{"title":"From fixed to mobile femtocells in LTE systems: Issues and challenges","authors":"R. Raheem, A. Lasebae, Mahdi Aiash, J. Loo","doi":"10.1109/FGCT.2013.6767218","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767218","url":null,"abstract":"This paper investigates the concept of Mobile Femtocell which is the extension of implementing Mobile Relays and Fixed Femtocells. Mobile Femtocells can be deployed in public transportation vehicles such as trains, buses or private cars that form its own cell inside vehicles to serve vehicular and mobile User Equipments. This study intends to help cell-edge users to have better signal strength. An investigation into Long Term Evolution cell-edge users' performance is being conducted by investigating the deployment of Mobile Femtocells in LTE system. The throughput for cell edge users can be improved by deploying Fixed/Mobile Femtocells. This paper is considering several scenarios namely; Fixed Femtocells with Fixed users, Mobile Femtocells with fixed users, Fixed Femtocells with mobile users and Finally Mobile Femtocells with mobile users. The achieved results via Matlab simulation showed that Mobile Femtocells' users have enjoyed better Quality of Services than Fixed Femtocells' users. The improved performance has been noticed through the improvement of the Mobile Femtocells UEs' spectral efficiency, throughput and SINR over the Fixed Femtocells' users.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127098848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bandwidth-IPSec security trade-off in IPv4 and IPv6 in Windows 7 environment","authors":"S. S. Kolahi, Y. Cao, Hong Chen","doi":"10.1109/FGCT.2013.6767214","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767214","url":null,"abstract":"Due to overheads of security algorithms used in IPSec, transferring data using IPSec is known to be significantly slow compared with open system. In this paper, we present new results on performance of IPSec using 7 encryption systems for both IPv4 and IPv6 using Windows 7 and wireless network access. For the system studied, enabling IPSec results in approximately 60%(IPv4) and 48%s(IPv6) lessTCP throughput compared to open system. Among encryption mechanisms, 3DES-SHA provides the highest TCP bandwidth for IPv4, while 3DES-MD5 gives the best result for IPv6. We also provide the results for UDP.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132564907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protocol composition revisited: A template-based transport architecture","authors":"Denis Martin","doi":"10.1109/FGCT.2013.6767205","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767205","url":null,"abstract":"Protocol composition approaches promise to construct specialized protocols on-demand by combining existing protocol mechanisms as building blocks. While many proposal were made in the past twenty years, most of them haven't been widely used due to practical complexity. Yet the urge for modular protocol designs is still present to allow easier adoption of new algorithms within existing protocols, especially at the transport layer. In this paper, we describe a component-based design concept for protocols, where each protocol type defines a template for interacting protocol building blocks. In addition, we propose a detailed template for transport protocols that can accomodate mechanisms not available with TCP - both as an example and a design proposal of its own. With the discussion of variations of this transport protocol template, we show the benefit of this approach. In addition, we show simulatively that a specific behavior of an existing protocol configuration can be reproduced with this template.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116665778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Suppression of phase noise based on superimposed pilots in STBC-OFDM system","authors":"Peng Zhangyou, Liu Yang, Liu Xu, Liu Ruoran","doi":"10.1109/FGCT.2013.6767196","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767196","url":null,"abstract":"In order to solve the CPE (common phase error) and ICI (inter-subcarrier interference) of a STBC-OFDM cooperative system which is caused by the phase noise between the transmitter and receiver. This paper analyzes the performance of two transmit antennas and two receive antennas STBC-OFDM system in frequency-selective Rayleigh channel and proposes a novel suppression method of phase noise, which can get the associations between received signal and pilots using the superimposed pilots, and then apply the iterative operation to improve the accuracy of CPE estimation and signal decision, meanwhile, it can also suppress the ICI caused by the phase noise. The simulation results show that this algorithm can improve the performance of high speed STBC-OFDM cooperation system effectively.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125570489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security analysis of the constrained application protocol in the Internet of Things","authors":"Thamer A. H. Alghamdi, A. Lasebae, Mahdi Aiash","doi":"10.1109/FGCT.2013.6767217","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767217","url":null,"abstract":"The concept of Internet of Things involves huge number of constrained devices such as wireless sensors to communicate in a machine-to-machine pattern. Based on the implementation scenario, such communication might take place over a public network such as the Internet, which is based on the TCP/IP stack. However, different research working groups argue that some of these stack protocols such as the Hyper Text Transfer Protocol (HTTP) might not be suitable for constrained devices. Therefore, the IETF Constrained RESTful Environments (CoRE) WG has proposed the Constrained Application Protocol (CoAP); an application layer protocol for constrained devices in the IoTs. The CoRE WG proposed using IPSec or DTLS to secure the CoAP communication at different levels of the protocol stack. However, to investigate the feasibility of such a proposal, we use the X.805 security standard to analyze the security aspects of such implementation. The analysis highlights the main security drawbacks and hence argues of the need for a new integrated security solution.