2009 Eighth International Conference on Networks最新文献

筛选
英文 中文
Parameter Setting of Protocol MAC-hs in HSDPA HSDPA协议MAC-hs参数设置
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.67
R. Bestak
{"title":"Parameter Setting of Protocol MAC-hs in HSDPA","authors":"R. Bestak","doi":"10.1109/ICN.2009.67","DOIUrl":"https://doi.org/10.1109/ICN.2009.67","url":null,"abstract":"The MAC-hs protocol of ensures retransmissions of erroneous blocks and in-sequence data delivery to the upper layer. The first function is fulfilled via the HARQ mechanism. The second function is achieved by handling sliding transmitting/receiving window and by numbering of blocks. This paper investigates the MAC-hs performance for different parameters settings such window sizes, number of retransmissions or channel conditions. Simulations show that the parameter setting has to be advisably set up in order to prevent deterioration of performance.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128284935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fair Queuing Model for EDCA to Optimize QoS in Ad-Hoc Wireless Network 基于EDCA的Ad-Hoc无线网络QoS优化公平排队模型
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.51
H. Abuzanat, B. Trouillet, A. Toguyéni
{"title":"Fair Queuing Model for EDCA to Optimize QoS in Ad-Hoc Wireless Network","authors":"H. Abuzanat, B. Trouillet, A. Toguyéni","doi":"10.1109/ICN.2009.51","DOIUrl":"https://doi.org/10.1109/ICN.2009.51","url":null,"abstract":"This study aims to develop and optimize the Quality of Service (QoS) with fairness in multi-hop wireless adhoc networks. IEEE802.11e (EDCA) standard is concerned to support QoS in wireless adhoc networks. Thereby, EDCA differentiates and classifies the packets in Access Categories depending on their priorities. However, it cannot guarantee strict QoS required by real-time and multimedia services without proper network control mechanisms. And also, the unfairness of bandwidth sharing ,because of the hidden and exposed terminals problems, leads to degrade the guarantee services. Our proposition (FQ-EDCA) is to enhance the QoS of EDCA by implementing a Fair Queuing scheduling technique and improving the architecture of EDCA scheme. FQ-EDCA is proved and analyzed by experimental simulations for many topologies like (star, chain, tree, ...). Thus, the bandwidth is distributed fairly between all the source nodes. As a consequence, these nodes can access the channel fairly to transmit their flows with respect to EDCA specifications of Access Categories (AC) priorities. And also, the delay of flows of the same priorities is minimized and nearly fixed for all the source nodes. This leads to minimize the Jitter also. Therefore, the services guarantees of QoS is enhanced.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124711028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
On the Path Processing under Energy Constraints 能量约束下的路径处理
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.33
Birger Lantow
{"title":"On the Path Processing under Energy Constraints","authors":"Birger Lantow","doi":"10.1109/ICN.2009.33","DOIUrl":"https://doi.org/10.1109/ICN.2009.33","url":null,"abstract":"In wireless sensor networks and pervasive environments situations occur where only one path between a source of raw data and a target requiring processed data is available by topology and/or by the network layer. All nodes - source, target, and relay nodes between them - underly energy constraints. The depletion of the energy of any involved node would disable the network. In consequence, a scheme for the distribution of data processing that minimizes local peaks in energy consumption isneeded. This paper introduces solutions for the given problem, where no information about the battery status is available. Furthermore, model modifications to meet more practical situations and the problem of total energy consumption are discussed.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129659695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal of Data Intensive Sensor Networks with Forwarder Nodes 具有转发器节点的数据密集型传感器网络
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.29
K. Naito, K. Mori, Hideo Kobayashi
{"title":"Proposal of Data Intensive Sensor Networks with Forwarder Nodes","authors":"K. Naito, K. Mori, Hideo Kobayashi","doi":"10.1109/ICN.2009.29","DOIUrl":"https://doi.org/10.1109/ICN.2009.29","url":null,"abstract":"Reducing power consumption and increasing battery life of sensor nodes are important challenges for sensor networks. In this paper, we propose a simple routing protocol that constructs routes depending on a remaining battery capacity. Then, we explore a new type of sensor network with forwarder nodes and a data aggregation scheme. The forwarder node is a special node that has a large size of battery and supports the route construction to the sink node from sensor nodes. Finally, we evaluate the advantage of the data aggregation scheme for this sensor network. In numerical results, we show that our protocol can extend the lifetime of the sensor networks and improve the event delivery ratio at the sink node.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129968526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A TDMA-Based MAC Protocol for Mobile Sensor Networks 基于tdma的移动传感器网络MAC协议
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.56
M. Ordouei, M. Shalmani
{"title":"A TDMA-Based MAC Protocol for Mobile Sensor Networks","authors":"M. Ordouei, M. Shalmani","doi":"10.1109/ICN.2009.56","DOIUrl":"https://doi.org/10.1109/ICN.2009.56","url":null,"abstract":"Although many Medium Access Control (MAC) protocols have been specifically designed for WSNs where energy awareness is an essential consideration, only a few of them have considered the presence of mobile nodes or dynamic network topology in their protocols. However, they have usually considered occasional mobility, in which a few number of nodes may start moving at very low speeds and then remained immobile for a long period of time. In this paper, we propose a modified version of LMAC as Mobile-LMAC (M-LMAC) to improve its performance in the scenarios include continuous mobility. The protocol is compared to SMAC and LMAC by simulation. The results show that the proposed M-LMAC protocol has much better performance in terms of packet delivery ratio, network life time and end-to-end delay in presence of mobile nodes.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130922628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Implicit Media Knowledge 隐性媒体知识
