J. Networks最新文献

筛选
英文 中文
Small-Packet Flows in Software Defined Networks: Traffic Profile Optimization 软件定义网络中的小数据包流:流量轮廓优化
J. Networks Pub Date : 2015-04-14 DOI: 10.4304/jnw.10.4.176-187
J. Saldaña, David de Hoz, J. Fernández-Navajas, José Ruíz, F. Pascual, D. López, D. Florez, J. A. Castell, M. Nunez
{"title":"Small-Packet Flows in Software Defined Networks: Traffic Profile Optimization","authors":"J. Saldaña, David de Hoz, J. Fernández-Navajas, José Ruíz, F. Pascual, D. López, D. Florez, J. A. Castell, M. Nunez","doi":"10.4304/jnw.10.4.176-187","DOIUrl":"https://doi.org/10.4304/jnw.10.4.176-187","url":null,"abstract":"This paper proposes a method for optimizing bandwidth usage in Software Defined Networks (SDNs) based on OpenFlow. Flows of small packets presenting a high overhead, as the ones generated by emerging services, can be identified by the SDN controller, in order to remove header fields that are common to any packet in the flow, only during their way through the SDN. At the same time, several packets can be multiplexed together in the same frame, thus reducing the overall number of frames. The method can be useful for providing QoS while the packets are traversing the SDN. Four kinds of small-packet traffic flows are considered (VoIP, UDP and TCP-based online games, and ACKs from TCP flows). Both IPv4 and IPv6 are studied, and significant bandwidth savings (up to 68 % for IPv4 and 78 % for IPv6) can be obtained for the considered kinds of traffic. The optimization method is also applied to different public Internet traffic traces, and significant reductions in terms of packets per second are achieved. Results show that bandwidth consumption is also reduced, especially in those traces where the percentage of small packets is high. Regarding the effect on QoS, the additional delay can be kept very low (below 1 millisecond) when the throughput is high, but it may become significant for low- throughput scenarios. Thus, a trade-off between bandwidth saving and additional delay appears in those cases.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"22 1","pages":"176-187"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86503172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Evaluation of the Energy Consumption Introduced by a Trust Management Scheme on Mobile Ad-hoc Networks 移动Ad-hoc网络中信任管理方案引入的能耗评估
J. Networks Pub Date : 2015-04-14 DOI: 10.4304/jnw.10.4.240-251
Andrea Lupia, F. Rango
{"title":"Evaluation of the Energy Consumption Introduced by a Trust Management Scheme on Mobile Ad-hoc Networks","authors":"Andrea Lupia, F. Rango","doi":"10.4304/jnw.10.4.240-251","DOIUrl":"https://doi.org/10.4304/jnw.10.4.240-251","url":null,"abstract":"Nodes in mobile ad-hoc networks communicate each other using the wireless transmission. Many protocols have been proposed allowing the establishment of multi-hop paths to connect source and destination nodes. The absence of a physical link between the nodes and the multi-hop routing lead to a lack of security. Different typologies of attack effective against MANETs have been investigated thoroughly, and many solutions have been proposed to take the required countermeasures. Many of them are based on the cryptography, protecting data with digital signatures and hash chains, but they are not useful when a fair node is compromised later in time. Using a Trust Management Scheme can help in these situations, allowing to evaluate dynamically if a node is trustworthy or not. The computation of a trust value requires the monitoring of the interactions between nodes, therefore it has an effect on the energy consumption, which is an important issue of ad-hoc networks. Energy availability is limited for the nodes in a MANET, so the security measures that they adopt must not excessively increase the consumption.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"14 1","pages":"240-251"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87118424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Data Upload in LTE-A Mobile Networks by Using Shared Segmented Upload 基于共享分段上传的LTE-A移动网络数据上传
J. Networks Pub Date : 2015-04-14 DOI: 10.4304/jnw.10.4.252-264
M. Tavanpour, J. Mikhail, M. Moallemi, Gabriel A. Wainer, G. Boudreau, Ronald Casselman
{"title":"Data Upload in LTE-A Mobile Networks by Using Shared Segmented Upload","authors":"M. Tavanpour, J. Mikhail, M. Moallemi, Gabriel A. Wainer, G. Boudreau, Ronald Casselman","doi":"10.4304/jnw.10.4.252-264","DOIUrl":"https://doi.org/10.4304/jnw.10.4.252-264","url":null,"abstract":"There have been ongoing efforts focused on improving mobile networks standards to support the ever-increasing user demands of high data rate services. These efforts are more crucial for cell-edge users where their long distance from their serving Base Station (BS), and the higher interference from the neighbouring cells, degrades their performance. Contemporary communication standards, proposed for Fourth Generation (4G) of mobile telecommunication standards, use different techniques to deal with these bottlenecks. Long Term Evolution Advanced (LTE-A), is a promising standard for 4G mobile networks, and it uses different technologies to enhance users’ performance regardless of their location in the coverage area. LTE-A employs Coordinated Multi-Point (CoMP) technique particularly to provide high data rate services for cell-edge users. In this context, we present Shared Segmented Upload (SSU), a novel method for uploading large files from User Equipment (UE) to multiple BSs in a CoMP communication scenario. We use Discrete EVent System Specification (DEVS) formalism to model an LTE-A mobile network using SSU. In addition, we employ DEVS to simulate a conventional non-cooperative algorithm to evaluate the effectiveness of SSU in two scenarios: rural and urban area settings. The simulation results show that, compared to the conventional method, SSU improves cell-edge users’ uplink performance and reduces the latency for a UE to upload its data to the network.