Antoniel da Silva Rego, J. Celestino, André L. M. dos Santos, E. Cerqueira, Ahmed Patel, M. Taghavi
{"title":"BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks","authors":"Antoniel da Silva Rego, J. Celestino, André L. M. dos Santos, E. Cerqueira, Ahmed Patel, M. Taghavi","doi":"10.1109/ICON.2012.6506592","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506592","url":null,"abstract":"Wireless Sensor Network is a special type of ad hoc networks that show many challenges, mainly related to energy consumption of sensor nodes. This paper presents the BEE-C, a hierarchical routing algorithm bioinspired by the behavior of bees for Wireless Sensor Networks (WSN), which aims to save energy of sensor nodes. The BEE-C is based on the LEACH (Low Energy Adaptive Clustering Hierarchy) protocol and LEACH-C (LEACH Centered) protocol, which are two well known protocols for WSN in the literature. The BEE-C is applied to sensor networks with continuous data dissemination. The results show gains on BEE-C compared to LEACH and LEACH-C.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Yonghang, Ci Lin-lin, Wang Zhiming, Zhang Lili
{"title":"Address Auto-configuration in MANET with multiple gateways: Analysis and measurement","authors":"Yan Yonghang, Ci Lin-lin, Wang Zhiming, Zhang Lili","doi":"10.1109/ICON.2012.6506550","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506550","url":null,"abstract":"A mobile node who wants to access the Internet must be firstly configured a global IP address. An address autoconfiguration scheme used for assigning IP address to the mobile nodes in the MANET is proposed in this paper. The proposed scheme works correctly and does not have the limitations of earlier solutions. This scheme enables the mobile node to configure a MANET-local address and then configure a global address. Then, we evaluate the performance of the solution through theoretical analysis and simulation experiments. Through the theoretical analysis and simulation experiments, it shows that our approach has lower latency and reasonable communication overhead. Finally, we conclude with a discussion of the related future work.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"294 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120862997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote tracking protocol with predictive localization algorithm","authors":"Alok Pathak, L. Wong, Huaqun Guo, Yongdong Wu","doi":"10.1109/ICON.2012.6506568","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506568","url":null,"abstract":"The free availability of GPS information has truly made the location based services for the public possible. Most of the application in the current scenario is for tracking one's own location. The objective in this paper is to design a protocol that uses the concept of GPS based location tracking and the merits of GSM based communication to track and trace a vehicle, that is remote to the user or the main server. A predictive localization algorithm is also implemented. The field tests show the accuracy of our design.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131214435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance study of WDM OPS employing tunable converter sharing under self-similar variable length packet traffic","authors":"K. Sampath, M. R. Perati, T. Adilakshmi","doi":"10.1109/ICON.2012.6506544","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506544","url":null,"abstract":"In this paper, we study the switching performance of wavelength division multiplexing (WDM) optical packet switch (OPS) equipped with tunable wavelength converter sharing dedicated to each output fiber line under self-similar variable packet length traffic. In this study, we model WDM OPS employing tunable wavelength converters as a MMPP/M/W/C queueing system. In our model, packet arrivals at OPS are assumed to follow Markov modulated Poisson process (MMPP) that emulates self-similar traffic, and service times (packet lengths) are exponentially distributed to cope with variable packet length. We investigate packet blocking probabilities against traffic load for different wavelength conversion capabilities under self-similar traffic. We propose an efficient analytical method and the results are validated with simulations. We present the computational complexity of the proposed analytical method. Our analysis is more significant in dimensioning WDM OPS to guarantee quality of service (QoS).","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134032372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient cooperative MIMO routing in wireless sensor networks","authors":"Ping He, Hui Tian, Hong Shen","doi":"10.1109/ICON.2012.6506537","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506537","url":null,"abstract":"Due to limited batteries of senor node in wireless sensor networks, it is essential to minimize the energy consumption so that the lifetime of WSNs can be prolonged. In this paper, we propose a cooperative multi-input multi-output (CMIMO) scheme by introducing variable cluster size. In general, if the same cluster size is applied in each cluster, the cluster head with lower residual energy runs up more quickly than those with more residual energy. This may result in reclustering in which process new cluster head has to be re-selected. Lots of energy is consumed in this process. In order to avoid energy waste in reclustering, we consider the trade off between residual energy of cluster head and cluster size in cluster construction. We compute the maximized cluster size on the basis of residual energy of cluster head. The cluster with more residual energy has bigger cluster size and the cluster with less residual energy has smaller cluster size. This can balance the energy consumption in each cluster. We analyze the mathematical model for the proposed scheme. It is shown that the proposed scheme is more energy efficient than existing schemes. In our energy model, we present how to determine the cluster size and justify our method by simulations.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On improving dynamic stochastic routing algorithms in overlay networks","authors":"Chengwei Zhang, Xiaojun Hei, Wei Liu, W. Cheng","doi":"10.1109/ICON.2012.6506599","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506599","url":null,"abstract":"Internet applications are commonly designed and deployed as overlays. Recent studies have shown that overlay nodes may achieve performance gains through intermediate nodes instead of using the default direct Internet path. In this paper, we study a stochastic routing algorithm to determine the detours or relay paths between a pair of end-to-end nodes for performance enhancement by taking the stochastic properties of the overlay links. The mail idea and the algorithm features are first illustrated; then, we proposed various algorithm improvements by leveraging the actual delay and the expected delay along the path using a stochastic optimization framework. We conducted a simulation study for comparing the proposed stochastic routing algorithm and the conventional routing algorithms. The simulation results show that the proposed stochastic routing algorithm outperforms other algorithms in various network scenarios in reducing packet loss and average delay. With minor variations, the algorithm may be applied for P2P networks and delay-tolerant networks.