{"title":"Towards QoS Assurance with Revenue Maximization of LTE Uplink Scheduling","authors":"Rukhsana Ruby, Victor C. M. Leung","doi":"10.1109/CNSR.2011.37","DOIUrl":"https://doi.org/10.1109/CNSR.2011.37","url":null,"abstract":"Qos provision is considered as the complex task due to the heterogeneous nature, diverse QoS requirements of emergent different applications. With the advent of high bandwidth 3G/4G technologies, like LTE, LTE-advanced, the necessity of QoS provision becomes even crucial. Uplink scheduling with QoS provision is considered here. The contribution of this work is uplink packet scheduling scheme maintaining QoS provision at the granular level while maximizing the revenue of network operator. Proposed scheme is generalized for all kinds of traffic. In order to demonstrate the results, we limit the classifications of traffic to best effort, traffic with delay requirement and traffic with bandwidth requirement. Through extensive simulation, we have justified the effectiveness and strength of the proposed scheme.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133304974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Hybrid Architecture for Intrusion Detection Based on Fuzzy Clustering and RBF Neural Networks","authors":"Ahmad Ghadiri, Nasser Ghadiri","doi":"10.1109/CNSR.2011.26","DOIUrl":"https://doi.org/10.1109/CNSR.2011.26","url":null,"abstract":"Automatic detection of network intrusion is a challenging task because of increasing types of attacks. Many of the existing approaches either are rigid, inflexible designs tailored to a specific situation or require manual setting of design parameters such as the initial number of clusters. In this paper we allow the design parameters to be determined dynamically by adopting a layered hybrid architecture, hence resolving the aforementioned shortcomings. The first layer uses FCM and GK fuzzy clustering to extract the features and the second layer uses a set of RBF neural networks to perform the classification. The flexible design parameters are initial number of clusters, number of RBF networks and number of neurons inside each network which are determined with minimal input from the user. The simulation result shows high detection rates as well as fewer false positives compared to earlier approaches.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123487989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Lusilao-Zodi, M. Dlodlo, G. D. Jager, K. Ferguson
{"title":"RRB-SIMD: RTP Rate-Based SIMD Protocol for Media Streaming Applications over the Internet","authors":"G. Lusilao-Zodi, M. Dlodlo, G. D. Jager, K. Ferguson","doi":"10.1109/CNSR.2011.19","DOIUrl":"https://doi.org/10.1109/CNSR.2011.19","url":null,"abstract":"Congestion control is vital in the streaming of a video sequence or clip, as network traffic varies unpredictably requiring constant adjustment of the transmission rate. Standard TCP-Friendly Rate Control (TFRC) wastes bandwidth and may react to congestion only when packet loss has already occurred. This paper presents a unicast transport protocol named RRB-SIMD for video streaming over the Internet, that provides better quality of service (QoS) support than the TCP-friendly rate control. RRB-SIMD operates on top of Real-time Transport Protocol (RTP) and takes advantage of Real-time Transport Control Protocol (RTCP) reports to multiplicatively decrease the transmission rate in response to congestion and quadratically increase the transmission rate in the absence of congestion. Since packet loss is not a reliable indicator of congestion, RB-SIMD uses in addition the cumulative jitter as a control criterion to detect incipient congestion prior to loss of a packet. The cumulative jitter scheme is reinforced with a delay factor that measures on a per round basis the buffer occupancy at the bottleneck path between the sender and the receiver. This is done to reduce the risk of unnecessary decrease of the transmission rate every time that incipient congestion is reported through the cumulative jitter scheme. The performance evaluation results using both network-related metrics and video quality measurement shows that RRB-SIMD exhibits a better performance with respect to lost frames ratio, delay and cumulative jitter, and hence an improved quality display than the standard TFRC.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Power Management for QoS-Aware Multimedia in Cognitive Mesh Networks Using Reinforcement Learning","authors":"A. Alsarhan, A. Agarwal","doi":"10.1109/CNSR.2011.50","DOIUrl":"https://doi.org/10.1109/CNSR.2011.50","url":null,"abstract":"In cognitive multimedia mesh networks (CMMNs), unlicensed users (secondary users, SUs) can share the spectrum with licensed users (primary users, PUs) on a non-interfering basis. The main challenge in CMMN is how to implement an efficient optimal control policy that can allocate spectrum and transmission powers for the SUs efficiently and how to adapt these resources to the changing network conditions. The power management scheme should control the SUs powers in such a way that their data communication rate is not affected. SUs power cannot be dropped indefinitely but it should be bounded such that the quality of service (QoS) for the SUs is still supported. Our objective is to serve the maximum number of users and support their QoS while protecting the PUs' rights of using the spectrum exclusively. Due to the direct relationship between the data rate and the quality of the communication channel, we propose a new spectrum allocation scheme that exploits the physical properties of the channel to achieve better performance. In addition to consider QoS for users, our scheme uses several heuristics for selecting channels that meet users requirements. These heuristics include channel error rates, PUs activities, channel capacity and channel adaptation time. Performance evaluation of the proposed scheme shows that the scheme is able to support additional SUs traffic while still ensuring PUs QoS.