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"359 1","pages":"252-264"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76389896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prediction Model of Triple play services for QoS Assessment in IP Based Networks 基于IP网络的三网融合业务QoS评估预测模型
J. Networks Pub Date : 2015-04-14 DOI: 10.4304/jnw.10.4.232-239
J. Frnda, M. Voznák, L. Sevcik, P. Fazio
{"title":"Prediction Model of Triple play services for QoS Assessment in IP Based Networks","authors":"J. Frnda, M. Voznák, L. Sevcik, P. Fazio","doi":"10.4304/jnw.10.4.232-239","DOIUrl":"https://doi.org/10.4304/jnw.10.4.232-239","url":null,"abstract":"This paper brings a QoS (Quality of Service) assessment model which can estimate voice and video quality. Based on the proposed model, speech or video quality is computed with regard to congestion management QoS configuration in the network and its level of total utilization. The contribution of this paper lies in designing a new mathematical model capable of predicting the quality of multimedia services respecting network behavior and performance.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"17 1","pages":"232-239"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74055348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Wi-Fi-based Positioning in a Complex Underground Environment 复杂地下环境下基于wi - fi的定位
J. Networks Pub Date : 2015-04-13 DOI: 10.4304/jnw.10.3.141-151
M. Cypriani, G. Delisle, N. Hakem
{"title":"Wi-Fi-based Positioning in a Complex Underground Environment","authors":"M. Cypriani, G. Delisle, N. Hakem","doi":"10.4304/jnw.10.3.141-151","DOIUrl":"https://doi.org/10.4304/jnw.10.3.141-151","url":null,"abstract":"Underground mining tunnels constitute a very particular environment for radio wave propagation – with characteristics of both indoor and outdoor “regular” environments. This paper shows how a general-purpose Wi- Fi-based indoor positioning system, OwlPS (Owl Positioning System) was adapted to work in that particular environment. A series of experiments, conducted in a formerly exploited gold mine at 70 metres below the surface, across about 400 metres of drifts, is then introduced; it primarily aims at determining the positioning accuracy that can be reached in such a context with a Wi-Fi-based positioning system using the signal strength at 2.4 GHz. The results obtained are improved with a filter, and the mean Euclidean distance error is under 10 metres in most cases when the terminal is carried by an operator; this makes OwlPS usable as is for asset management and emergency positioning of workers underground.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"4 1","pages":"141-151"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75539972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Learning Algorithm of Neural Networks on Spherical Cap 球形帽上神经网络的学习算法
J. Networks Pub Date : 2015-04-13 DOI: 10.4304/jnw.10.3.152-158
Zhixiang Chen, Jinjie Hu, F. Cao
{"title":"Learning Algorithm of Neural Networks on Spherical Cap","authors":"Zhixiang Chen, Jinjie Hu, F. Cao","doi":"10.4304/jnw.10.3.152-158","DOIUrl":"https://doi.org/10.4304/jnw.10.3.152-158","url":null,"abstract":"This paper investigates the learning algorithm of neural network on the spherical cap. Firstly, we construct the inner weights and biases from sample data, such that the network has the interpolation property on the sampling points. Secondly, we construct the BP network and BP learning algorithm. Finally, we analyze the generalization ability for the constructed networks and give the numerical experiments","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"92 1","pages":"152-158"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80472797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
NCA: New Cooperative Algorithm for Reducing Topology Control Packets in OLSR NCA:一种新的OLSR拓扑控制包减少协同算法
J. Networks Pub Date : 2015-04-13 DOI: 10.4304/jnw.10.3.125-133
Adil Benabbou, Abdelali Boushaba, Azeddine Zahi, Rachid Benabbou, M. Oumsis, S. E. Ouatik
