2013 International Conference on Computing, Networking and Communications (ICNC)最新文献

筛选
英文 中文
Rate selection analysis under semi-persistent scheduling in LTE networks LTE网络半持久调度下的速率选择分析
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504261
Donald Parruca, J. Gross
{"title":"Rate selection analysis under semi-persistent scheduling in LTE networks","authors":"Donald Parruca, J. Gross","doi":"10.1109/ICCNC.2013.6504261","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504261","url":null,"abstract":"Upcoming LTE networks have basically two different modes for scheduling data in the down-link by the base station. Dynamic scheduling brings the advantage of exploiting instantaneous channel state information while it puts on the other hand a significant burden on the system in terms of overhead and computation requirements. Especially for small packets that show up periodically, the overhead is typically too high. Therefore, the base station can serve such packet flows by the semi-persistent scheduling mode. In this mode, a certain resource allocation is fixed to a periodic schedule. While this does not allow any longer to exploit instantaneous channel states, it requires much less overhead. In this paper, we address the problem of selecting a modulation and coding scheme for such semi-persistent scheduling grants. The problem lies here in the stochastic characterization of the resource blocks over the next few seconds while on the other hand estimating based on such a characterization the blok error rate (and hence the average goodput). We provide a novel scheme, which outperforms all previously presented schemes significantly. The underlying model that we provide can also be used for any other long-term decision in an LTE system with semi-persistent scheduling such as interference coordination, handover decision etc.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134209550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
EgyHet: An energy-saving routing protocol for wireless heterogeneous sensor networks EgyHet:一种面向无线异构传感器网络的节能路由协议
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504187
Xiao Chen, Zanxun Dai, Hongchi Shi
{"title":"EgyHet: An energy-saving routing protocol for wireless heterogeneous sensor networks","authors":"Xiao Chen, Zanxun Dai, Hongchi Shi","doi":"10.1109/ICCNC.2013.6504187","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504187","url":null,"abstract":"Due to different requirements in application environment, wireless heterogeneous sensor networks (WHSNs) formed by sensors with various capacities are built. Data routing in WHSNs poses special challenges: First, it should be redesigned because the existing ones may not be directly used due to asymmetric links caused by diverse sensor transmission ranges. Second, it should guarantee an assured delivery rate because data is routed through lossy links. Third, it should be energy-efficient due to the limitation of sensor batteries and the difficulty of replacing them after deployment. To address these issues, we propose EgyHet: an Energy-saving routing protocol for Heterogeneous sensor networks. EgyHat deals with asymmetric links by establishing reverse paths. It saves energy by taking the shortest path, considering the remaining energy in sensors and reducing the number of forwarding nodes while guarantees an assured delivery rate. Simulation results show that EgyHat can save more energy yet keep the similar delivery ratio and latency to those of the existing routing protocol for WHSNs.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132833235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deadline-aware co-scheduling using anycast advance reservations in wavelength routed lambda grids 在波长路由的lambda网格中使用任意cast提前预约的截止日期感知协同调度
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504091
H. Kulkarni, A. Gadkar, V. Vokkarane
{"title":"Deadline-aware co-scheduling using anycast advance reservations in wavelength routed lambda grids","authors":"H. Kulkarni, A. Gadkar, V. Vokkarane","doi":"10.1109/ICCNC.2013.6504091","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504091","url":null,"abstract":"As grid applications evolve, the need for user controlled network infrastructure is apparent in order to support emerging dynamic and interactive services. Due to the inherent bandwidth offered by optical wavelength division multiplexed (WDM) networks, they prove to be a potential candidate to support the bandwidth intensive grid applications. In a grid environment, the available resources can be classified into two broad categories: grid resources which consist of computing and storage components that reside on each node of the network and network resources which provide bandwidth for the execution of a grid application. A typical grid application (job) is usually divided into a number of smaller tasks which need to be scheduled, on possibly different nodes of the network in order to ensure job completion. There usually exists some dependency between these tasks and a strict time-deadline within which the job needs to be completed. Rather than using an independent scheduling approach (at the grid and network levels), we address the co-scheduling problem in lambda-grids for advance reservation requests and aim at minimizing the job blocking probability. We use the anycasting communication paradigm referred to as co-anycasting, to allocate grid and network resources to all tasks of a job. We propose three heuristics: first free (FF), shortest hop (SH), and least used (LU) to solve the co-scheduling problem. Moreover, we compare the proposed co-anycasting approach to a grid-anycasting approach, wherein the anycasting flexibility is offered only at the grid level, and show through extensive simulations the performance benefit of using co-anycasting to support grid applications in a time-deadline environment.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130539720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A priority-aware channel selection scheme for real-time data transmission in cognitive radio networks 认知无线网络中实时数据传输的优先级感知信道选择方案
