37th Annual IEEE Conference on Local Computer Networks最新文献

筛选
英文 中文
A real-time services performance and interference mitigation for femtocell scenarios in LTE networks LTE网络中飞蜂窝场景的实时业务性能和干扰缓解
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423671
Mauricio Iturralde, T. Ali-Yahiya, A. Wei, A. Beylot
{"title":"A real-time services performance and interference mitigation for femtocell scenarios in LTE networks","authors":"Mauricio Iturralde, T. Ali-Yahiya, A. Wei, A. Beylot","doi":"10.1109/LCN.2012.6423671","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423671","url":null,"abstract":"In order to enhance the Quality of Service in LTE, femtocell architecture has been proposed as a promising solution. However, interference is the main weak point in femtocell scenarios which causes a serious impact on multimedia services performance. Femtocell interference mitigation in LTE networks is the principle objective of this paper. We propose an enhancement of the well known four-coloring method for interference mitigation by combining it with cooperative game theory. Our proposed scheme aims to provide a solution to effectively achieve femtocell interference mitigation while guaranteeing the bitrate application for real-time services. The basic metrics of quality of service (QoS) such as throughput, Packet Loss Ratio (PLR), delay and Signal-to-Interference-plus-Noise-Ratio (SINR) are investigated. Our simulation environment is derived from realistic scenarios in order to study the performance of real-time service like Video and VoIP applications. Throughout our numerical results, we demonstrate the improvement of QoS constraints along with balancing between interference reduction requirement and resource allocation efficiency for real-time applications.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122298757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A distributed energy saving approach for Ethernet switches in data centers 数据中心以太网交换机的分布式节能方法
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423667
Weisheng Si, J. Taheri, Albert Y. Zomaya
{"title":"A distributed energy saving approach for Ethernet switches in data centers","authors":"Weisheng Si, J. Taheri, Albert Y. Zomaya","doi":"10.1109/LCN.2012.6423667","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423667","url":null,"abstract":"With popularity of data centers, energy efficiency of Ethernet switches in them is becoming a critical issue. Most existing energy saving approaches use a centralized methodology that assumes global knowledge of data center networks. Though these approaches can achieve nearly optimal energy saving for static traffic patterns, they are not suitable when the traffic patterns can change rapidly or the data centers have a large size. To overcome these limitations, this paper proposes a novel distributed approach called eAware that dynamically idles a port or a switch to save energy by examining the queue lengths and utilizations at switch ports. Through extensive simulations in ns-2, we compare eAware with an existing energy oblivious approach, showing that eAware can save 30%-50% on the total energy consumption by switches in data centers, and only increases the average end-to-end delay of packets by 3%-20% and the packet loss ratio by 0%-0.9%.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Interconnecting disjoint network segments using a mix of stationary and mobile nodes 使用固定和移动节点的混合连接不连接的网络段
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423631
Ahmad Abbas, M. Younis
{"title":"Interconnecting disjoint network segments using a mix of stationary and mobile nodes","authors":"Ahmad Abbas, M. Younis","doi":"10.1109/LCN.2012.6423631","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423631","url":null,"abstract":"In many applications need arises to connect a set of disjoint nodes or segments. Examples include repairing a partitioned network topology after the failure of multiple nodes, federating a set of standalone networks to serve an emerging event, and forming a strongly connected topology for a sparsely located data sources. Contemporary solutions for interconnecting these disjoint segments/nodes either deploy stationary relay nodes (RN) to form data paths or employ one or multiple mobile data collectors (MDCs) that pick packets from sources and transport them to destinations. The RN-based solution is preferred since it establishes permanent links as opposed to the intermittent links provided by the MDCs. In this paper we investigate the interconnection problem when the number of available RNs is insufficient for forming a stable topology and a mix of RNs and MDCs is to be used. We present an algorithm for determining where the RNs are to be placed and planning optimized travel routes for the MDCs so that the data delivery latency as well as the MDC motion overhead are minimized. The performance of the algorithm is validated through simulation.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127648505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards an architecture for mobile healthcare 迈向移动医疗体系结构
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423623
P. J. Dillon, T. Znati
