{"title":"HOLA: Heuristic and opportunistic link selection algorithm for energy efficiency in Industrial Internet of Things (IIoT) systems","authors":"K. Dhondge, R. Shorey, J. Tew","doi":"10.1109/COMSNETS.2016.7439960","DOIUrl":"https://doi.org/10.1109/COMSNETS.2016.7439960","url":null,"abstract":"Internet of Things (IoT) promises to be a key enabler in Smart Manufacturing and Smart Supply Chain. The IoT systems are responsible for enabling and improving the operational efficiencies of factories, plant floors, including assembly plants. These systems are characterized by reliable sensing and reporting of multiple parameters within the factory floor. Such sensing activities offer safe, efficient and optimized performance of not only the machines manufacturing the products, but also the workforce operating them. Industrial IoT (IIoT) systems could suffer from high and uneven energy consumption due to the nature of the network deployment. Such behavior is unacceptable as it not only increases the carbon footprint of the plant, but also makes the planned maintenance of IoT devices for battery replacement a huge challenge. In this paper, we propose a heuristic and opportunistic link selection algorithm, HOLA, which not only reduces the overall energy consumption of the IoT network but also balances it across the network. HOLA achieves this energy-efficiency by opportunistically offloading the IoT device data to smart-devices being carried by the workforce in the factory settings. Further, these smart-devices with multiple radio links such as Bluetooth, Wi-Fi, and 3G/4G LTE heuristically determine the best link to transmit the data to the Cloud based on the quality and energy cost of the link. Our experimental and simulation studies validate that HOLA can improve the energy efficiency of IIoT systems by reducing the overall energy consumption and balancing it across the network.","PeriodicalId":185861,"journal":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121255005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The importance of including carcinogenic benzene in real-time ambient air quality data in Delhi","authors":"Nancy Agrawal, Arushi Baboota","doi":"10.1109/COMSNETS.2016.7440018","DOIUrl":"https://doi.org/10.1109/COMSNETS.2016.7440018","url":null,"abstract":"The 2014 Environmental Performance Index ranked India 174 out of 178 countries in air quality [1]. With such high levels of air pollution, public health monitoring and surveillance systems have become indispensable. India has been taking initiatives to monitor air pollutants like PM2.5, PM10, O3, NO2, SO2 and CO [2]. However, air pollutants like benzene, lead, ammonia, dioxins and furans that are hazardous to health still remain untracked. In this paper, we present the relevance of tracking benzene based on its abundance in the Indian capital which is the world's second most populous city as per UN report of 2014 [3] and its harmful impact on human health. We then identify challenges in monitoring it and discuss possible implementation solutions. A 2010 report by WHO highlights the need to study benzene concentration in air by proclaiming that “benzene is carcinogenic to humans and no safe level of exposure can be recommended” [4].","PeriodicalId":185861,"journal":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126363435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raja Karmakar, Pravati Swain, Samiran Chattopadhyay, Sandip Chakraborty
{"title":"Performance modeling and analysis of high throughput wireless media access with QoS in noisy channel for different traffic conditions","authors":"Raja Karmakar, Pravati Swain, Samiran Chattopadhyay, Sandip Chakraborty","doi":"10.1109/COMSNETS.2016.7439970","DOIUrl":"https://doi.org/10.1109/COMSNETS.2016.7439970","url":null,"abstract":"The high throughput wireless extensions based on IEEE 802.11 or wireless-fidelity (Wi-Fi) support varieties of physical and media access control (MAC) sublayer features to boost up the physical data rate in wireless media. These include multiple input multiple out (MIMO) spatial multiplexing and spatial diversity, channel bonding, short guard intervals, advanced modulation and coding schemes (MCS), frame aggregations and block acknowledgements; for different Wi-Fi extensions like IEEE 802.11n, IEEE 802.11ac and IEEE 802.11ad. The existing studies show that although such physical extensions improve data rates, they have internal trade-offs in channel error and sustainability that directly impact the MAC layer frame aggregation and block acknowledgement performance. In this paper, we model the impact of the channel errors over MAC layer channel access with frame aggregation and block acknowledgement, considering the standard IEEE 802.11 service class differentiation for quality of service (QoS). The evolution of aggregated frame transmission has been modeled using a three dimension Markov chain diagram, considering channel error from physical layer and different traffic conditions. The model is validated through simulation results. The mathematical model is further explored to observe and analyze the impact of channel error over the aggregated frame based MAC scheduling with different QoS performance parameters, like channel throughput, frame loss probability and channel access delay. We observe that frame aggregation sometimes shows negative impact on channel access performance that demands the need for designing an adaptive aggregation strategy.","PeriodicalId":185861,"journal":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127766979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DistNSE: Distributed network service embedding across multiple providers","authors":"Ahmed Abujoda, Panagiotis Papadimitriou","doi":"10.1109/COMSNETS.2016.7439948","DOIUrl":"https://doi.org/10.1109/COMSNETS.2016.7439948","url":null,"abstract":"Network