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129806977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A performance model of pedestrian dead reckoning with activity-based location updates","authors":"Mahbub Hassan","doi":"10.1109/ICON.2012.6506535","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506535","url":null,"abstract":"Advanced computing and sensing capabilities of smartphones provide new opportunities for personal indoor positioning. A particular trend is to employ human activity recognition for autonomous calibration of pedestrian dead reckoning systems thereby achieving accurate indoor positioning even in the absence of any positioning infrastructure. The basic idea is that the activity context, such as switching from a walking to a stair climbing activity gives clues about pedestrian's current position. In this paper, we have made a first attempt in developing a performance model for such systems. For an unbiased random walk, we have obtained two interesting results in closed-form expressions. First, we have demonstrated that the distance a pedestrian is expected to travel before the PDR is recalibrated is reciprocal of the density of activity switching points (ASPs) in the indoor environment. The implication of this finding is that the continuous unaided use of PDR can be curbed drastically by identifying more ASPs in a given environmental setting. Second, we have shown that false negatives of the activity detection algorithms do not have a major impact as long as they are within a reasonable range of 0–30%. The system performance however degrades rapidly if false negatives continue to grow beyond 30%.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132420301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performances evaluation of different algorithms for PCIs self configuration in LTE","authors":"Mariem Krichen, D. Barth, O. Marcé","doi":"10.1109/ICON.2012.6506558","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506558","url":null,"abstract":"Nowadays, network operators are basically facing two problems: the fast number of subscribers growth and the network congestion. To solve these problems, network operators increase the number of cells, make cells smaller and reserve a subpart of frequencies to Femto cells to offload data traffic. As a consequence, networks manual planning demands a lot of efforts and its cost increases. Self-configuring and self-optimizing mechanisms would be vital to operators to reduce manual planning. This article focuses on the application of these mechanisms in LTE and more specifically on the procedure of Automated configuration of Physical Cell Ids (PCIs). This procedure aims at avoiding conflicts in PCIs allocation. In this article, we first evaluate the performances of 3 relabeling algorithms applied on graphs representing real LTE Macro networks: Random Relabeling algorithm (RR), Smallest available Value algorithm (SV), Distance 3 neighbour label algorithm (D3). Then, we evaluate the performances of the best algorithm applied on graphs representing real LTE networks where Femto cells are connected to Macro cells. Here, we answer the following question: is the selected relabeling algorithm still efficient when we extend its application to Femto cells?.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132580959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Ant Colony algorithm for self-optimized data assured routing in wireless sensor networks","authors":"K. Saleem, N. Fisal","doi":"10.1109/ICON.2012.6506595","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506595","url":null,"abstract":"Wireless sensor network (WSN) deploys tiny wireless sensor nodes to communicate with each other with limited processing speed, power and security measures. A recent WSN routing protocol defined as Secure Real-Time Load Distribution (SRTLD) has been developed to provide realtime transfer, high delivery ratio, and longer sensor node lifetime. SRTLD has been compared with LQER, MMSpeed, RTPC and RPAR. However, SRTLD uses broadcast packets to perform neighbour discovery for every packet transfer every hop, thus consume high energy. A novel Biological inspired self-organized Secure Autonomous Routing Protocol (BIOSARP) to enhance SRTLD with self-optimized and autonomous secure routing mechanism. The BIOSARP routing protocol depends on the optimal forwarding decision obtained by Ant Colony Optimization (ACO). The pheromone value in ACO is computed based on end-to-end delay, remaining battery power, and packet reception rate metrics similar to SRTLD. The proposed BIOSARP has been designed to reduce overhead broadcast packet in order to minimize the delay, packet loss and power consumption in WSN. In this paper we have presented the improved ACO algorithm that has been utilized in BIOSARP to perform self-optimized routing in WSN. BIOSARP has been studied and verified through simulation in network simulator 2 (NS-2). In simulation study BIOSARP normalized overhead is 12.1% less as compare to E&D ANTS and achieves 14% higher delivery ratio with 9% less power consumption when compared to SRTLD. Hence, the results confirm that BIOSARP offers better performance and can be practically implemented in WSN applications as structural and environmental monitoring, battlefield surveillance.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124183226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart job scheduling with backup system in grid environment","authors":"H. Al-Najjar, M. Jarrah","doi":"10.1109/ICON.2012.6506560","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506560","url":null,"abstract":"This paper investigates the problem of job scheduling in grid environments when dependencies between the submitted jobs exist. If a job is failed, all jobs depending on it will need to be restarted. In order to prevent that, a Dependency Resolution model with a backup system (DR-Backup) is designed. DR-Backup uses Back Propagation Neural Network (BPNN) to predict the weight of the jobs. Also, it uses an unsupervised neural network to classify the slaves (working machines) into a set of classes. Three statistical predictors were used to validate the BPNN predictor as follow: Ordinary Least Square Regression (OLSR), MARS regression and the Treenet Logistic Binary predictor. Results show that the OLSR has a higher prediction rate than the other models. DR-Backup model was compared with three methods in job scheduling: First Come First Serve (FCFS), Job Ranking Backfilling (JR-Backfilling) and SLOW-coordination. Results show that no algorithm can overcome all dynamics in the incoming jobs and any system has advantages and disadvantages depending on the jobs sample and the parameters that were taken in classifying incoming jobs.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129562344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}