{"title":"Towards an architecture for mobile healthcare","authors":"P. J. Dillon, T. Znati","doi":"10.1109/LCN.2012.6423623","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423623","url":null,"abstract":"The growing costs of healthcare necessitate innovate means of healthcare delivery. We propose the concept of the tetherless patient, an augmentation of current healthcare delivery for a large and potentially growing class of conditions and diseases that allows continuous monitoring of patients beyond the confines of traditional points of care. To address the multifaceted challenges of supporting this paradigm, this paper focuses on a context-aware, mobile architecture that considers the entire path from sensor to clinician. It presents a formal mathematical model of the architecture, discusses our experience implementing it on a set of Android smartphones, and demonstrates feasibility in supporting context-aware applications.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127789497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Characterization and modeling in large-scale urban DTNs 大规模城市dtn的表征与建模
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423647
Chunhe Xia, Dongyue Liang, Haiquan Wang, Min Luo, Weifeng Lv
{"title":"Characterization and modeling in large-scale urban DTNs","authors":"Chunhe Xia, Dongyue Liang, Haiquan Wang, Min Luo, Weifeng Lv","doi":"10.1109/LCN.2012.6423647","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423647","url":null,"abstract":"In Delay Tolerant Networks (DTNs), characteristics of mobility model have essential impact on routing protocols design and verification. Most of current studies about network characteristics are derived from theoretical models or small-scale real network traces. Properties of nodes in those networks are simple and can not reflect features in large-scale applications. In addition, few studies focus on modeling large-scale urban DTNs based on the network characteristics. In this paper, we analyze a large-scale urban DTN including traces from 12096 taxies in Beijing City. We observed that inter contact time (ICT) between two nodes satisfies exponential distribution, and the network forms a number of hotspot areas in which the vehicles tend to cluster. Based on the observation, we design a DTN mobility model by introducing characteristics of hotspot area and prove that distribution of ICT in this model also exhibits exponential nature as it is in real urban DTNs. Our further simulation experiment reveals the similarity between the proposed model and urban DTNs. This result thus demonstrates that the model is rational to guide DTN protocols design and verification in large-scale applications.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132755629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Half-Symmetric Lens based localization algorithm for wireless sensor networks 基于半对称透镜的无线传感器网络定位算法
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423639
Noureddine Lasla, A. Derhab, Abdelraouf Ouadjaout, Miloud Bagaa, A. Ksentini, N. Badache
{"title":"Half-Symmetric Lens based localization algorithm for wireless sensor networks","authors":"Noureddine Lasla, A. Derhab, Abdelraouf Ouadjaout, Miloud Bagaa, A. Ksentini, N. Badache","doi":"10.1109/LCN.2012.6423639","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423639","url":null,"abstract":"The area-based localization algorithms use only the location information of some reference nodes, called anchors, to give the residence area of the remaining nodes. The current algorithms use triangle, ring or circle as a geometric shape to determine the sensors' residence area. Existing works suffer from two major problems: (1) in some cases, they might issue wrong decisions about nodes' presence inside a given area, or (2) they require high anchor density to achieve a low location estimation error. In this paper, we deal with the localization problem by introducing a new way to determine the sensors' residence area which shows a better accuracy than the existing algorithms. Our new localization algorithm, called HSL (Half Symmetric Lens based localization algorithm for WSN), is based on the geometric shape of half-symmetric lens. We also uses the Voronoi diagram in HSL to mitigate the problem of unlocalizable sensor nodes. Finally, we conduct extensive simulations to evaluate the performance of HSL. Simulation results show that HSL has better locatable ratio and location accuracy compared to representative state-of-the-art area-based algorithms.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134353341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A privacy-preserving reputation system for participatory sensing 参与式感知的隐私保护信誉系统
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423585
Kuan Lun Huang, S. Kanhere, Wen Hu
{"title":"A privacy-preserving reputation system for participatory sensing","authors":"Kuan Lun Huang, S. Kanhere, Wen Hu","doi":"10.1109/LCN.2012.6423585","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423585","url":null,"abstract":"Participatory sensing is a revolutionary paradigm in which volunteers collect and share information from their local environment using mobile phones. The design of a successful participatory sensing application is met with two challenges - (1) user privacy and (2) data trustworthiness. Addressing these challenges concurrently is a non-trivial task since they result in conflicting system requirements. User privacy is often achieved by removing the links between successive user contributions while such links are essential in establishing trust. In this work, we present a way to transfer reputation values (which is a proxy for assessing trustworthiness) between anonymous contributions. We also propose a reputation anonymization scheme that prevents the inadvertent leakage of privacy due to the inherent relationship between reputation information. We conduct extensive simulations using real-world mobility traces and practical application. The results show that our solution reduces the probabilities of users being tracked via successive contributions by as much as 80%. Moreover, this improvement has no discernible impact on the normal operation of the application.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114633764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Near-optimal routing for contour detection in wireless sensor networks 无线传感器网络中轮廓检测的近最优路由
