{"title":"Failure Detection and Localization in OTN Based on Optical Power Analysis","authors":"Tingting Huang, F. Qi, Fei Gao","doi":"10.1109/ICCSN.2010.68","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.68","url":null,"abstract":"In consideration of the new features of Optical Transport Networks (OTN), the failure detection and localization has become a new challenging issue in OTN management research area. This paper proposes a scheme to detect and locate the failures based on the optical power analysis. In failure detection section of the scheme, this paper propose a method to detect the performance degradation caused by possible failures based on real optical power analysis and build a status matrix which demonstrates the current optical power deviation of the fiber port of each node in OTN. In failure localization section of the scheme, this paper proposes the multiple failures location algorithm (MFLA), which deals with both single point failure and multi-point failures, to locate the multiple failures based on analyzing the status matrix and the switching relationship matrix. Then, an exemplary scenario is given to present the result of detecting and locating the fiber link failure and OXC device failure with the proposed scheme.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124822783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modulation Classification of MQAM Signals from Their Constellation Using Clustering","authors":"Changyi Yin, Bingbing Li, Yanling Li","doi":"10.1109/ICCSN.2010.45","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.45","url":null,"abstract":"Nowadays, automatic modulation classification (AMC) plays an important role in both cooperative and non-cooperative communication applications. And most of the approaches for recognition and classification of modulation have been found on modulated signal’s components. However, one of the best methods of modulation classification is the use of the constellation diagram of the received signal. In this paper, a system for modulation classification is developed. A novel method for carrier frequency estimation from the received data is proposed. The method can estimate the carrier frequency exactly by approaching the real frequency illimitably. And an improved method using clustering is also proposed, which can recognize modulated signal’s components only using one clustering radius. The advantages are simple structure and low computation complexity. Simulation results show that the modulation classification method is robust","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121978796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seong-Yong Choi, Jin-Su Kim, Jung-Hyun Lee, K. Rim
{"title":"REDM: Robust and Energy Efficient Dynamic Routing for a Mobile Sink in a Multi Hop Sensor Network","authors":"Seong-Yong Choi, Jin-Su Kim, Jung-Hyun Lee, K. Rim","doi":"10.1109/ICCSN.2010.75","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.75","url":null,"abstract":"An energy efficient multi hop sensor network cannot avoid the energy hole problem, which is the rapid decrease in the energy of nodes around the sink. Also as a sensor network has a limited node resources and unexpected changes of external environment, its nodes should show energy efficiency, reliable data transmission, and topological adaptation to the change of external environment. This study proposes Robust and Energy efficient Dynamic routing for a Mobile sink (REDM), a routing mechanism that satisfies the above-mentioned conditions at the same time using a dynamic single path and sink mobility in a multi hop sensor network. And we also suggest power aware heuristic (PAH) algorithm in which the sink determines its move by itself in consideration of the energy of nodes within a specific number of hops from the sink. According to the result of simulation, compared to the algorithms with other multi hop routing, REDM proposed in this study extended network lifetime by improving the energy efficiency of the nodes while maintaining the same reliability, and REDM based on the PAH algorithm showed a longer network lifetime than stationary REDM and random REDM.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128043203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Power Control Mechanism for Sensor Node Based on Dynamic Programming","authors":"Somayeh Kianpisheh, Nasrolah Moghadam Charkari","doi":"10.1109/ICCSN.2010.30","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.30","url":null,"abstract":"Reducing energy consumption is one of the key challenges in sensor networks. Lots of researches have tried to turn the nodes off when not needed to reduce energy consumption. In this paper, we propose a mechanism which dynamically turns on/off different components of the node to conserve energy while maintaining required performance. We model power management problem in a sensor node as an average reward MDP and solve it using dynamic programming. We prove that the MDP is communicating and we use communicating policy iteration algorithm to compute the optimal policy. Simulation results show our approach conserves more energy than always on policy while reaches to the same amount of utility.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Arastouie, M. Sabaei, Hosseinali Shirali Shahreza