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.45
Muy-Chu Ly, Alexis Germaneau, O. Martinot
{"title":"Implicit Media Knowledge","authors":"Muy-Chu Ly, Alexis Germaneau, O. Martinot","doi":"10.1109/ICN.2009.45","DOIUrl":"https://doi.org/10.1109/ICN.2009.45","url":null,"abstract":"These years, the number of visual media (e.g. images, photos, videos…) is exponentially increasing with the apparition of new technologies. Most of these media are shared on the Web with the apparition of social networks such as FaceBook, MySpace, Flickr… The problem related to the media extraction and indexing is become a big issue as the need is become primordial to efficiently retrieve the right media among millions of media. Firstly, we will present an overview of some existing visual media indexing/retrieval systems and its related limitations/improvements. Secondly, we will present a new way to improve media indexing/retrieval without effort: it is based on the analysis of media usage (via implicit user actions on media) in order to enrich media with pertinent information.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115328863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Analysis of Communication of RFID Transponders with Password-Protected Memory 带密码保护存储器的RFID应答器通信功率分析
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.75
L. Vojtech, Jan Kahl
{"title":"Power Analysis of Communication of RFID Transponders with Password-Protected Memory","authors":"L. Vojtech, Jan Kahl","doi":"10.1109/ICN.2009.75","DOIUrl":"https://doi.org/10.1109/ICN.2009.75","url":null,"abstract":"This paper deals with the method of attacking RFID transponders with a memory protected by an access password. By means of a practical experiment we will demonstrate that the method of protecting the memory space with a user password may not be sufficient.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Achieving a QoS Target in NGN Networks via an Efficient Admission Control Strategy 通过有效的接纳控制策略实现NGN网络的QoS目标
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.26
C. Ghazel, L. Saïdane
{"title":"Achieving a QoS Target in NGN Networks via an Efficient Admission Control Strategy","authors":"C. Ghazel, L. Saïdane","doi":"10.1109/ICN.2009.26","DOIUrl":"https://doi.org/10.1109/ICN.2009.26","url":null,"abstract":"Satisfying the Quality of Service (QoS) requirements is one of the main objectives in the design and implementation of IP-based Next Generation Networks (NGN). This paper formalizes an efficient NGN resource-based call admission control (CAC) method which guarantees the QoS requirements expressed in terms of per-service traffic flow throughput, latency, jitter, loss and authorized waiting delay. The proposed method delivers high quality session-based services compliant with the available capacity over an NGN network based IP/MPLS transport infrastructure. The effects of the proposed method on the QoS provision are demonstrated through modeling of the main QoS parameters. Numerical simulations, which illustrate the proposed method benefits in terms of QoS guarantees and transport network scalability, are also presented.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130837669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Node's Number of Neighbors in Wireless Mobile Ad Hoc Networks: A Statistical View 无线移动自组织网络中节点的邻居数:一个统计视图
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.35
Hoai-Nam Nguyen, Y. Shinoda
{"title":"A Node's Number of Neighbors in Wireless Mobile Ad Hoc Networks: A Statistical View","authors":"Hoai-Nam Nguyen, Y. Shinoda","doi":"10.1109/ICN.2009.35","DOIUrl":"https://doi.org/10.1109/ICN.2009.35","url":null,"abstract":"In the last decade, since the advent of advanced wireless technology, wireless mobile ad hoc networks have grown in both size and complexity, and their applications are also expanding at a great rate due to their many advantages, principally mobility and the fact that they do not require a fixed supporting structure. Security, routing protocols, and connectivity are major issues with mobile ad hoc networks, and seeking a solution to these and other problems is of great interest within the research community.All of these problems are affected by the number of neighbors that a given node has at a given time. In this paper, we examine the number of neighbors that a node has at an arbitrary moment during simulation time. We find that the interested number is not stuck with the node distribution or speed stable state but rather it fluctuates until converging after a period of time. Based on the results obtained from simulations, we have built a statistical model to grab a view of the number of neighbors each node has. Additionally, we have addressed some problems that are closely related to the average number of neighbors.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126350768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks 内容适应机制对RoQ攻击的脆弱性评估
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.40
Mina Guirguis, Joshua Tharp, Azer Bestavros, I. Matta
{"title":"Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks","authors":"Mina Guirguis, Joshua Tharp, Azer Bestavros, I. Matta","doi":"10.1109/ICN.2009.40","DOIUrl":"https://doi.org/10.1109/ICN.2009.40","url":null,"abstract":"Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality level of the content is adapted dynamically to mitigate overload conditions. Serving degraded content reduces strain on resources and enables them to cater for a larger set of clients. To that end, this paper studies adversarial exploits of dynamic content adaptation mechanisms to a new instantiation of Reduction of Quality (RoQ) attacks. The RoQ attack pattern is orchestrated to cause different forms of damage such as longer response time for legitimate clients, degraded content being served and underutilization of resources. We assess the impact of RoQ attacks via the potency metric which reflects the tradeoffs between the damage inflicted and the cost in mounting the attack. We validate our results through numerical analysis as well as real Internet experiments.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114227236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信