Lai Jun, Ye Wu, Feng Sui-li, Guo Hua, Zhuang Hongcheng
{"title":"A Cross-Layer Queue Management Algorithm in 802.16 Wireless Networks","authors":"Lai Jun, Ye Wu, Feng Sui-li, Guo Hua, Zhuang Hongcheng","doi":"10.1109/ICCSN.2009.57","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.57","url":null,"abstract":"Congestion is regarded as one of the main reasons for the performance decrease in wireless networks,which exists in 802.16 wireless networks too. To control congestion better, this paper proposes an active queue management (AQM) algorithm named WDBQ (Wireless Delay-Based Queue) according to the characteristic of 802.16 wireless networks. The algorithm detects congestion by using packet queueing delay, and control network congestion by setting a congestion detection threshold. The simulation results in ns-2 shows that the algorithm can get good performance.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133918093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combined Serial Concatenated Convolutional Coding and Unitary Space-Time Modulation","authors":"Dapeng Zhang, Ju Liu, Hui Ji, Qiangjun Niu","doi":"10.1109/ICCSN.2009.84","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.84","url":null,"abstract":"When channel state information is not available, combined unitary space-time modulation and parallel concatenated convolutional code can greatly improve the system performance, however it also meet with the error floor phenomenon. We propose a scheme of utilizing unitary space-time symbol based serial concatenated convolutional code for multiple-antenna wireless communication systems over rapid fading channels which can avoid the error floor. We also give the MAP decoding algorithm for both the systematic symbol and the parity symbols. With iterative decoding and/or multi-antennas, it can further improve the system performance, which helps to give an acceptable bit error rate.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131475431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Distributed Architecture Based on SOA","authors":"Hongqi Li, Zhuang Wu","doi":"10.1109/ICCSN.2009.176","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.176","url":null,"abstract":"In essence, Service Oriented Architecture (SOA) is distributed and shall not have any centralized control point. Any application can access an SOA network for interaction as long as it complies with the corresponding standards. A centralized SOA architecture can also be regarded as a part of SOA. This paper gives a general overview of the fundamental principles, features, and core technologies of distributed SOA, analyzes the integration of distributed object technologies and Web technology, and describes the difference between distributed SOA and centralized SOA. With the previous as a basis, this paper discusses the function and implementation of SOA in the distributed architecture, proposes an SOA-based distributed multi-layer architecture and an application integration frame realized via J2EE. This application integration frame can connect any distributed application without restriction and support data and function sharing among applications,thus simplifying the implementation of the functions at various layers and providing better maintainability and scalability.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132787888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"P2P File Sharing Software in IPv4/IPv6 Network","authors":"Rui Zhao, Ruoxuan Liu, Guangxuang Fu","doi":"10.1109/ICCSN.2009.87","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.87","url":null,"abstract":"This paper designed and realized a P2P file sharing system (FSP2P) by using Java network programming. An adapter was contained in FSP2P. By using the adapter, FSP2P not only can be array to pure IPv4 or IPv6 network, but also can be array to IPv4/IPv6 coexistent network. So, it realized transparent connect between IPv4 and IPv6 in P2P file sharing system.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127053353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Algorithm for Channel Estimation Based on Pilot-Aided and EM in Software Radio OFDM System","authors":"Wu Ding-xue, Tian Jinwen","doi":"10.1109/ICCSN.2009.100","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.100","url":null,"abstract":"In order to increase the transmission efficiency of OFDM system, considering the special structure of Software Radio OFDM system, this paper proposes gradient acceleration method of EM algorithm(¿-EM) for OFDM systems channel estimation with Pilot assisted symbol modulation expectation. The simulation result shows that the new method can reduce the complexity and iteration times, and it has also still lower BER compared to traditional method.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115834625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Distributed Firewall System for IPv6","authors":"Yingxu Lai, G. Jiang, Jian Li, Zhen Yang","doi":"10.1109/ICCSN.2009.121","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.121","url":null,"abstract":"The deployment of the IPv6 network becomes to be realized as the necessity of the IPv6 network is enlarged due to the limit of the IPv4 network. However, the security policy about the IPv6 network is not mature and it becomes an obstacle in the IPv6 network deployment. Attackers can detour the access control of packet filtering system, unless packet filtering system can decrypt IPSec packet. This paper introduces the implementation of Distributed Firewall System (DFS) that can be applicable to the IPv6 network and has capabilities of processing encrypted IPSec packet. The prototype introduced in this paper has been implemented in order to be applied to the IPv6 network preferentially. Although it has a limit to forward performance, the prototype can give the basic concepts toward the IPv6-based DFS equipment.