function virtualization (NFV) brings significant benefits by outsourcing network functions (NFs) to virtualized datacenters and enabling new business models, e.g. NF as a service (NFaaS). In this respect, network service embedding (i.e., the mapping of service chains) raises significant challenges due to the need to preserve correctness and satisfy NF location dependencies. The latter creates the need for service mapping across multiple NF Providers (NFPs), given the limited footprint of each NFP. This further exacerbates the network service embedding (NSE) problem, due to the NFPs' local policies and the confidentiality of network topology and resource availability. To address these issues, we present DistNSE, a distributed NSE framework that enables the collaboration among NFPs for NSE, while maintaining the privacy and autonomy of each NFP. DistNSE ensures competitive pricing by letting different NFPs compete for different NFs of a service chain. To this end, DistNSE decomposes NSE in two steps: (i) service chain partitioning using an algorithm that fosters competition across NFPs, and (ii) the assignment of chain segments to datacenter networks, while ensuring compliance with the NFP's policy. We further couple the proposed embedding methods with a communication protocol for interoperability and collaboration among the participating NFPs. We use simulations to assess the efficiency of DistNSE and identify significant gains over an existing distributed embedding framework (i.e., Polyvine).","PeriodicalId":185861,"journal":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126989510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Congestion analysis of unsignalized intersections","authors":"Abhishek, M. Mandjes, M. Boon, R. N. Queija","doi":"10.1109/COMSNETS.2016.7439951","DOIUrl":"https://doi.org/10.1109/COMSNETS.2016.7439951","url":null,"abstract":"This paper considers an unsignalized intersection used by two traffic streams. A stream of cars is using a primary road, and has priority over the other, low-priority, stream. Cars belonging to the latter stream cross the primary road if the gaps between two subsequent cars on the primary road is larger than their critical headways. Questions that naturally arise are: given the arrival pattern of the cars on the primary road, what is the maximum arrival rate of low-priority cars such that the number of such cars remains stable? In the second place, what can be said about the delay experienced by a typical car at the secondary road? This paper addresses such issues by considering a compact model that sheds light on the dynamics of the considered unsignalized intersection. The model, which is of a queueing-theoretic nature, reveals interesting insights into the impact of the user behavior on the above stability and delay issues. The contribution of this paper is twofold. First, we obtain new results for the aforementioned model with driver impatience. Secondly, we reveal some surprising aspects that have remained unobserved in the existing literature so far, many of which are caused by the fact that the capacity of the minor road cannot be expressed in terms of the mean gap size; instead more detailed characteristics of the critical headway distribution play a role.","PeriodicalId":185861,"journal":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132862023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Game theoretic analysis of tree based referrals for crowd sensing social systems with passive rewards","authors":"Kundan Kandhway, Bhushan Kotnis","doi":"10.1109/COMSNETS.2016.7439947","DOIUrl":"https://doi.org/10.1109/COMSNETS.2016.7439947","url":null,"abstract":"Participatory crowd sensing social systems rely on the participation of large number of individuals. Since humans are strategic by nature, effective incentive mechanisms are needed to encourage participation. A popular mechanism to recruit individuals is through referrals and passive incentives such as geometric incentive mechanisms used by the winning team in the 2009 DARPA Network Challenge and in multi level marketing schemes. The effect of such recruitment schemes on the effort put in by recruited strategic individuals is not clear. This paper attempts to fill this gap. Given a referral tree and the direct and passive reward mechanism, we formulate a network game where agents compete for finishing crowd sensing tasks. We characterize the Nash equilibrium efforts put in by the agents and derive closed form expressions for the same. We discover free riding behavior among nodes who obtain large passive rewards. This work has implications on designing effective recruitment mechanisms for crowd sourced tasks. For example, usage of geometric incentive mechanisms to recruit large number of individuals may not result in proportionate effort because of free riding.","PeriodicalId":185861,"journal":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116823550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure web Push system","authors":"Girija Saride, Jaya Balan Aaron, Joy Bose","doi":"10.1109/COMSNETS.2016.7439931","DOIUrl":"https://doi.org/10.1109/COMSNETS.2016.7439931","url":null,"abstract":"In existing push systems, there is no provision for additional security and the push messages from any content provider can be simply viewed by the user. This could cause problems in certain cases where additional security, privacy and authentication might be desirable before the user is allowed to view the push message, for example a message from the user's bank giving the current bank balance. In this paper we present a Smart Push system that ensures user security and privacy. Our push architecture incorporates a Gateway Client and Gateway Server component, enabling