2010 Second International Conference on Future Networks最新文献

筛选
英文 中文
Distribution Transmission Strategy in WMAN Based on Bandwidth and Delay Estimate and Packets 基于带宽、时延估计和分组的无线城域网分配传输策略
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.48
Liu Zhanjun, Qin Fengxie, Zhou Yangmei, Li Yun
{"title":"Distribution Transmission Strategy in WMAN Based on Bandwidth and Delay Estimate and Packets","authors":"Liu Zhanjun, Qin Fengxie, Zhou Yangmei, Li Yun","doi":"10.1109/ICFN.2010.48","DOIUrl":"https://doi.org/10.1109/ICFN.2010.48","url":null,"abstract":"in this paper, we study about bandwidth and delay estimate in WMAN, and propose a method to obtain different delay estimate in multi-path by transmission detect packets. So that we can estimate any packet’s transmission delay in each path. According to delay estimates of the different path, adjust the order of sending of data packet in Cache. So as to achieve the purpose of reducing delays of the overall operations flow and out-of-order. Simulation results show that the strategy is effective.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"2008 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wireless Sensor Network Based Green Marketplace for Electrical Appliances 基于无线传感器网络的绿色电器市场
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.95
D. Hughes, K. Man, Kevin Lee, J. Ueyama
{"title":"A Wireless Sensor Network Based Green Marketplace for Electrical Appliances","authors":"D. Hughes, K. Man, Kevin Lee, J. Ueyama","doi":"10.1109/ICFN.2010.95","DOIUrl":"https://doi.org/10.1109/ICFN.2010.95","url":null,"abstract":"Wireless sensor and actuator networks are a promising tool to support energy monitoring and conservation. However, to date, research in this area has focused upon supporting infrastructure managers, while failing to consider the important role of appliance manufacturers in conserving energy. This paper presents an architectural vision for conserving energy that respects the divergent interests of infrastructure managers and appliance manufacturers. From the manufacturer’s perspective, the system will provide feedback on the performance of appliances after deployment, along with a new mechanism to reach potential customers. From the infrastructure manager’s perspective the system reifies appliance energy consumption data, while providing intelligent suggestions on appliance purchases. In concert, we argue that these features will provide significant energy and cost savings.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124844414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Clustering Key Management of Forward Security 前向安全的集群密钥管理
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.84
Zhiwei Jiang, Changjiang Wei
{"title":"Clustering Key Management of Forward Security","authors":"Zhiwei Jiang, Changjiang Wei","doi":"10.1109/ICFN.2010.84","DOIUrl":"https://doi.org/10.1109/ICFN.2010.84","url":null,"abstract":"Based on the clustering model which takes the fully distributed CA private key management scheme, and combined the trust assessment strategy in dynamic, we proposed a new type of key management scheme with forward security. We also carried out some simulation experiments. The results show that as the number of nodes in the network is different, the certification success rate and the node certification delay remain stable.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of TCP Performance Enhancement in Asymmetric Wireless Networks 非对称无线网络中TCP性能增强方法
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.47
Wang Bao-tai, Zhang Rui
{"title":"Method of TCP Performance Enhancement in Asymmetric Wireless Networks","authors":"Wang Bao-tai, Zhang Rui","doi":"10.1109/ICFN.2010.47","DOIUrl":"https://doi.org/10.1109/ICFN.2010.47","url":null,"abstract":"There may exist multi-path between the source node and the destination node in asymmetric wireless networks. By calculating the throughput, this paper proposes a new method which determines whether to use different paths to transmit TCP data segment and ACK segment. This method uses bandwidth as criteria for judging, and selects the path having lager bandwidth to forward ACK. Simulation result shows that the proposed method can improve the throughput effectively and advance TCP performance.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122624007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A QoS Routing for Maximum Bandwidth in Ad Hoc Networks 在Ad Hoc网络中实现最大带宽的QoS路由
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.11
Keming Du, Yahui Yang
{"title":"A QoS Routing for Maximum Bandwidth in Ad Hoc Networks","authors":"Keming Du, Yahui Yang","doi":"10.1109/ICFN.2010.11","DOIUrl":"https://doi.org/10.1109/ICFN.2010.11","url":null,"abstract":"Ad hoc networks have characteristics such as flexibility, fast and easy deployment, robustness which make them an interesting technology for various applications. Ad hoc networks are considered as the most promising terminal networks in future mobile communications. Providing sufficient bandwidth for multimedia applications in ad hoc networks is an urgent task because of the rising popularity of multimedia applications and potential commercial usage of ad hoc networks. Bandwidth is more difficult to guarantee in ad hoc networks than in other types of networks, and providing end-to-end bandwidth guarantee is a critical and challenging problem in ad hoc networks because of multihop, mutual radio interference and node mobility. A bandwidth-aware routing protocol of BARP, which is based on the existing Dynamic Source Routing protocol (DSR), is proposed in this paper in order to find a route of approximately maximum bandwidth for a flow from a source node to a destination node in a wireless ad hoc network. BARP is a novel bandwidth-aware routing protocol by which a route of largest bandwidth can be found. This routing protocol takes advantage of larger bandwidth than the existing work, and its effectiveness is demonstrated by some simulations. It will be a great contribution to end-to-end QoS support research in wireless ad hoc networks.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129672472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Class-Based Scheduling for IEEE 802.16 Wireless Networks with Location-dependent Errors 基于类的IEEE 802.16无线网络位置相关错误调度