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116823602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localization Algorithm Based on Difference Estimation for Wireless Sensor Networks","authors":"Fugen Su, Weizheng Ren, Hongli Jin","doi":"10.1109/ICCSN.2009.129","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.129","url":null,"abstract":"In order to suppress effectively the effects of RSSI error to wireless sensor networks node localization’s precision, individual diversity difference coefficient, distance difference coefficient and distance difference localization equation is defined based on the analysis of the models of maximum likelihood estimation and RSSI¿The closest beaconing node to object node as reference node corrects measure distance based on RSSI by difference method. A distance difference localization algorithm is put forward through combining difference correction method and maximum likelihood estimation method. This localization algorithm needn’t additional hardware spending, easy to be realized and its localization error is less than 2.5m, therefore it is fit for localization of WSN node whose operation ability and power supply are restricted.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Locating Method for Point of Impact Based on Acoustic Technique","authors":"Jingrong Zhao, Ke Wang","doi":"10.1109/ICCSN.2009.54","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.54","url":null,"abstract":"The paper discuses an automatic detecting scheme that uses acoustics localization technique as detecting principle, which solves the problems such as bad real-time character, low location accuracy and the security that resulted from depending on detecting point of impact artificially in the past. Based on measurements which are limited to time differences of arrival (TDOA) of short-duration acoustic emissions, a new localization method combined with point localization algorithm and zone localization algorithm is put forward for various location tasks. Simulation experiments testify the validity and feasibility of the new location method. The key steps of location system for point of impact involve in the locating procedure include acoustic signal detection, wireless data transmission and point of impact parameters calculation etc. Results based on experiments with real data showed that the system location error is within 5m in a 400m×400m sensors array.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124037794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Haidar, H. Al‐Rizzo, Yupo Chan, R. Akl, M. Bouharras
{"title":"Throughput Validation of an Advanced Channel Assignment Algorithm in an IEEE 802.11 WLAN","authors":"M. Haidar, H. Al‐Rizzo, Yupo Chan, R. Akl, M. Bouharras","doi":"10.1109/ICCSN.2009.41","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.41","url":null,"abstract":"In this paper, an enhanced channel-assignment algorithm at the access points (APs) of a wireless local area network (WLAN) is validated. The algorithm aims to maximize the signal-to-interference ratio (SIR) at the user level in order to determine the appropriate channel at the APs. The initial channel assignment step at the APs is based on minimizing the total interference between APs. Based on this initial assignment, the SIR for each user is calculated. Then, another channel assignment is performed based on maximizing the SIR at the users. The algorithm can be applied to any WLAN, irrespective of the user distribution and user load. Results show that the algorithm is capable of significantly increasing the SIR over the WLAN, which in turn should improve throughput. Therefore, we use OPNET simulation tool to construct several realistic scenarios in order to validate our results.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129022944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Network Processing Dependability with Heterogeneous Reliability Cores","authors":"P. Ungsunan, Chuang Lin, Yi Gai, Xiangzhen Kong","doi":"10.1109/ICCSN.2009.147","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.147","url":null,"abstract":"An emerging problem facing future high-performance embedded multi-core and network processors are transient faults caused by radiation, noise and other factors.These faults will likely make future multi-core processors less reliable as chip features shrink, voltages decrease, and the number of cores increase. To address this problem, we propose a systems approach of managing and allocating reliability according to software process requirements. The heterogeneous multi-core architecture proposed is based on cores with differing reliabilities. Critical and non-critical software components are segregated and matched with the higher and lower reliability cores, respectively. This method is applied to a network processing example and we show that by using heterogeneous reliability cores the overall system failure rate can be reduced significantly, while offering the same or better overall performance, power utilization and chip area as symmetric cores.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131330515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}