{"title":"Analytical Traffic Model for a Multidomain IMS/NGN Network Including Service and Transport Stratum","authors":"S. Kaczmarek, M. Sac, Michal Cieśliński","doi":"10.23919/softcom55329.2022.9911512","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911512","url":null,"abstract":"This paper addresses the problem of modelling call processing performance (CPP) in a multidomain Next Generation Network (NGN) architecture including the elements of the IP Multimedia Subsystem (IMS) in service stra-tum and based on the Multiprotocol Label Switching (MPLS) technology in transport stratum. An analytical traffic model for such an architecture is proposed by integrating the former-ly implemented submodels of service stratum and MPLS-based transport stratum. The integrated analytical model allows investigation of mean Call Set-up Delay (E(CSD)) and mean Call Disengagement Delay (E(CDD)) for a large set of input variables corresponding to both IMS/NGN strata. The evaluation of E(CSD) and E(CDD), which are a subset of CPP param-eters, is very important for both network users and operators. Details regarding the structure and operation of the integrated traffic model are provided in this paper. Moreover, the results of investigations are described, which demonstrate that this model is correctly implemented, reflects the operation of a multidomain IMS/NGN network and may be used in further research.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114072264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selecting an Optimal Cluster Head using PSO Algorithm in WSNs","authors":"D. Ibrahim, S. T. Hasson, Princy A. Johnson","doi":"10.23919/softcom55329.2022.9911416","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911416","url":null,"abstract":"A Wireless Sensor Network (WSN) represents a set of deployed sensors in an area to track or monitor specific activities. Sensors are utilized to gather certain data and forward it to the sink or a Base Station (BS). Sensors are operated by limited-energy batteries. Optimizing the consumed energy will prolong the WSN's lifetime. One approach to reducing the consumed energy is by applying a cluster-based routing protocol. Optimizing the Cluster Head (CH) selection represents another approach to prolonging the WSN lifetime. This paper proposes an optimization algorithm to select the CH. The residual energy, the distance between sensors, and the centrality of the sensor node are used as significant features in selecting the CHs in this paper. The proposed algorithm is based on Particle Swarm Optimization (PSO) algorithm and K-Means algorithm. This study proposed approach is called the PSO-K algorithm. It helps in reducing energy consumption and increasing the network lifetime. MATLAB is used to model and simulate this developed algorithm. the number of sensors, number of rounds, number of CHs, the first dead nodes, the half-dead nodes, and the last dead nodes are used to evaluate the WSN performance. A comparison with other closely related works such as LEACH, EAMMH, and iLEACH shows that the PSO-K algorithm is the best in energy consumption and network lifetime.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122909288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indoor Positioning: Comparing Different Techniques and Choosing the Best One for a User Authentication Real Scenario","authors":"Joaquín Pérez Balbela, Aruna Prem Bianzino","doi":"10.23919/softcom55329.2022.9911502","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911502","url":null,"abstract":"Indoor positioning is a complex issue with many, heterogeneous application cases, each one presenting different requirements and environments. In such a complex ecosystem, an agile taxonomy is needed to be able to select a proper solution for a given scenario, as well as practical recommendations for the most used solutions. Besides providing these tools, we analyse a real-world scenario and its requirements, selecting a practical solution and evaluating it together with its implications and consequences, providing a reference guideline for practical applications of indoor positioning.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131394314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE 802.1X Virtual Network Function Development for NG-PON Architecture","authors":"I. Araújo, S. R. Lima, A. Brízido","doi":"10.23919/softcom55329.2022.9911396","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911396","url":null,"abstract":"The Open Broadband - Broadband Access Abstraction (OB-BAA) architecture aims to modernize the information technology components of broadband networks, more specif-ically the Central Offices (CO). CO stands out for being a vital aggregator of different access networks, such as optical, mobile, and cabled networks, benefiting from the paradigm of Software-Defined Networks (SDN). This paper aims to discuss the development of a virtualized network function (VNF) for network security to be integrated as a component of an OB-BAA architecture guided by an SDN controller. In particular, the IEEE 802.1X protocol is applied in a broadband NG-PON architecture for authentication and authorization of network equipment. The developed components were containerized and inserted in the Docker and Kubernetes virtualization frameworks. The proof-of-concept evaluates performance metrics, namely computational resource utilization and execution time of VNF processes, in usage tests with multiple supplicants and distinct operational modes, to attest to the most promising virtualization scenarios.