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504179
N. Motamedi, Sunil Kumar, Fei Hu, Nathaniel W. Rowe
{"title":"A priority-aware channel selection scheme for real-time data transmission in cognitive radio networks","authors":"N. Motamedi, Sunil Kumar, Fei Hu, Nathaniel W. Rowe","doi":"10.1109/ICCNC.2013.6504179","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504179","url":null,"abstract":"In cognitive radio networks, spectrum sensing and channel assignment are very important. Each user senses the channels and sends the results to a cluster head (CH) to make a decision about the channels by combining the results from different users. Moreover, the CH can assign the channels to the secondary users based on their requirements and priorities. In this paper, we assign the best channel(s) with the higher channel holding time to the user with highest priority. We consider two types of priorities - user priority and priority of sub-streams for each user. This policy gives more continuous channel usage to higher priority users. The results show that our scheme has higher weighted goodput than priority unaware scheme in the real-time and non-real time scenarios.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121874892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal Byzantine attacks on distributed detection in tree-based topologies 基于树的拓扑中分布式检测的最优拜占庭攻击
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504085
B. Kailkhura, Swastik Brahma, P. Varshney
{"title":"Optimal Byzantine attacks on distributed detection in tree-based topologies","authors":"B. Kailkhura, Swastik Brahma, P. Varshney","doi":"10.1109/ICCNC.2013.6504085","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504085","url":null,"abstract":"This paper considers the problem of optimal Byzantine attacks or data falsification attacks on distributed detection mechanism in tree-based topologies. First, we show that when more than a certain fraction of individual node decisions are falsified, the decision fusion scheme becomes completely incapable. Second, under the assumption that there is a cost associated with attacking each node (which represent resources invested in capturing a node or cloning a node in some cases), we address the problem of minimum cost Byzantine attacks and formulate it as the bounded knapsack problem (BKP). An algorithm to solve our problem in polynomial time is presented. Numerical results provide insights into our solution.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125700423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Traffic classification: Issues and challenges 流量分类:问题和挑战
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.12720/jcm.8.4.240-248
Y. Xue, Luoshi Zhang, Dawei Wang
{"title":"Traffic classification: Issues and challenges","authors":"Y. Xue, Luoshi Zhang, Dawei Wang","doi":"10.12720/jcm.8.4.240-248","DOIUrl":"https://doi.org/10.12720/jcm.8.4.240-248","url":null,"abstract":"Traffic classification has been extensively examined in recent years, as it is widely used in network management, design, security, advertising and research. In the past few years, the traffic classification techniques have been evolved along with the development of Internet protocols and applications, and many approaches have been investigated, proposed and developed. Nowadays, the ever increasing network bandwidth, the constantly sophisticated applications and the growth incentives to confuse classification systems to avoid filtering or blocking are among the reasons that traffic classification remains one of the hot areas in network research. In this paper, we first attempt to present an analysis of the existing traffic classification techniques, and dwell on their issues and challenges, then outline some recommendations that can improve the performance of traffic classification systems.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122344389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Caching for IPTV distribution with time-shift 带时移的IPTV分发缓存
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504212
H. Abrahamsson, M. Björkman
