2013 International Conference on Computing, Networking and Communications (ICNC)最新文献

筛选
英文 中文
On the efficacy of WDM virtual topology design strategies WDM虚拟拓扑设计策略的有效性研究
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504115
Xuezhou Ma, K. Harfoush
{"title":"On the efficacy of WDM virtual topology design strategies","authors":"Xuezhou Ma, K. Harfoush","doi":"10.1109/ICCNC.2013.6504115","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504115","url":null,"abstract":"Existing WDM virtual topology models mainly aim at maximizing the network throughput by optimizing predetermined objective functions. While the literature is rich in variants of such objective functions, they share a few deficiencies. Specifically, they abstract the problem with one fixed objective assuming that the throughput hindrance is uniform across the network, and do not consider node structure nor router utilization. These factors, when considered, affect network bottlenecks limiting a network throughput. As a result, none of the existing models fits all ISP networks. In this paper, we introduce a novel algorithm to determine a network bottleneck based on the 1) physical topology, 2) traffic demand and 3) technology constraints, and a topology model leading to optimized network throughput.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128132204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of adaptive queueing policies via adiabatic approach 基于绝热方法的自适应排队策略分析
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504237
L. Zacharias, Thinh P. Q. Nguyen, Yevgeniy Kovchegov, Kyle Bradford
{"title":"Analysis of adaptive queueing policies via adiabatic approach","authors":"L. Zacharias, Thinh P. Q. Nguyen, Yevgeniy Kovchegov, Kyle Bradford","doi":"10.1109/ICCNC.2013.6504237","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504237","url":null,"abstract":"We introduce an adiabatic framework for studying adaptive queueing policies. The adiabatic framework provides analytical tools for stability analysis of slowly changing systems that can be modeled as time inhomogeneous reversible Markov chains. In particular, we consider queueing policies whose service rate is adaptively changed based on the estimated arrival rates that tend to vary with time. As a result, the packet distribution in the queue over time behaves like a time inhomogeneous reversible Markov chain. Our results provide an upper bound on the time for an initial distribution of packets in the queue to converge to a stationary distribution corresponding to some pre-specified queueing policy. These results are useful for designing adaptive queueing policies when arrival rates are unknown, and may or may not change with time. Furthermore, our analysis is readily extended for any system that can be modeled as a time inhomogeneous reversible Markov chain. We provide simulations that confirm our theoretical results.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121797968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CAREFOR: Collision-aware reliable forwarding technique for vehicular ad hoc networks 车辆自组织网络的碰撞感知可靠转发技术
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504186
A. Vegni, Ahmad Mostafa, D. Agrawal
{"title":"CAREFOR: Collision-aware reliable forwarding technique for vehicular ad hoc networks","authors":"A. Vegni, Ahmad Mostafa, D. Agrawal","doi":"10.1109/ICCNC.2013.6504186","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504186","url":null,"abstract":"This paper presents a new probabilistic-based re-broadcast scheme, providing a reliable and low-collision packet forwarding in a vehicular ad hoc network. In the proposed technique called Collision-Aware REliable FORwarding, each vehicle rebroadcasts a received information on the basis of physical parameters associated with a vehicular environment, i.e., the distance from the source, the density of neighbors, and the forward transmission range. The key idea is that a node implicitly evaluates the probability that there is another node which can be more successful in rebroadcasting, that means (i) the message will be transmitted as far as possible, and (ii) will have a low number of expected collisions. Unlike other existing probability assignment schemes, our technique attempts to accurately forecast the next-hop transmission, while keeping the computation cost very low.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132393234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Combined green resource and topology management for beyond next generation mobile broadband systems 超下一代移动宽带系统的绿色资源和拓扑管理相结合
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504088
S. Rehan, D. Grace
{"title":"Combined green resource and topology management for beyond next generation mobile broadband systems","authors":"S. Rehan, D. Grace","doi":"10.1109/ICCNC.2013.6504088","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504088","url":null,"abstract":"This paper introduces a green topology management scheme which aims to reduce energy consumption by switching off as many underutilised base stations as possible in beyond next generation mobile broadband networks. Strategies are proposed which activate or deactivate base stations according to local traffic conditions to find a trade-off between energy savings and system QoS. In addition, different green channel assignment schemes are introduced in order to further increase energy savings when used with the green topology management scheme. It is shown that topology management is able to significantly reduce energy consumption at low and medium traffic levels. These savings increase further by an additional average of 15% at all traffic levels when combined with the proposed green channel assignment schemes.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132662203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Cost effective ROF communication system for CATV channels over WDM network and fuzzy modeling of the system 基于WDM网络的有线电视频道低成本ROF通信系统及其模糊建模
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504053
M. Niknamfar, Y. S. Manjili, M. Jamshidi, M. Shadaram
{"title":"Cost effective ROF communication system for CATV channels over WDM network and fuzzy modeling of the system","authors":"M. Niknamfar, Y. S. Manjili, M. Jamshidi, M. Shadaram","doi":"10.1109/ICCNC.2013.6504053","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504053","url":null,"abstract":"A radio over fiber (RoF) communication system is considered for cable television (CATV) channels over wavelength division multiplexing (WDM) network using an optical direct modulator (DM). Since the DM bandwidth is limited, increasing bandwidth efficiency of the system using M-ary quadrature amplitude modulation (MQAM) schemes will improve the link symbol error rate (SER) performance. Radio frequency (RF) signals with constellations of 16-64-256 QAM were simulated for CATV channels and the effect of using higher bit per symbol on the link performance was studied in order to reduce the cost of the network through utilizing financially feasible optical modulator. The 64-QAM scheme which is the most appropriate is used for the system of CATV channels. The link performance is studied for different combinations of effective parameters such as AC electrical power and Module to Bias ratio, which are crucial to be set properly, and SER is obtained at the front end of the receiver. The best setting options are proposed for 30 CATV channels with 64-QAM constellation with direct modulation transmitted over the 4-WDM link. Moreover, communication system is modeled by fuzzy logic using data-base obtained from simulation. Fuzzy reverse modeling of the system is also implemented in order to provide reasonable estimate of electrical power required to achieve a desired SER. Characteristics of forward and reverse fuzzy modeling are discussed. Simulation results represent satisfactory performance of the models.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134497622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A hierarchical pea-based anomaly detection model 一种分层的基于豆子的异常检测模型
