{"title":"A mathematical model for joint optimization of coverage and capacity in Self-Organizing Network in centralized manner","authors":"Wei Luo, Jie Zeng, Xin Su, Jingyu Li, Limin Xiao","doi":"10.1109/ChinaCom.2012.6417558","DOIUrl":"https://doi.org/10.1109/ChinaCom.2012.6417558","url":null,"abstract":"In this paper we introduce a mathematical model in the framework of long term evolution (LTE) to solve the problem of coverage and capacity optimization by employing multi-level random Taguchi's Method. The optimization process runs in a centralized manner with no human intervention required and interacts with environment situation automatically. Under the mathematical model which combines coverage and capacity optimization by a coefficient factor, conventional Taguchi's Method transcends traditional trial-and-error approach in convergence speed and simple implementation, to offer even more search capacity, Gaussian shrink coefficient and random optimization offset are applied to the level-to-tilts mapping function. Antenna tilt is an effective interference reduction technique, which has been adopted as the tuning parameter. The simulation results turn out to be better than traditional Taguchi's Method and trial-and-error approach. The system model presented and evaluated also gives an insight to the mathematical model especially the trade-off between coverage and capacity in homogeneous scenario.","PeriodicalId":143739,"journal":{"name":"7th International Conference on Communications and Networking in China","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130895013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Field test of uplink CoMP joint processing with C-RAN testbed","authors":"Lei Li, Jinhua Liu, K. Xiong, P. Butovitsch","doi":"10.1109/ChinaCom.2012.6417584","DOIUrl":"https://doi.org/10.1109/ChinaCom.2012.6417584","url":null,"abstract":"Uplink Coordinated Multi-Point (CoMP) joint processing has the potential to improve uplink capacity by joint processing the received signal from more antennas and nodes. With C-RAN architecture, centralized and coordinated baseband processing among base stations become feasible. This paper introduces LTE uplink CoMP joint processing - the principles, simulation evaluations, field testbed and test results. The field test is done with C-RAN field testbed which is built around Ericsson office in Beijing. Both the simulation evaluations and field test results show that uplink CoMP has great gain at the cell edge especially when there is interference, so it can be a good solution to improve the cell edge throughput of the LTE system.","PeriodicalId":143739,"journal":{"name":"7th International Conference on Communications and Networking in China","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131419891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Buyun Qu, Zhibin Zhang, L. Guo, Xingquan Zhu, Li Guo, Dan Meng
{"title":"An empirical study of morphing on network traffic classification","authors":"Buyun Qu, Zhibin Zhang, L. Guo, Xingquan Zhu, Li Guo, Dan Meng","doi":"10.1109/ChinaCom.2012.6417481","DOIUrl":"https://doi.org/10.1109/ChinaCom.2012.6417481","url":null,"abstract":"Network morphing aims at masking traffic to degrade the performance of traffic identification and classification. Several morphing strategies have been proposed as promising approaches, very few works, however, have investigated their impact on the actual traffic classification performance. This work sets out to fulfill this gap from an empirical study point of view. It takes into account different morphing strategies exerted on packet size and/or inter-arrival time. The results show that not all morphing strategies can effectively obfuscate traffic classification. Different morphing strategies perform distinctively, among which the integration of packet size and inter arrival time morphing is the best, and the packet size based method is the worst. The three classifiers also exhibit distinct robustness to the morphing, with C4.5 being the most robust and Naive Bayes being the weakest. In addition, our study shows that classifiers can learn nontrivial information merely from the traffic direction patterns, which partially explains the weakness of packet size based morphing methods.","PeriodicalId":143739,"journal":{"name":"7th International Conference on Communications and Networking in China","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128157924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A private-data protection mechanism for trusted mobile platform","authors":"Tao Li, A. Hu","doi":"10.1109/ChinaCom.2012.6417480","DOIUrl":"https://doi.org/10.1109/ChinaCom.2012.6417480","url":null,"abstract":"The need for user's data protection in mobile platform is a key element of mobile security. Although existing Operating Systems (OS) for mobile terminal have introduced many methods to enhance privacy, these methods have the lacks of efficiency and flexibility. Focus on the leaking of private information, this paper proposes a private-data protection mechanism based on Mobile Trusted Module (MTM). Our method takes advantage of computing resources in MTM and MTM hardware security property. The private key is generated inside MTM with a secure key-generation algorithm. Through the encryption technology, system could maintain credibility even when the system does not powered on and trusted mechanism does not worked. A prototype system is developed with Linux kernel. The testing result shows that the proposed data protection mechanism is helpful to ensure user's data integrity and privacy.","PeriodicalId":143739,"journal":{"name":"7th International Conference on Communications and Networking in China","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallelizing sequential network applications with customized lock-free data structures","authors":"Junchang Wang, Kai Zhang, Bei Hua","doi":"10.1109/ChinaCom.2012.6417441","DOIUrl":"https://doi.org/10.1109/ChinaCom.2012.6417441","url":null,"abstract":"Parallelizing fine-grained network applications on general-purpose multi-core architectures is a big challenge, as it requires fast core-to-core synchronization that is not supported for now. This paper proposes a methodology for parallelizing legacy sequential network applications on multi-core architectures with only minor code rewriting. Single Program Multiple Data (SPMD) parallel programming style is used to retain the control flow of sequential code, and then data structures potentially involving data racing are replaced with customized lock-free data structures based on domain knowledge. We evaluate the methodology by parallelizing a sequential TCP SYN flood detection program on Intel Quad processors, and gain inspiring results.","PeriodicalId":143739,"journal":{"name":"7th