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121759100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distance Based Server Selection in 5G Networks","authors":"Å. Arvidsson","doi":"10.23919/softcom55329.2022.9911423","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911423","url":null,"abstract":"Distance aware selection of servers and other net-worked resources is necessary to take full advantage of the 5G ecosystem, where the new radio and edge computing both contribute to significantly reduced latencies, but where propagation times to distant servers may add noticeable delays. The literature on server selection, and in particular on distance aware server selection, is, however, surprisingly thin. The few approaches we have come across are either relatively complex, based on continuous measurements, or both and not reflected in current standards. The present work therefore aims at simple but accurate mechanisms which build on and are backward compatible with present standards. We briefly describe the existing alternatives for distance aware selection as reflected in the standards, and propose include location information in server URLs such that distances can be explicitly calculated and evaluated by selecting entities. Moreover, we present three distinct and simple approaches to encode locations, two of which advantageously can be combined. The performance of the methods are then subject to a comprehensive performance evaluation where a large number of varied scenarios are considered. The results reveal that simple geographical coordinates should be restricted to very dense networks (typically networks which form full meshes) whereas a combination of the other approaches work well in other networks (in our case networks based on trees, stars or loops). Contrary to earlier proposals, our proposals consistently provide upper bounds on distances which eliminates the uncertainties that surrounds approximate solutions.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133837990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chrysanthi Chariskou, C. Bazinas, A. J. Daniels, U. L. Opara, H. Nieuwoudt, V. Kaburlasos
{"title":"Variable Selection for the Prediction of TSS, pH and TA of Intact Berries of Thompson Seedless Grapes from their NIS Reflection","authors":"Chrysanthi Chariskou, C. Bazinas, A. J. Daniels, U. L. Opara, H. Nieuwoudt, V. Kaburlasos","doi":"10.23919/softcom55329.2022.9911292","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911292","url":null,"abstract":"Wavenumbers of high absolute value of correlation coefficient to Total Soluble Solids (TSS), pH, or Titratable Acidity (TA) were selected from reflection Fourier transform near infrared (FT -NIR) spectra of intact grape berries of the white variety Thompson Seedless. Multiple linear regression (MLR) and partial least squares (PLS) regression were applied to the spectra to construct trained regression models able to predict TSS, pH, and TA. Square Pearson's correlation coefficient (R2) and the Mean Square Error (MSE) were used to evaluate the precision of prediction. TSS content was predicted with R2 score of 0.972 and MSE 0.094 using MLR and with R2 0.926 and MSE 0.223 using PLS regression. The pH prediction scores were R2 0.812 and MSE 0.002 with MLR. With PLS regression the values were R2 0.485 and MSE 0.004. TA can be predicted only from the second derivatives of the spectra. MLR produced R2 for prediction 0.745 and MSE 0.076, while the scores using PLS regression were R2 0.648 and MSE 0.114. It was concluded that variable selection could greatly improve the prediction accuracy. The appropriateness of the two regression methods depends on the structure of the spectra dataset and on the characteristics whose prediction is sought.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133870742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI Application in Next Generation Programmable Networks","authors":"Mateusz Rasmus, Z. Kopertowski, S. Kozdrowski","doi":"10.23919/softcom55329.2022.9911332","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911332","url":null,"abstract":"Artificial intelligence (AI) algorithms can provide an effective solution for dynamic and automated network resource management in Software Defined Networking (SDN). In this contribution, we propose an auto-configuration enabler inside the next-generation Internet of Things (IoT) architecture proposed in the ASSIST-IoT project, for network resource allocation. The AI algorithm is responsible for controlling intent-based routing in an SDN network. This paper focuses on the problem of optimal intent switching between two designated paths using a Deep-Q-Learning approach based on an artificial neural network. The AI algorithm was trained to maximise the total throughput in the network and to use the network efficiently. The presented results confirm the validity of the applied AI approach to the problem of improving network performance in next-generation networks for economically and technically efficient implementation in the evaluation of IoT network systems.