{"title":"NCA: New Cooperative Algorithm for Reducing Topology Control Packets in OLSR","authors":"Adil Benabbou, Abdelali Boushaba, Azeddine Zahi, Rachid Benabbou, M. Oumsis, S. E. Ouatik","doi":"10.4304/jnw.10.3.125-133","DOIUrl":"https://doi.org/10.4304/jnw.10.3.125-133","url":null,"abstract":"OLSR (Optimized Link State Routing Protocol) is a routing protocol designed especially for MANETs (Mobile Ad hoc Networks) and is currently the most widely deployed for this type of networks. OLSR uses multipoint relay (MPR: MultiPoint Relay) flooding mechanism to optimize topology control messages broadcasting throughout the network. Each node of the network selects a subset of nodes (MPR) among its neighbors to disseminate control messages. Reducing topology control packets (TC) is the key functionality of OLSR. In the Ad hoc network, the number of TC depends on the choice of MPR. In this paper, we propose a new cooperative MPR selection algorithm with the aim to reduce TC packets. We implemented this algorithm in NS2 and three other algorithms are known to be performant in the domain. Simulation results show that our algorithm reduces TC packets relative to other algorithms. This reduction is reflected positively on other performance parameters","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"167 1","pages":"125-133"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75383855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on Channel Selection Algorithms in Cognitive Radio Networks 认知无线网络中信道选择算法的研究
J. Networks Pub Date : 2015-04-13 DOI: 10.4304/jnw.10.3.159-163
Lin Li, Yi-na Deng, Yang Yuan, Wenjiang Feng
{"title":"Research on Channel Selection Algorithms in Cognitive Radio Networks","authors":"Lin Li, Yi-na Deng, Yang Yuan, Wenjiang Feng","doi":"10.4304/jnw.10.3.159-163","DOIUrl":"https://doi.org/10.4304/jnw.10.3.159-163","url":null,"abstract":"To address the secondary users channel selection issue in cognitive radio network, a novel channel selection strategy is proposed. Four typical channel selection models under auction mechanism, machine learning scheme, channel prediction scheme and optimization scheme are compared and analyzed. Based on the optimization theory, the selfish channel selection algorithm and the cooperative channel selection algorithm are proposed in view of the heterogeneity of the channel. The selfish algorithm selects the channel which provides the maximum transmission rate for the secondary users (SU), while the cooperative algorithm selects the channel that benefits overall system throughput. Simulations compare proposed algorithms with random channel selection algorithm, and suggest proposed algorithms outperform random channel selection algorithm in terms of system average throughput, channel utilization, average handoff time and average transmission time.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"52 2","pages":"159-163"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91499844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Gigabit Wireless Networking with IEEE 802.11ac: Technical Overview and Challenges 使用IEEE 802.11ac的千兆无线网络:技术概述和挑战
J. Networks Pub Date : 2015-04-13 DOI: 10.4304/jnw.10.3.164-171
Farhan Siddiqui, S. Zeadally, K. Salah
{"title":"Gigabit Wireless Networking with IEEE 802.11ac: Technical Overview and Challenges","authors":"Farhan Siddiqui, S. Zeadally, K. Salah","doi":"10.4304/jnw.10.3.164-171","DOIUrl":"https://doi.org/10.4304/jnw.10.3.164-171","url":null,"abstract":"The ever-growing proliferation of wireless devices and concurrent deployments of bandwidth intensive applications has been having a significant impact on user experience in high-density wireless areas. IEEE 802.11ac is a recently ratified Wireless Local Area Network (WLAN) standard that promises to improve wireless user experience by delivering gigabit speed to end-user applications. 802.11ac utilizes new technologies such as Channel Bonding, Beamforming, and Multi-User Multiple-Input Multiple-Output (MU-MIMO) to improve wireless performance. This article reviews recent technological advances made in the field of WLANs and then focuses on the recent IEEE 802.11ac standard. We present actual data rates attained by currently available 802.11ac hardware, and we also discuss foreseen technical challenges that still need to be addressed to enable efficient and seamless gigabit wireless networking","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"3 1","pages":"164-171"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87089770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
A Distributed UWB-based Localization System in Underground Mines 基于分布式uwb的矿井定位系统
J. Networks Pub Date : 2015-04-13 DOI: 10.4304/jnw.10.3.134-140
Yuanqing Qin, Fang Wang, Chunjie Zhou
{"title":"A Distributed UWB-based Localization System in Underground Mines","authors":"Yuanqing Qin, Fang Wang, Chunjie Zhou","doi":"10.4304/jnw.10.3.134-140","DOIUrl":"https://doi.org/10.4304/jnw.10.3.134-140","url":null,"abstract":"The location of people, mobile terminals and equipment is highly desirable for operational enhancements in the mining industry. In an indoor environment such as a mine, the multipath caused by reflection, diffraction and diffusion on the rough sidewall surfaces are the main sources of range measurement errors. In this paper, a UWB time of flight based localization system is proposed to address the multipath effect in underground mines. To reduce the communication cost and time delay of localization in such a chain type wireless network, a distributed localization algorithm based on particle swarm optimization (PSO) is proposed and implemented on the blind node (the node to be localized). Without extra hardware needed, an accurate but low cost localization system has been achieved. Experimental results verify the proposed scheme","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"29 1","pages":"134-140"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83398765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信