{"title":"Adaptive Approach for Reducing Energy Consumption, Considering Nodes' Mission in Wireless Sensor Networks","authors":"N. Arastouie, M. Sabaei, Hosseinali Shirali Shahreza","doi":"10.1109/ICCSN.2010.92","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.92","url":null,"abstract":"The computational cost in a wireless sensor network is usually considered neglected in comparison to the communication cost. While this assumption is considered true, it may fail if data volumes are significantly large. In such situations, it is more rational to consider the computational cost as well as the communication cost for energy related decisions in the network. In this paper, we want to reduce the energy consumed within a wireless sensor network, considering each node in charge of a mission. Every node, obtaining a trade-off between computation and communication energy, does its best to reduce the overall energy. In other words, each node endeavors to reduce network energy consumption adaptively, regarding application type, by means of making a trade-off between data compression at an appropriate level, considering spatial correlation, and sending row data. Simulation results, compared to similar work, show that our approach reduces energy consumption of nodes in the network.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132983691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Winsock Based Wireless Routing Simulation","authors":"Xiangning Li, Jing Ma","doi":"10.1109/ICCSN.2010.18","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.18","url":null,"abstract":"Routing protocol simulation is the basis for its practical application. Using multithread simulation technology can not only simulate the performance of routing protocols, but also lay good foundation for its hardware porting. By use of the technology and combing with Winsock, the paper researched on routing of wireless communication and brought out a kind of computer simulation method for distributed routing based on technologies of Winsock and multithread, and then constructed distributed routing protocol simulation system. With the communication system, different platform for distributed routing protocol simulation can be built to test the performance of routing protocols.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134438732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine","authors":"Aman Bakshi, Yogesh B. Dujodwala","doi":"10.1109/ICCSN.2010.56","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.56","url":null,"abstract":"Innovation is necessary to ride the inevitable tide of change. The buzzword of 2009 seems to be \"cloud computing\" which is a futuristic platform to provides dynamic resource pools, virtualization, and high availability and enables the sharing, selection and aggregation of geographically distributed heterogeneous resources for solving large-scale problems in science and engineering. But with this ever developing cloud concept, problems are arising from this “golden solution” in the enterprise arena. Preventing intruders from attacking the cloud infrastructure is the only realistic thing the staff, management and planners can foresee. Regardless of company size or volume and magnitude of the cloud, this paper explains how maneuver IT virtualization strategy could be used in responding to a denial of service attack. After picking up a grossly abnormal spike in inbound traffic, targeted applications could be immediately transferred to virtual machines hosted in another data center. We’re not reinventing the wheel. We have lots of technology and standardized solutions we can already use to engineer into the stack. We are just introducing them in the way least expected.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129533900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testability Models for Structured Programs","authors":"Chhattar Singh Lamba","doi":"10.1109/ICCSN.2010.112","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.112","url":null,"abstract":"In this paper I investigate factors of the testability of structured programs. The starting point is given by a study of the literature to obtain both an initial model of testability and existing models related to testability. The main objective of this paper is to propose models for the estimation of testability (Tb), on the basis of various affecting attributes. The values of the attributes were estimated for programs under consideration with the help of software developed for this purpose. The models proposed conform to our intuitive reasoning","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113954279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Najar, Hassan Awad Hassan Al-Sukhni, Navid Aghakhani
{"title":"The Application of Service-Oriented Architecture in E-complaint System","authors":"A. Najar, Hassan Awad Hassan Al-Sukhni, Navid Aghakhani","doi":"10.1109/ICCSN.2010.107","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.107","url":null,"abstract":"in this study researcher tried to improve relation between citizens and government by presenting a new model based on Service Oriented Architecture (SOA). With utilizing the presented model in government body on one hand governments will have the ability to minimize citizens’ dissatisfaction and on the other hand it can encourage citizens to participate in controlling government body such as governments’ staffs and organizations. This study can also be helpful in other fields of e-government in terms of citizen adoption and citizen loyalty. Results of this study can be a good reference to find out users needs from e-complaint and the importance of complaint in the body of government.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117104402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of UWB MIMO Systems with Rake Receive Processing","authors":"J. An, Sangchoon Kim","doi":"10.1109/ICCSN.2010.11","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.11","url":null,"abstract":"In this paper, a rake diversity combining scheme for detection of a single data stream in ultra-wideband (UWB) multiple input multiple output (MIMO) systems is considered as an extension of single input multiple output (SIMO) systems. The BER performance of a linear receive rake diversity scheme is presented in a log-normal multipath fading channel. It is shown that the increase of an antenna dimension happens to degrade the performance in the range of high SNRs. It is seen that as the number of transmit and receive antennas increases, the rake diversity combining system improves the performance at low SNRs or in the case of large antenna dimension at high SNRs.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}