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128528744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Route planning in asymmetric military environments","authors":"T. Ruuben, Ove Kreison","doi":"10.1109/FGCT.2013.6767187","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767187","url":null,"abstract":"Current article gives an overview of how situation aware route planning can be used for improving route planning tasks in urban military operations. Unlike conventional route planning tasks that are usually used for finding shortest routes, present approach uses multiple parameters and categories for describing asymmetric threats emanating from surrounding urban environments and planning routes. These parameters can be combined together to find routes with different properties. Multiple tests were performed using A* and genetic algorithm to present how different parameter values and their combinations affect output routes and how different threats can be avoided by taking those parameters into account. Tests showed that both algorithms can be used for route planning, but A* would be the recommended choice, because the probability of it finding the global optimum is larger.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123228447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The impact of varying the detector and modulation types on inter satellite link (ISL) realizing the allowable high data rate","authors":"M. Zaki, A. A. E. Aziz, H. Fayed, M. Aly","doi":"10.1109/FGCT.2013.6767191","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767191","url":null,"abstract":"This paper investigates the dependence of the transmission speed and the system performance of an inter satellite link (ISL) on the modulation technique and the type of detector used. In ISL links, the modulation technique used in transmission and the type of detector used for reception are significant factors that directly affect the quality of transmission between satellites. The paper proposes a transmission link model to obtain the maximum allowable data rate over different orbits. In this study, the Q-factor and the bit error rate (BER) are measured and analyzed for all scenarios in order to optimize the ISL performance.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116514985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving HDFS performance using local caching system","authors":"Sangwon Yoon, In-Yong Jung, Ki-Hyun Kim, C. Jeong","doi":"10.1109/FGCT.2013.6767200","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767200","url":null,"abstract":"I/O performance of file system in various distributed parallel clusters can critically affect content-aware application performance. In this paper, we present a new architecture for Local Caching System which adjusts content locality between local file system and Hadoop Distributed File System by using proper cache algorithm and managing content queue and location. Also, we show that our local caching system improves the performance of content-aware application sharply.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114790672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The real-life mobility model: RLMM","authors":"Michal Gorawski, K. Grochla","doi":"10.1109/FGCT.2013.6767180","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767180","url":null,"abstract":"The performance evaluation of mobile wireless networks requires a representation of user mobility. Mobility models are the essential part of such evaluation because they assure examples of mobile nodes movement for typical scenarios. Mobility models provide synthetic traces adjusted to user's needs. We propose a novel RLMM model that produces synthetic traces of a working human and includes clear division on working days and weekend activities. We describe the model and evaluate it using simulation. The model provides better representation of changes in human behavior on different days than the models available in the literature.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"23 7-8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On demand-based frequency allocation to mitigate interference in Femto-Macro LTE cellular network","authors":"Shahadate Rezvy, S. Rahman, A. Lasebae, J. Loo","doi":"10.1109/FGCT.2013.6767182","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767182","url":null,"abstract":"Long Term Evolution (LTE) has introduced Femtocells technology in cellular mobile communication system in order to enhance indoor coverage. Femtocell is low-power, very small and cost effective cellular base station used in indoor environment. However, the impact of Femtocells on the performance of the conventional Macrocell system leads interference problem between Femtocells and pre-existing Macrocells as they share the same licensed frequency spectrum. In this paper, we propose an efficient method to mitigate interference and improve system capacity in the existing Femto-Macro two tier networks. In our proposed scheme, we use a novel frequency planning for two tiers cellular networks using frequency reuse technique where Macro base stations allocate frequency sub-bands for Femtocells users on demand basis through Femtocells base stations. This novel frequency reuse technique aims to mitigate interference by improving system throughput.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134604419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}