International Conference on Communications and Networking in China","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121958309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved perceptual video encryption using multiple 8×8 transforms in MPEG-4","authors":"J. Au-Yeung, B. Zeng","doi":"10.1109/ChinaCom.2012.6417472","DOIUrl":"https://doi.org/10.1109/ChinaCom.2012.6417472","url":null,"abstract":"Perceptual video encryption by making use of multiple transforms alternatively (according to the random encryption key) has been demonstrated to be quite successful in H.264 video coding. An important reason is that both intra and inter frames in H.264 need go through a prediction (intra-prediction or motion-compensation) so that different transforms (from DCT) always work on some residual signals, leading to nearly the same coding efficiency (as DCT). This technique can be applied to all inter-frames in MPEG-4, but not to any intra-frame because the intra-predication is performed in the transform domain in MPEG-4. In this paper, we present a solution to this problem: mapping the intra-predicated transform coefficients back to the pixel domain. Based on the equivalent intra-prediction in the pixel domain, we can then apply our multiple transform based encryption scheme on each intra-frame. Experiment results show that encrypting each intra-frame in MPEG-4 provides a further quality-degradation on the encrypted video, thus making this multiple transform based scheme applicable in more applications.","PeriodicalId":143739,"journal":{"name":"7th International Conference on Communications and Networking in China","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129121762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive downlink multi-user MISO transmission systems exploiting statistical channel state information","authors":"Xiao Li, Liulei Zhou, Jue Wang, Shi Jin, Xiqi Gao","doi":"10.1109/CHINACOM.2012.6522592","DOIUrl":"https://doi.org/10.1109/CHINACOM.2012.6522592","url":null,"abstract":"In this paper, we investigate the ergodic sum rate for multiple-input single-output(MISO) downlink multi-user systems. We assume that each user has perfect channel state information( CSI), while the base station has only statistical CSI of all users. We derive an approximation of the ergodic sum rate. Then, new scheduling and statistical beamforming space division multiple access(SDMA) transmission are derived through maximizing the approximation. The proposed algorithm are shown to perform well.","PeriodicalId":143739,"journal":{"name":"7th International Conference on Communications and Networking in China","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wangyang Liu, Qingshan Li, Rui Lu, Xin Wan, Nan Hua, Xiaoping Zheng, Bingkun Zhou, Xiaohui Chen, Pi Wang
{"title":"Implementation of segmented protection and restoration in PCE-based multi-domain heterogeneous optical networks","authors":"Wangyang Liu, Qingshan Li, Rui Lu, Xin Wan, Nan Hua, Xiaoping Zheng, Bingkun Zhou, Xiaohui Chen, Pi Wang","doi":"10.1109/ChinaCom.2012.6417491","DOIUrl":"https://doi.org/10.1109/ChinaCom.2012.6417491","url":null,"abstract":"This paper introduces the routing and signaling processes of segmented protection and restoration in PCE-based multi-domain heterogeneous optical networks. To evaluate the performance of protection and restoration, a network platform with commercial SDH and OTN equipment is implemented. Results show that the segmented protection and restoration have acceptable performance on the network platform.","PeriodicalId":143739,"journal":{"name":"7th International Conference on Communications and Networking in China","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130013406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of coordinated multipoint reception in CRAN under LTE-Advanced uplink","authors":"Huiyu Yuan, Naizheng Zheng, Yuyu Yan, P. Skov","doi":"10.1109/ChinaCom.2012.6417589","DOIUrl":"https://doi.org/10.1109/ChinaCom.2012.6417589","url":null,"abstract":"Coordinated Multipoint Processing (CoMP) is a promising method to improve cell edge data rate and system spectrum efficiency, which helps LTE-Advanced to meet the high data rate requirement of 4G mobile communication networks. In uplink, coordinated multipoint reception is transparent to user equipment, while significant gain can be achieved with coordination of multiple base stations. CoMP gain can be affected by network deployment, receiver algorithm, channel estimation accuracy and orthogonality of reference signals. In this article, we focuses on uplink CoMP reception in 3GPP long term evolution advanced (LTE-A). Deployment scenarios are introduced in both homogenous networks and heterogeneous networks. Evaluation are taken under system level simulation. Receiver schemes, realistic channel estimation, and impact of reference signals orthognality is taken into consideration. Performance improvement are shown and compared in different CoMP scenarios.","PeriodicalId":143739,"journal":{"name":"7th International Conference on Communications and Networking in China","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130234454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Pseudo-Random Subchannel Selection scheme for downlink interference mitigation in two-tier cellular networks","authors":"Wei Wang, Yiqing Zhou, Yi Huang, Jinglin Shi","doi":"10.1109/ChinaCom.2012.6417539","DOIUrl":"https://doi.org/10.1109/ChinaCom.2012.6417539","url":null,"abstract":"Femtocell technology, which is adopted in broadband communication systems, has become an economical way to improve cellular coverage and system capacity. However, it is difficult to exploit the advantages of femtocells in two-tier OFDMA networks because of the interference among the macrocell and femtocells. In this paper, a Pseudo-Random Subchannel Selection (PRSS) scheme is proposed with hybrid frequency allocation for downlink transmission to mitigate the interference. Firstly, the PRSS scheme is performed to randomize the cross-tier interference by aggressor femtocells selecting subchannels pseudo-randomly. Then the proposed scheme utilizes Neighbor Relation Matrix, which could be simplified as the neighbor relationships of adjacent femtocells, to mitigate the co-tier interference. The simulation results showed that the PRSS scheme keeps interference lower while obtains better throughput compared to co-channel frequency allocation (CFA), dedicated frequency allocation (DFA), partial frequency allocation (PFA) and stochastic subchannel allocation (SSA).","PeriodicalId":143739,"journal":{"name":"7th International Conference on Communications and Networking in China","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130259535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}