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Let's Read: Analysing S/MIME Certificate Vendors' Efficiency and Privacy","authors":"Tobias Mueller, Max Hartenstein","doi":"10.23919/softcom55329.2022.9911516","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911516","url":null,"abstract":"Email is one of the oldest and most popular applications on today's Internet and is used for business and private communication. However, most emails are still susceptible to being intercepted or even manipulated by the servers transmitting the messages. Users with S/MIME certificates can protect their email messages. In this paper, we investigate the market for S/MIME certificates and analyse the impact of the ordering and revocation processes on the users' privacy. We complete those processes for each vendor and investigate the number of requests, the size of the data transfer, and the number of trackers on the vendor's Web site. We further collect all relevant documents, including privacy policies, and report on their number of words, readability, and quality. Our results show that users must make at least 86 HTTP requests and transfer at least 1.35 MB to obtain a certificate and 178 requests and 2.03 MB to revoke a certificate. All but one vendor employ third-party tracking during these processes, which causes between 43 and 354 third-party requests. Our results further show that the vendors' privacy policies are at least 1701 words long which requires a user approximately 7 minutes to read. The longest policy requires approximately half an hour to be read. Measurements of the readability of all vendors' privacy policies indicate that users need a level of education that is nearly equivalent to a bachelor's degree to comprehend the texts. We also report on the quality of the policies and find that the vendors achieve compliance scores between 45 % and 90 %. With our method, vendors can measure their impact on the users' privacy and create better products. On the other hand, users benefit from an analysis of all S/MIME certificate vendors in that they can make an informed choice of their vendor based on the objective metrics obtained by our study. Ultimately, the results help to increase the prevalence of encrypted emails and render society less susceptible to surveillance.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133976988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VR Training for Laboratory Environments","authors":"Josef Wermann, B. Pohn","doi":"10.23919/softcom55329.2022.9911505","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911505","url":null,"abstract":"VR apps in the categories of gaming, leisure, social, fitness, work and education are becoming increasingly popular. The aim of this paper is to determine the potential for increasing efficiency and conserving resources in laboratory processes. For this purpose, literature research was conducted on the one hand, and on the other hand, a virtual simulation environment in the field of cell culture was created within a Laminar Flow Hood (Flow) using the Unity development environment and the Oculus Quest 2 VR goggles. Outstanding features of the app are that, in addition to the possibility of being used via cable using a PC (PCVR), it can also be operated wireless as an Android standalone package, and that it can be used with controllers as well as with hand tracking, i.e., freehand. The Laminar Flow application was extensively tested on a group of 10 employees and students of the Department of Biomedical Engineering. The data obtained from the app, as well as questionnaires completed by the test persons, show that a usability-friendly application can be used to train workflows efficiently and, in a resource saving manner. Furthermore, the more often the workflow has been worked through by a person, a greater improvement in the workflow was achieved. In addition, a strong acceptance and high commitment of the users in the technical environment can be seen. Regarding comparable studies and although the test group is subject to some limitations the enormous potential that IVR offers to support location-based training sessions in companies and especially in laboratories and university facilities can be seen. In view of the decreasing prices, the technical advancement of VR devices and the paradigm shift of work and education towards increased home office driven by COVID-19, intensified future research in the field of IVR can be justified in combination with these positive results.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"62 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114094704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooling Power Consumption Dependency Simulation for Real-World Data Center Data","authors":"J. Backhus, Yasutaka Kono","doi":"10.23919/softcom55329.2022.9911308","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911308","url":null,"abstract":"Data centers (DC) are considered one of the top electricity consumers and there is an increasing interest in finding more sustainable approaches to their power supply needs. Purchase of renewable energy is the straightforward approach but involves large investments and long-term commitments with a need for DC power consumption planning. In this paper, we propose a data-driven DC cooling power consumption prediction method that uses IT equipment power consumption and outdoor air temperature data as input features. The contributions of this work are the design of a differenced data-based modeling method with baseline value calculation and performance testing based on real-world data from air-based and liquid-based cooling DCs. In the experiments, we compare our proposed method with a raw data-based approach and identified the proposed method as the more stable performing one. The results show that the proposed method performs better when training data is limited and can handle sudden value drifts in the consumed cooling power caused by changes in cooling devices' operation settings with baseline adaptation.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116255079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}