{"title":"On the efficacy of WDM virtual topology design strategies","authors":"Xuezhou Ma, K. Harfoush","doi":"10.1109/ICCNC.2013.6504115","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504115","url":null,"abstract":"Existing WDM virtual topology models mainly aim at maximizing the network throughput by optimizing predetermined objective functions. While the literature is rich in variants of such objective functions, they share a few deficiencies. Specifically, they abstract the problem with one fixed objective assuming that the throughput hindrance is uniform across the network, and do not consider node structure nor router utilization. These factors, when considered, affect network bottlenecks limiting a network throughput. As a result, none of the existing models fits all ISP networks. In this paper, we introduce a novel algorithm to determine a network bottleneck based on the 1) physical topology, 2) traffic demand and 3) technology constraints, and a topology model leading to optimized network throughput.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128132204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Zacharias, Thinh P. Q. Nguyen, Yevgeniy Kovchegov, Kyle Bradford
{"title":"Analysis of adaptive queueing policies via adiabatic approach","authors":"L. Zacharias, Thinh P. Q. Nguyen, Yevgeniy Kovchegov, Kyle Bradford","doi":"10.1109/ICCNC.2013.6504237","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504237","url":null,"abstract":"We introduce an adiabatic framework for studying adaptive queueing policies. The adiabatic framework provides analytical tools for stability analysis of slowly changing systems that can be modeled as time inhomogeneous reversible Markov chains. In particular, we consider queueing policies whose service rate is adaptively changed based on the estimated arrival rates that tend to vary with time. As a result, the packet distribution in the queue over time behaves like a time inhomogeneous reversible Markov chain. Our results provide an upper bound on the time for an initial distribution of packets in the queue to converge to a stationary distribution corresponding to some pre-specified queueing policy. These results are useful for designing adaptive queueing policies when arrival rates are unknown, and may or may not change with time. Furthermore, our analysis is readily extended for any system that can be modeled as a time inhomogeneous reversible Markov chain. We provide simulations that confirm our theoretical results.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121797968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CAREFOR: Collision-aware reliable forwarding technique for vehicular ad hoc networks","authors":"A. Vegni, Ahmad Mostafa, D. Agrawal","doi":"10.1109/ICCNC.2013.6504186","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504186","url":null,"abstract":"This paper presents a new probabilistic-based re-broadcast scheme, providing a reliable and low-collision packet forwarding in a vehicular ad hoc network. In the proposed technique called Collision-Aware REliable FORwarding, each vehicle rebroadcasts a received information on the basis of physical parameters associated with a vehicular environment, i.e., the distance from the source, the density of neighbors, and the forward transmission range. The key idea is that a node implicitly evaluates the probability that there is another node which can be more successful in rebroadcasting, that means (i) the message will be transmitted as far as possible, and (ii) will have a low number of expected collisions. Unlike other existing probability assignment schemes, our technique attempts to accurately forecast the next-hop transmission, while keeping the computation cost very low.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132393234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combined green resource and topology management for beyond next generation mobile broadband systems","authors":"S. Rehan, D. Grace","doi":"10.1109/ICCNC.2013.6504088","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504088","url":null,"abstract":"This paper introduces a green topology management scheme which aims to reduce energy consumption by switching off as many underutilised base stations as possible in beyond next generation mobile broadband networks. Strategies are proposed which activate or deactivate base stations according to local traffic conditions to find a trade-off between energy savings and system QoS. In addition, different green channel assignment schemes are introduced in order to further increase energy savings when used with the green topology management scheme. It is shown that topology management is able to significantly reduce energy consumption at low and medium traffic levels. These savings increase further by an additional average of 15% at all traffic levels when combined with the proposed green channel assignment schemes.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132662203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Niknamfar, Y. S. Manjili, M. Jamshidi, M. Shadaram
{"title":"Cost effective ROF communication system for CATV channels over WDM network and fuzzy modeling of the system","authors":"M. Niknamfar, Y. S. Manjili, M. Jamshidi, M. Shadaram","doi":"10.1109/ICCNC.2013.6504053","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504053","url":null,"abstract":"A radio over fiber (RoF) communication system is considered for cable television (CATV) channels over wavelength division multiplexing (WDM) network using an optical direct modulator (DM). Since the DM bandwidth is limited, increasing bandwidth efficiency of the system using M-ary quadrature amplitude modulation (MQAM) schemes will improve the link symbol error rate (SER) performance. Radio frequency (RF) signals with constellations of 16-64-256 QAM were simulated for CATV channels and the effect of using higher bit per symbol on the link performance was studied in order to reduce the cost of the network through utilizing financially feasible optical modulator. The 64-QAM scheme which is the most appropriate is used for the system of CATV channels. The link performance is studied for different combinations of effective parameters such as AC electrical power and Module to Bias ratio, which are crucial to be set properly, and SER is obtained at the front end of the receiver. The best setting options are proposed for 30 CATV channels with 64-QAM constellation with direct modulation transmitted over the 4-WDM link. Moreover, communication system is modeled by fuzzy logic using data-base obtained from simulation. Fuzzy reverse modeling of the system is also implemented in order to provide reasonable estimate of electrical power required to achieve a desired SER. Characteristics of forward and reverse fuzzy modeling are discussed. Simulation results represent satisfactory performance of the models.