additional security measures and encryption of sent push messages at the gateway server before the messages reach the client device. In our system, a unique subscription Id is generated during the registration process, which hides the actual registration Id of the client device and thus ensures privacy. An additional spam filter at the gateway server further protects the client device from spam push messages. We present the architecture of the system and results of some tests performed to measure the effectiveness of the security aspects of the push architecture.","PeriodicalId":185861,"journal":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","volume":"25 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125673297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nawanol Theera-Ampornpunt, Seong Gon Kim, Asish Ghoshal, S. Bagchi, A. Grama, S. Chaterji
{"title":"Fast training on large genomics data using distributed Support Vector Machines","authors":"Nawanol Theera-Ampornpunt, Seong Gon Kim, Asish Ghoshal, S. Bagchi, A. Grama, S. Chaterji","doi":"10.1109/COMSNETS.2016.7439943","DOIUrl":"https://doi.org/10.1109/COMSNETS.2016.7439943","url":null,"abstract":"The field of genomics has seen a glorious explosion of high-quality data, with tremendous strides having been made in genomic sequencing instruments and computational genomics applications meant to make sense of the data. A common use case for genomics data is to answer the question if a specific genetic signature is correlated with some disease manifestations. Support Vector Machine (SVM) is a widely used classifier in computational literature. Previous studies have shown success in using these SVMs for the above use case of genomics data. However, SVMs suffer from a widely-recognized scalability problem in both memory use and computational time. It is as yet an unanswered question if training such classifiers can scale to the massive sizes that characterize many of the genomics data sets. We answer that question here for a specific dataset, in order to decipher whether some regulatory module of a particular combinatorial epigenetic “pattern” will regulate the expression of a gene. However, the specifics of the dataset is likely of less relevance to the claims of our work. We take a proposed theoretical technique for efficient training of SVM, namely Cascade SVM, create our classifier called EP-SVM, and empirically evaluate how it scales to the large genomics dataset. We implement Cascade SVM on the Apache Spark platform and open source this implementation1. Through our evaluation, we bring out the computational cost on each application process, the way of distributing the overall workload among multiple processes, which can potentially execute on different cores or different machines, and the cost of data transfer to different cores or different machines. We believe we are the first to shed light on the computational and network costs of training an SVM on a multi-dimensional genomics dataset. We also evaluate the accuracy of the classifier result as a function of the parameters of the SVM model.","PeriodicalId":185861,"journal":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient rate coverage with base station switching and load sharing in cellular networks","authors":"S. Kumar, Abhinav Kumar","doi":"10.1109/COMSNETS.2016.7440001","DOIUrl":"https://doi.org/10.1109/COMSNETS.2016.7440001","url":null,"abstract":"During low user demand, significant energy can be saved in a cellular network by using base station switching (BSS). However, coverage restrictions limit the number of base stations (BSs) a cellular operator can turn off. In this work, we examine the scenario when multiple cellular operators cooperate by sharing the load of their users with BSS (for example, on weekends). We show that significantly more energy can be saved by performing BSS with load sharing between the cellular operators. We formulate this cooperative BSS as an optimization problem. Further, for suitable service level agreements between the cellular operators, we show that the proposed optimization problem is real time solvable. Finally, we present results that quantify the achievable gains obtained by BSS with cooperation among the cellular operators. We also present the rate and coverage trade-off results which can be used by the cooperative cellular operators to find suitable points of operation.","PeriodicalId":185861,"journal":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130388454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolving models for meso-scale structures","authors":"A. Saxena, S. Iyengar","doi":"10.1109/COMSNETS.2016.7439976","DOIUrl":"https://doi.org/10.1109/COMSNETS.2016.7439976","url":null,"abstract":"Real world complex networks are scale free and possess meso-scale properties like core-periphery and community structure. We study evolution of the core over time in real world networks. This paper proposes evolving models for both unweighted and weighted scale free networks having local and global core-periphery as well as community structure. Network evolves using topological growth, self growth, and weight distribution function. To validate the correctness of proposed models, we use K-shell and S-shell decomposition methods. Simulation results show that the generated unweighted networks follow power law degree distribution with droop head and heavy tail. Similarly, generated weighted networks follow degree, strength, and edge-weight power law distributions. We further study other properties of complex networks, such as clustering coefficient, nearest neighbor degree, and strength degree correlation.","PeriodicalId":185861,"journal":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128333228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}