{"title":"Caching for IPTV distribution with time-shift","authors":"H. Abrahamsson, M. Björkman","doi":"10.1109/ICCNC.2013.6504212","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504212","url":null,"abstract":"Today video and TV distribution dominate Internet traffic and the increasing demand for high-bandwidth multimedia services puts pressure on Internet service providers. In this paper we simulate TV distribution with time-shift and investigate the effect of introducing a local cache close to the viewers. We study what impact TV program popularity, program set size, cache replacement policy and other factors have on the caching efficiency. The simulation results show that introducing a local cache close to the viewers significantly reduces the network load from TV-on-Demand services. By caching 4% of the program volume we can decrease the peak load during prime time by almost 50%. We also show that the TV program type and how program popularity changes over time can have a big influence on cache hit ratios and the resulting link loads.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122394840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Dynamic RMSA in spectrum-sliced elastic optical networks for high-throughput service provisioning 面向高吞吐量业务提供的频谱切片弹性光网络动态RMSA
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504113
Liang Zhang, W. Lu, Xiaoping Zhou, Zuqing Zhu
{"title":"Dynamic RMSA in spectrum-sliced elastic optical networks for high-throughput service provisioning","authors":"Liang Zhang, W. Lu, Xiaoping Zhou, Zuqing Zhu","doi":"10.1109/ICCNC.2013.6504113","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504113","url":null,"abstract":"We propose several novel dynamic routing, modulation and spectrum assignment (RMSA) algorithms for high-throughput service provisioning in spectrum-sliced elastic optical networks. The proposed algorithms can be applied to network provisioning, where a network operator needs to figure out an efficient way to serve each dynamic connection request based on current network status. The proposed algorithms can be categorized into two categories, dynamic RMSA using online path computation and dynamic RMSA using path-set updates. The former one updates link metrics based on their spectrum utilization status dynamically, and performs RMSA with online routing path computation for each request. The latter one pre-computes K shortest routing paths as the path-set for each source-destination pair in the network topology, performs RMSA based on different path-selection policies during dynamic provisioning, and updates a path-set by adding a new path in when a path in the set is not available for a request. We evaluate the proposed algorithms with simulations using the Poisson traffic model in a 14-node NSFNET topology. Simulation results indicate that the proposed algorithms outperform existing dynamic RMSA algorithm by providing lower bandwidth blocking probability, and reduce the blocking probability by one magnitude or more when the traffic load is light (≤ 700 Erlangs). The comparisons on network resource utilization also indicate that the proposed algorithms achieve larger resource utilization and hence provide higher throughput for network operations.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127186618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Wireless network virtualization 无线网络虚拟化
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.12720/jcm.8.5.337-344
Xin Wang, P. Krishnamurthy, D. Tipper
{"title":"Wireless network virtualization","authors":"Xin Wang, P. Krishnamurthy, D. Tipper","doi":"10.12720/jcm.8.5.337-344","DOIUrl":"https://doi.org/10.12720/jcm.8.5.337-344","url":null,"abstract":"Virtualization of wired networks and end computing systems has become one of the leading trends in networked ICT systems. In contrast relatively little virtualization has occurred in infrastructure based wireless networks, but the idea of virtualizing wireless access is gaining attention as it has the potential to improve spectrum utilization and perhaps create new services. In this paper we survey the state of the current research in virtualizing wireless networks. We define and describe possible architectures, the issues, hurdles and trends towards implementation of wireless network virtualization.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128835321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
Performance analysis of hierarchical selection diversity combining in Rayleigh fading 瑞利衰落中分层选择分集组合的性能分析
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504224
Sébastien Roy
{"title":"Performance analysis of hierarchical selection diversity combining in Rayleigh fading","authors":"Sébastien Roy","doi":"10.1109/ICCNC.2013.6504224","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504224","url":null,"abstract":"In a previous work, a hierarchical selection diversity scheme (HSD) was proposed as a cost-effective means of extracting a high diversity gain out of a large antenna array. To achieve this, the array is split up into a number of groups and the antenna having the best instantaneous SNR in each group is selected for further processing. The resulting selected set then undergoes maximal-ratio combining. It was shown that this scheme with a group size of 2 yields a performance within a few dBs of that of full maximal-ratio combining of the array, yet requires only half the RF chains. In this paper, derivations are provided for the outage probability with a group size of 2, for the output SNR distribution for a group size of 3, and error rate results are provided for arbitrary group sizes.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127643163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信