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131099425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measurement Study on PPLive Based on Channel Popularity","authors":"Ruixuan Li, Guoqiang Gao, Weijun Xiao, Zhiyong Xu","doi":"10.1109/CNSR.2011.12","DOIUrl":"https://doi.org/10.1109/CNSR.2011.12","url":null,"abstract":"In recent years, Peer-to-Peer (P2P) streaming systems experienced tremendous growth and became one of the largest bandwidth consumer on Internet. PPLive, one of the most popular applications in this category, is serving millions of registered users with hundreds of Live TV channels and millions of other video clips. Compared to the standard file sharing systems, the streaming service shows unique characteristics with more stringent time constraints and requires much higher network bandwidth. It is extremely important to evaluate and analyze existing applications, investigate the merits and weaknesses in these systems for the future development. In this paper, we conduct a comprehensive measurement study on PPLive. Both Live TV and Video-on-Demand (VoD) channels are evaluated. We record run-time network traffic on the client side, compare and analyze the characteristics of these channels based on their popularity. For both categories, we perceive that, in general, PPLive delivers satisfactory performance if enough concurrent peers are present in a particular channel. We also observe that VoD channels perform better than their counterparts in Live TV category in terms of data transmission, workload distribution, and signal traffic overhead. However, Live TV channels show better peer coordinations than VoD channels. Overall, our results reveal that although PPLive can provide excellent viewing experiences for popular channels, there are still challenges to fully support unpopular channels. New designs and algorithms are in urgent need, especially for unpopular Live TV channels.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129585092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Good, the Bad, the IPv6","authors":"M. Dunlop, S. Groat, R. Marchany, J. Tront","doi":"10.1109/CNSR.2011.20","DOIUrl":"https://doi.org/10.1109/CNSR.2011.20","url":null,"abstract":"As more network-capable devices are developed, it becomes easier for us to remain connected to our friends, colleagues, and even our homes. Unfortunately, it becomes easier for unintended third parties to remain connected to us as well. The impact of this has been limited by our proximity to the third party (i.e. the same local area network) -- until now. The Internet Protocol version 6 (IPv6) includes a method for devices to automatically configure their own addresses. This technique relieves some administrative burden, but provides an opportunity to monitor users from anywhere in the world. We explain why this problem exists. We also provide proof of host tracking and monitoring. We then illustrate examples of how both well-intended and malicious parties can exploit auto configured addresses. We submit that the benefits of using auto configured addresses do not outweigh the privacy implications. Finally, we present some alternatives to resolve this issue before IPv6 is deployed globally.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128971657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gateway Placement in Backbone Wireless Mesh Networks Using Directional Antennas","authors":"Ziping Hu, P. Verma","doi":"10.1109/CNSR.2011.33","DOIUrl":"https://doi.org/10.1109/CNSR.2011.33","url":null,"abstract":"This paper investigates gateway placement problem in backbone wireless mesh networks using directional antenna systems. A heuristic gateway placement algorithm is proposed in order to minimize the total number of gateways, and the average and maximum hop count between any mesh router and its closest gateway.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"72 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131451428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation and Enhancements of 42.7 Gb/s DWDM Transmission System Using Different Modulation Formats","authors":"S. Ghoniemy, K. George, L. MacEachern","doi":"10.1109/CNSR.2011.35","DOIUrl":"https://doi.org/10.1109/CNSR.2011.35","url":null,"abstract":"Modeling and design, simulation, characterization and performance evaluation of high data rate and high capacity long-haul DWMD light wave systems are presented. As well, a methodology for finding the optimum modulation format that can effectively enhance the system performance without major changes in the existing infrastructure are presented. An exemplary 42.7 Gb/s, 80 Km×16 spans DWDM light wave system including transmitter, different fiber types (SSMF, LEAF, and TW-RS), amplifiers, and receiver is designed. Suitable model implementations for device and systems simulations in the time domain using OPTSIM CAD simulator are presented. The performance of the exemplary system is examined using four different modulation formats: NRZ-OOK, optical duo binary, differential binary phase shift keying (NRZ-DBPSK), and differential quadrature phase shift keying (RZ-DQPSK). Simulation results show that the overall system's performance using a combination RZ-DQPSK with the LEAF based on reduced channel spacing (50 GHz with spectral efficiency of 0.8 bit/s/Hz) provides a remarkable improvement (approximately 50% in the transmission distance ) over implementations based on other fiber and modulation format combinations. Model verification and validation performed by comparison of simulated results to measured results demonstrated the utility of the proposed design methodology","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131547766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization of the IntelRate Controller for High-Speed Networks","authors":"Jungang Liu, O. Yang","doi":"10.1109/CNSR.2011.18","DOIUrl":"https://doi.org/10.1109/CNSR.2011.18","url":null,"abstract":"Unlike other explicit congestion controllers that depend on the estimation of network parameters (such as link latency, bottleneck bandwidth, packet loss, or the number of flows) to compute the allowed source sending rate, the IntelRate controller can avoid this while maintaining good stability and robustness. Simulation results have verified these performances. In this paper, we theoretically investigate the rationale that gives the IntelRate controller such an advantage. Our study shows that the IntelRate controller can be approximated by a PI (Proportional-Integral) controller but with time-varying gains, which allows the controller to outperform its counterparts. Finally, by comparing with the API-RCP (Adaptive PI Rate Control Protocol) using Opnet simulation, we experimentally illustrate our conclusion.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124761321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Peer-to-Peer Model for XML Publish/Subscribe Services","authors":"Yang Cao, Chung-Horng Lung, S. Majumdar","doi":"10.1109/CNSR.2011.13","DOIUrl":"https://doi.org/10.1109/CNSR.2011.13","url":null,"abstract":"This paper focuses on XML content delivery. Techniques for XML publish/subscribe delivery include unicast, flooding, IP multicast, and application-layer multicast. An important issue in the context of the state-of-the-art XML routing schemes is that the cost of filtering and aggregation is incurred at each hop. A new peer-to-peer model for XML pub/sub multicast service is described. The proposed model eliminates the redundant filtering task for intermediate nodes. A comparison of the proposed peer-to-peer model for XML multicast and the conventional application-layer XML multicast is presented. The results reveal that the proposed peer-to-peer model is much more efficient.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123579754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}