are constantly expanded in order to increase their capacity and improve their efficiency. This tends to cause many problems: environmentally, economically and socially. The advancement of urban traffic management systems, construction and expansion of roads are solutions to address this problem and improve the performance of the road circulation, but these solutions are very expensive and also require more space for the development and permanent maintenance. An alternative would be to use the new technologies in the field of communication for sending traffic information such as treacherous road conditions and accident sites by communicating, for a more efficient use of existing infrastructure. In this paper, we present a new approach based on VANETs, which can help drivers have a better trip, by finding the optimal path to reduce travel time and fuel consumption. This approach aims to avoid congestion and queues in a more efficient and optimal use of existing road infrastructure by analyzing the useful and reliable traffic information collected in real time.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121572671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ismail Bourass, Nadia Afifi, H. Belhadaoui, M. Ouzzif, R. Hilali
{"title":"Towards a new model of management and securing digital identities","authors":"Ismail Bourass, Nadia Afifi, H. Belhadaoui, M. Ouzzif, R. Hilali","doi":"10.1109/NGNS.2014.6990269","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990269","url":null,"abstract":"The exponential growth of the web and the use of social networks in our area, gave birth to a new concept called digital identity, it's all digital traces that can be left in the internet such as photos and various comments. However, these digital identities are exposed to many dangers such as phishing, fraud, cyber-crime and identity theft. However, with an interconnected world, it is important to know with whom we communicate. Hence, the weightiness of digital identities' security becomes obvious. In this paper we propose a secure identification approach using a model of digital identity recognition. To do so, we will develop an architecture that can identify users based on a certain number of parameters, such as: federated digital identity management and certification of digital identity.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123822513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Query's optimization in data warehouse on the cloud using fragmentation","authors":"Abdelaziz Ettaoufik, M. Ouzzif","doi":"10.1109/NGNS.2014.6990243","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990243","url":null,"abstract":"Nowadays Cloud Computing occupies an advanced place in the field of service-oriented technologies. The cloud provides a flexible environment for customers to host and process their information through an outsourced infrastructure. This information was habitually located on local servers. Many applications dealing with massive data is routed to the cloud. Data Warehouse (DW) also benefit from this new paradigm to provide analytical data online and in real time. DW in the Cloud benefited of its advantages such flexibility, availability, adaptability, scalability, virtualization, etc. Improving the DW performance in the cloud requires the optimization of data processing time. The classical optimization techniques (indexing, materialized views and fragmentation) are still essential for DW in the cloud. The DW is partitioned before being distributed across multiple servers (nodes) in the Cloud. When queries containing multiple joins or ask voluminous data stored on multiple nodes, inter-node communication increases and consequently the DW performance degrades. In this paper we propose an approach for improving the performance of DW in the Cloud. Our approach is based on a mapping placed on nodes leased by the client. It consists to memorize: (i) the requests received by the node, (ii) information about DW; (iii) an algorithm of query processing. We use the data stored in the map for fragmenting the DW in order to minimize the inter-node communications.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114367437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ZigZag decoding-enabled multi-hop ad hoc networks: Taking benefit from collisions","authors":"Sara Arabi, Essaid Sabir, Mohammed Sadik","doi":"10.1109/NGNS.2014.6990235","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990235","url":null,"abstract":"This paper presents a mathematical model for slotted Aloha-based multihop wireless ad hoc network with ZigZag decoding. We aim by using ZigZag decoding to exploit collision that occurs due to simultaneous transmissions or hidden nodes, in order to decode involved packets by through an iterative piece-by-piece algorithm. Now, the channel state (which we confound with the transmission issue) either can be : Idle, success, ZigZag or collision. Later, we build queuing model and derive the metrics of interest. Each node handles two queues (one for its ow packets and the second one to buffer packets to be transmitted). Next, we derive the arrival rate, departure rate, the average end to end throughput and the average load of forwarding queues. Furthermore, we provide a deeper analysis for symmetric ad hoc networks, for whom we derive explicit formulas for the expected average throughput and stability. Our findings are illustrated with many numerical examples.