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504158
B. Tian, K. Merrick, Shui Yu, Jiankun Hu
{"title":"A hierarchical pea-based anomaly detection model","authors":"B. Tian, K. Merrick, Shui Yu, Jiankun Hu","doi":"10.1109/ICCNC.2013.6504158","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504158","url":null,"abstract":"A hierarchical intrusion detection model is proposed to detect both anomaly and misuse attacks. In order to further speed up the training and testing, PCA-based feature extraction algorithm is used to reduce the dimensionality of the data. A PCA-based algorithm is used to filter normal data out in the upper level. The experiment results show that PCA can reduce noise in the original data set and the PCA-based algorithm can reach the desirable performance.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116475718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mechanisms for coexistence of collocated WLAN and bluetooth in the same device 在同一设备中共存并置WLAN和蓝牙的机制
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504210
A. Xhafa, Yanjun Sun
{"title":"Mechanisms for coexistence of collocated WLAN and bluetooth in the same device","authors":"A. Xhafa, Yanjun Sun","doi":"10.1109/ICCNC.2013.6504210","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504210","url":null,"abstract":"In this paper, we investigate the performance of WLAN power save and active mode for collocated WLAN and Bluetooth technologies in the same device. We present a simple, yet accurate, analysis for these mechanisms and also show simulation results. We identify practical issues with these mechanisms and propose an algorithm that reduces overhead in the network from 30% to 10%.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123660633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Profit maximization and power management of green data centers supporting multiple slas 支持多个sla的绿色数据中心的利润最大化和电源管理
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504129
Mahdi Ghamkhari, Hamed Mohsenian Rad
{"title":"Profit maximization and power management of green data centers supporting multiple slas","authors":"Mahdi Ghamkhari, Hamed Mohsenian Rad","doi":"10.1109/ICCNC.2013.6504129","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504129","url":null,"abstract":"While a large body of work has recently focused on reducing data center's energy expenses, there exists no prior work on investigating the trade-off between minimizing data center's energy expenditure and maximizing their revenue for various Internet and cloud computing services that they may offer. In this paper, we seek to tackle this shortcoming by proposing a systematic approach to maximize green data center's profit, i.e., revenue minus cost. In this regard, we explicitly take into account practical service-level agreements (SLAs) that currently exist between data centers and their customers. Our model also incorporates various other factors such as availability of local renewable power generation at data centers and the stochastic nature of data centers' workload. Furthermore, we propose an optimization-based profit maximization strategy for data centers for both cases, without and with behind-the-meter renewable generators. Using various experimental data and via computer simulations, we assess the accuracy of the proposed mathematical model for profit and also the performance of the proposed optimization-based profit maximization strategy.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
An efficient algorithm to optimize interference and system capacity for cognitive wireless networks 一种有效的认知无线网络干扰和系统容量优化算法
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504206
Manisha Wadhwa, Min Song, C. Xin, Komalpreet Kaur
{"title":"An efficient algorithm to optimize interference and system capacity for cognitive wireless networks","authors":"Manisha Wadhwa, Min Song, C. Xin, Komalpreet Kaur","doi":"10.1109/ICCNC.2013.6504206","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504206","url":null,"abstract":"In this paper, we study time spectrum block (TSB) assignment in cognitive radio networks. We consider a community cognitive radio network with a set of access points (APs), and formulate the TSB assignment as a quadratic integer programming (QIP) problem with an NP hard complexity. To avoid the NP-hard complexity, we propose a near-optimal heuristic algorithm LISTS (Least Interference and Switching based TSB Scheduling) that can be obtained at a much lower complexity. The algorithm is developed to solve this problem with the objective to minimize co-channel interference between APs (and their nodes) and channel switching overhead, and thus maximize system capacity. The LISTS algorithm offers near optimal solutions for TSB assignment. The overall system capacity increases by 40 % when compared with worst case of random TSB assignments.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125881617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Harnessing many-core processors for scalable, highly efficient, and adaptable firewall solutions 利用多核处理器实现可伸缩、高效和可适应的防火墙解决方案
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504161
R. Benner, Victor T. E. Echeverria, U. Onunkwo, Jay Patel, David Zage
{"title":"Harnessing many-core processors for scalable, highly efficient, and adaptable firewall solutions","authors":"R. Benner, Victor T. E. Echeverria, U. Onunkwo, Jay Patel, David Zage","doi":"10.1109/ICCNC.2013.6504161","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504161","url":null,"abstract":"Many-core processors have become the mainstay of today's computing systems. This fact and their ease of accessibility is now broadening the horizons of computational advances. In this work, we demonstrate the use of many-core processing platforms to provide scalable, efficient, and easily configurable firewall implementations on many-core processors. Our work has made possible, to the best of our knowledge, a first-known pipelined and scalable implementation of a stateful firewall on many-core processors. We discuss the results of our work and highlight areas for future considerations and improvements. Although this work focuses on the firewall as an exemplar network protection tool, the ideas developed apply to other network processing applications like network intrusion detection systems.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"155 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信