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134497622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hierarchical pea-based anomaly detection model","authors":"B. Tian, K. Merrick, Shui Yu, Jiankun Hu","doi":"10.1109/ICCNC.2013.6504158","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504158","url":null,"abstract":"A hierarchical intrusion detection model is proposed to detect both anomaly and misuse attacks. In order to further speed up the training and testing, PCA-based feature extraction algorithm is used to reduce the dimensionality of the data. A PCA-based algorithm is used to filter normal data out in the upper level. The experiment results show that PCA can reduce noise in the original data set and the PCA-based algorithm can reach the desirable performance.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116475718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mechanisms for coexistence of collocated WLAN and bluetooth in the same device","authors":"A. Xhafa, Yanjun Sun","doi":"10.1109/ICCNC.2013.6504210","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504210","url":null,"abstract":"In this paper, we investigate the performance of WLAN power save and active mode for collocated WLAN and Bluetooth technologies in the same device. We present a simple, yet accurate, analysis for these mechanisms and also show simulation results. We identify practical issues with these mechanisms and propose an algorithm that reduces overhead in the network from 30% to 10%.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123660633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Profit maximization and power management of green data centers supporting multiple slas","authors":"Mahdi Ghamkhari, Hamed Mohsenian Rad","doi":"10.1109/ICCNC.2013.6504129","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504129","url":null,"abstract":"While a large body of work has recently focused on reducing data center's energy expenses, there exists no prior work on investigating the trade-off between minimizing data center's energy expenditure and maximizing their revenue for various Internet and cloud computing services that they may offer. In this paper, we seek to tackle this shortcoming by proposing a systematic approach to maximize green data center's profit, i.e., revenue minus cost. In this regard, we explicitly take into account practical service-level agreements (SLAs) that currently exist between data centers and their customers. Our model also incorporates various other factors such as availability of local renewable power generation at data centers and the stochastic nature of data centers' workload. Furthermore, we propose an optimization-based profit maximization strategy for data centers for both cases, without and with behind-the-meter renewable generators. Using various experimental data and via computer simulations, we assess the accuracy of the proposed mathematical model for profit and also the performance of the proposed optimization-based profit maximization strategy.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient algorithm to optimize interference and system capacity for cognitive wireless networks","authors":"Manisha Wadhwa, Min Song, C. Xin, Komalpreet Kaur","doi":"10.1109/ICCNC.2013.6504206","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504206","url":null,"abstract":"In this paper, we study time spectrum block (TSB) assignment in cognitive radio networks. We consider a community cognitive radio network with a set of access points (APs), and formulate the TSB assignment as a quadratic integer programming (QIP) problem with an NP hard complexity. To avoid the NP-hard complexity, we propose a near-optimal heuristic algorithm LISTS (Least Interference and Switching based TSB Scheduling) that can be obtained at a much lower complexity. The algorithm is developed to solve this problem with the objective to minimize co-channel interference between APs (and their nodes) and channel switching overhead, and thus maximize system capacity. The LISTS algorithm offers near optimal solutions for TSB assignment. The overall system capacity increases by 40 % when compared with worst case of random TSB assignments.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125881617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Benner, Victor T. E. Echeverria, U. Onunkwo, Jay Patel, David Zage
{"title":"Harnessing many-core processors for scalable, highly efficient, and adaptable firewall solutions","authors":"R. Benner, Victor T. E. Echeverria, U. Onunkwo, Jay Patel, David Zage","doi":"10.1109/ICCNC.2013.6504161","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504161","url":null,"abstract":"Many-core processors have become the mainstay of today's computing systems. This fact and their ease of accessibility is now broadening the horizons of computational advances. In this work, we demonstrate the use of many-core processing platforms to provide scalable, efficient, and easily configurable firewall implementations on many-core processors. Our work has made possible, to the best of our knowledge, a first-known pipelined and scalable implementation of a stateful firewall on many-core processors. We discuss the results of our work and highlight areas for future considerations and improvements. Although this work focuses on the firewall as an exemplar network protection tool, the ideas developed apply to other network processing applications like network intrusion detection systems.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"155 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}