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122145678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wideband 3×4 Butler matrix using Wilkinson divider for MIMO applications","authors":"Hamza Nachouane, A. Najid, A. Tribak, F. Riouch","doi":"10.1109/NGNS.2014.6990236","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990236","url":null,"abstract":"This paper presents the design and simulation of a broadband 3×4 Butler matrix for the IEEE 802.11 b/g/n and ISM bands. The aim of this study is to develop an antenna array feeding networks for Multiple-Input Multiple-Output (MIMO) applications, based on an asymmetric Butler matrix. The asymmetric structure allows to create a further beam on the array's normal axis, in addition to the same beams which are created by the symmetrical version. The proposed circuit presents a high isolation and wideband features. The circuit can be used for both transmission and reception systems to ensure the Multi-User MIMO (MU-MIMO) service.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130588474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A QoS evaluation of video traffic models for H.264 AVC video","authors":"S. Tanwir, H. Perros, B. Anjum","doi":"10.1109/NGNS.2014.6990270","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990270","url":null,"abstract":"In this paper, we evaluated and compared the QoS behavior of video traffic models for H.264 AVC video. The H.264 AVC models that we evaluated are: the Markov Modulated Gamma (MMG) model, the Discrete Autoregressive (DAR) model, the second order Autoregressive AR(2) model, and a wavelet-based model. These models were used to generate synthetic packet traces which were used in a simulation model to estimate the 95th percentile of the end-to-end delay, jitter and packet loss. The QoS metrics of the generated traces are compared with those of the original traces available from the Arizona State University video traces library. We observed that none of the model produces accurate results for every type of video but the MMG model produced the results closest to the actual traces.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116457504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fast dynamic multicast tree adjustment protocol for mobile IPv6","authors":"Youssef Baddi, Mohamed Dafir Ech-Chrif El Kettani","doi":"10.1109/NGNS.2014.6990237","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990237","url":null,"abstract":"Internet research community has proposed many Different multicast routing protocols to support efficient multimedia application such as, IPTV, videoconferencing, group games. Nevertheless, these protocols have not been designed for mobile roaming members and sources, and has not been tested in wireless and mobile environment since they were developed for multicast parties whose members and sources are topologically stationary. Recently, as the performance of mobile hosts rapidly improves and the bandwidth of wireless access networks grows up, the expectation for mobile multimedia communication services including many-to-many communications such as video-conferencing begins a big necessary. Studying and solving multicast issues in the stationary multicast infrastructure has been largely studied in the literature. However, fewer efforts have been spent in the specific problems of mobile members and sources caused by the frequent change of membership and point of attachment. This paper addresses the issue of mobile Multicast routing by presenting a Fast Dynamic Multicast Tree Adjustment Protocol for Mobile IPv6 (FDMTA-MIPv6), an optimized multicast tree protocol is proposed to transform multicast tree into an optimal shared multicast tree routed at a selected RP. To estimate and evaluate our scheme, we implement simulation based in many metrics, simulation results show that good performance is achieved in terms of handoff latency, end-to-end delay, tree construction delay and others metrics.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124034038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marouane Sebgui, Slimane Bah, A. Berrado, Belhaj El Graini
{"title":"Enhancing primary user detection through radio frequency fingerprint","authors":"Marouane Sebgui, Slimane Bah, A. Berrado, Belhaj El Graini","doi":"10.1109/NGNS.2014.6990246","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990246","url":null,"abstract":"Radio Frequency Fingerprint (RFF) is a technology that allows a unique identification of transmitters. RFF is based on the transient phase of a transmitted signal and allows device identification at the physical level. This paper proposes to use this technology to identify the primary user in the cognitive radio context. Indeed, it presents a novel transceiver architecture based on a dedicated sensing unit. Furthermore, we propose a decision making process based on a supervised learning classifier to decide if a given RFF belongs to a primary user or not. We use wavelets signal decomposition to extract RFF profiles in order to achieve a high level of sensing accuracy.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"54 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134634736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}