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.75
J. Jeon, Chung-Woon Park, Jong-Tae Lim
{"title":"Class-Based Scheduling for IEEE 802.16 Wireless Networks with Location-dependent Errors","authors":"J. Jeon, Chung-Woon Park, Jong-Tae Lim","doi":"10.1109/ICFN.2010.75","DOIUrl":"https://doi.org/10.1109/ICFN.2010.75","url":null,"abstract":"It has been proven that the IEEE 802.16 broadband wireless access (BWA) network is the most preferable next-generation network with the well defined quality of service (QoS) framework. Due to lack of the scheduling algorithm for the guaranteed QoS in the IEEE 802.16 standard, many results for the scheduler of the IEEE 802.16 BWA network have been proposed. However, for the downlink transmission with the aggregate flow sharing the class queue, it is hard to guarantee the QoS requirements in the location-dependent wireless channel errors. In this paper, we propose a class-based downlink scheduling algorithm to compensate the wireless channel errors and to guarantee the QoS requirements.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on Performance of Inter-Vehicle Communications in Bidirectional Traffic Streams 双向交通流中车辆间通信性能研究
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.25
Xiaoyan Sun, Yuanlu Bao, Wei Lu, Jun Dai, Zhe Wang
{"title":"A Study on Performance of Inter-Vehicle Communications in Bidirectional Traffic Streams","authors":"Xiaoyan Sun, Yuanlu Bao, Wei Lu, Jun Dai, Zhe Wang","doi":"10.1109/ICFN.2010.25","DOIUrl":"https://doi.org/10.1109/ICFN.2010.25","url":null,"abstract":"Inter-vehicle communication (IVC) network has become an important topic in research for its potential advantages in enhancing traffic security and efficiency. This paper investigates the communication performance of IVC networks in two lane bidirectional traffic streams. By changing the transmission range of communication units and penetration rate of equipped vehicles, we studied several performance measures, such as average throughput, end to end delay and number of hops. The simulations were conducted in network simulator 2 (ns-2) with Monte Carlo method and the equipped vehicles were generated randomly according to the penetration rate. From the simulation results we found that the bidirectional traffic streams indeed affect each other’s communication performance. In addition, the average throughput and end to end delay can be improved by increasing the transmission range and penetration rate. The study could help to fix some network parameters such as transmission range to advance the communication performance of IVC networks.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"105 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132929616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design of High Stable Numerically Controlled Constant-current Source 高稳定度数控恒流源的设计
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.53
Tieyuan Chang, Guifeng Zhu, Wenjun Chen
{"title":"Design of High Stable Numerically Controlled Constant-current Source","authors":"Tieyuan Chang, Guifeng Zhu, Wenjun Chen","doi":"10.1109/ICFN.2010.53","DOIUrl":"https://doi.org/10.1109/ICFN.2010.53","url":null,"abstract":"A Numerically Controlled constant-current source is designed. A negative feedback of closed-loop is used in the source based on Single Chip Microcomputer. The system has a small ripple current and reliable step-adjustable function. The setting and the output are precise. The output of the constant-current source is stable when the load is changed. The errors can reach the level of 0.1%.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127852424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Protection Technology in IP over WDM Optical Network IP over WDM光网络保护技术研究
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.93
Ning Zhang, Hong Bao
{"title":"Research on Protection Technology in IP over WDM Optical Network","authors":"Ning Zhang, Hong Bao","doi":"10.1109/ICFN.2010.93","DOIUrl":"https://doi.org/10.1109/ICFN.2010.93","url":null,"abstract":"Protection is a very important problem in optical network. With the rapid development of WDM optical network, protection technology is paid more and more attentions. In this paper, we analyze the protection principle of WDM optical network, propose a protection method for optical network. We study several conventional protection mechanisms, and compare their performance with the proposed mechanism.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115459113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Algorithm for Computing Network Reliability Using Matrix Column-Transformation 基于矩阵列变换的网络可靠性计算新算法
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.74
Li Dongkui
{"title":"New Algorithm for Computing Network Reliability Using Matrix Column-Transformation","authors":"Li Dongkui","doi":"10.1109/ICFN.2010.74","DOIUrl":"https://doi.org/10.1109/ICFN.2010.74","url":null,"abstract":"In this paper, we give out some new concepts of 0-column transformation, 1-column transformation and addition of two columns. Using these transformations and network topology , combing with DFS and OBDD technology, we start from last column of the connection matrix, build a OBDD branching tree, which make use of logical expand branching condition, and last, end nodes of branching tree with 1 or some variable logical expression. With branching tree nodes, we can write out factored expression of s-t reliability of network G. This method, combining with [9] technique, can make the obtained OBDD branching tree compacted, and execution by computers may use little memory and avoid sub-graph redundancy.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"1707 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122108033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信