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423662
V. Pulimi, T. Paul, Kevin G. Stanley, D. Eager
{"title":"Near-optimal routing for contour detection in wireless sensor networks","authors":"V. Pulimi, T. Paul, Kevin G. Stanley, D. Eager","doi":"10.1109/LCN.2012.6423662","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423662","url":null,"abstract":"Wireless sensor networks are often deployed to monitor scalar fields. Commonly, these networks employ a query-based architecture, where specific data are requested by the sink node, and the network responds. Contours or isolines are compact representations of the state of a scalar field, and are useful abstractions of scalar field behavior. Previously researchers have examined algorithms and policies for detecting contours in query-based sensor networks, but have only addressed individual components of the process. In this paper we present a set of algorithms for contour detection in WSNs, and associated oracle functions to provide an unbiased optimality comparison. We show that our algorithms, and in particular our response and aggregation policy provide near-optimal performance in simulated networks measuring physically realistic scalar fields.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122925720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
LPS and LRF: Efficient buffer management policies for Delay and Disruption Tolerant Networks LPS和LRF:延迟和中断容忍网络的有效缓冲管理策略
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423649
J. Naves, I. Moraes, C. Albuquerque
{"title":"LPS and LRF: Efficient buffer management policies for Delay and Disruption Tolerant Networks","authors":"J. Naves, I. Moraes, C. Albuquerque","doi":"10.1109/LCN.2012.6423649","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423649","url":null,"abstract":"In Delay and Disruption Tolerant Networks (DTNs), the message delivery rate is impacted by the buffer management policy adopted by nodes once buffer overflows occur frequently. This paper proposes two new buffer management policies. The first one, called LPS (Less Probable Sprayed), uses the messages delivery probability and estimates the number of replicas already disseminated to decide which message to drop. The second one, named LRF (Least Recently Forwarded), drops the least recently forwarded message based on the assumption that messages not forwarded over a certain period of time have already reached several next hops. These two policies are implemented and compared with existing proposals found in the literature. The analysis considers traces of three real networks in which LPS and LRF policies provide higher delivery rates up to 75% and 37%, respectively, than the rate provided by the second best policy, with less overhead.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130256919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A novel dynamic Q-learning-based scheduler technique for LTE-advanced technologies using neural networks 基于神经网络的lte先进技术的一种新的动态q学习调度技术
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423642
I. Comsa, Sijing Zhang, Mehmet Emin Aydin, P. Kuonen, J. Wagen
{"title":"A novel dynamic Q-learning-based scheduler technique for LTE-advanced technologies using neural networks","authors":"I. Comsa, Sijing Zhang, Mehmet Emin Aydin, P. Kuonen, J. Wagen","doi":"10.1109/LCN.2012.6423642","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423642","url":null,"abstract":"The tradeoff concept between system capacity and user fairness attracts a big interest in LTE-Advanced resource allocation strategies. By using static threshold values for throughput or fairness, regardless the network conditions, makes the scheduler to be inflexible when different tradeoff levels are required by the system. This paper proposes a novel dynamic neural Q-learning-based scheduling technique that achieves a flexible throughput-fairness tradeoff by offering optimal solutions according to the Channel Quality Indicator (CQI) for different classes of users. The Q-learning algorithm is used to adopt different policies of scheduling rules, at each Transmission Time Interval (TTI). The novel scheduling technique makes use of neural networks in order to estimate proper scheduling rules for different states which have not been explored yet. Simulation results indicate that the novel proposed method outperforms the existing scheduling techniques by maximizing the system throughput when different levels of fairness are required. Moreover, the system achieves a desired throughput-fairness tradeoff and an overall satisfaction for different classes of users.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129668723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信