{"title":"Bandwidth and power efficiency analysis of fading communication link","authors":"A. Hamed, R. Rao","doi":"10.1109/SPECTS.2016.7570527","DOIUrl":"https://doi.org/10.1109/SPECTS.2016.7570527","url":null,"abstract":"Bandwidth and power are the major radio resources of a wireless communication system. Designing an efficient wireless communication system requires trade-off between these resources. In this context, definitions of radio resource efficiencies are given in terms of bandwidth efficiency, bit/s/Hz, and power efficiency, bit/Thermal Noise Energy Unit, for an arbitrary communication system. These efficiencies are analyzed and discussed over Rayleigh and Nakagami fading channels for M-QAM. Investigation shows that the efficiency metrics are degraded by the channel effects. Also, it is evident that each M-QAM level attains highest power efficiency in a specific range of signal to noise ratio (SNR). Thus, an adaptive transmission technique is proposed and analyzed for enhancing resource efficiencies based on number of levels in M-QAM to achieve maximum power efficiency in specific SNR regions. It is shown that efficiency metrics can be significantly improved by using the proposed technique for a broad range of signal to noise ratio, even when fading is severe.","PeriodicalId":302558,"journal":{"name":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"12 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120883791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. U. Kazi, Mohammad Etemad, Gabriel A. Wainer, G. Boudreau
{"title":"Using elected coordination stations for CSI feedback on CoMP downlink transmissions","authors":"B. U. Kazi, Mohammad Etemad, Gabriel A. Wainer, G. Boudreau","doi":"10.1109/SPECTS.2016.7570508","DOIUrl":"https://doi.org/10.1109/SPECTS.2016.7570508","url":null,"abstract":"The higher demand for data traffic and the emergence of new applications has made mobile networks challenging to maintain high data rates for users, in particular those located on the cell's edges. The Coordinated Multipoint (CoMP) technology adopted in long-term evolution (LTE) cellular networks allows improving the cell's edge performance. In order to improve throughput performance gain in the downlink, the CoMP scheduler needs to know/deal the channel information for all the collaborating Base Stations. To do so, we propose a method for handling Channel State Information (CSI) feedback, named DCEC: Direct CSI feedback to Elected Coordination station. The DCEC architecture aims to reduce the overhead and latency of the network, and subsequently increase its throughput. To model the proposed architecture in the cellular network, we have used the Discrete Event System Specification (DEVS) formalism. The simulation results demonstrate that the DCEC architecture significantly decreases the number of CSI feedback packets being transmitted within the network and reduces the feedback latency resulting in higher data rates for users.","PeriodicalId":302558,"journal":{"name":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125833560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Subjective video quality assessment of VP9 compression standard for full HD resolution","authors":"M. Uhrina, J. Bienik, M. Vaculík, M. Voznák","doi":"10.1109/SPECTS.2016.7570522","DOIUrl":"https://doi.org/10.1109/SPECTS.2016.7570522","url":null,"abstract":"Interest in new multimedia services has rapidly increased over last years. This concern goes hand in hand with demand for higher bandwidth which leads to need to develop new compression standards as VP9 or H.265/HEVC. This results in requirements for video quality assessment as one main part of the multimedia stream. Compression together with transmission link imperfection are two major factors that influence the quality. This paper deals with assessment of impact of VP9 compression standard on the video quality using different subjective metrics. The evaluation is done for two types of sequences with Full HD resolution depending on content. The main outcome obtained from the results is the determination of the threshold in the means of point where the quality do not rise so swift. This threshold was set between 5 and 7 Mbps. After this threshold the observers did not evaluate the quality of both sequence with quite higher marks which means there is no need to compress the sequences to higher bitrates than to 7 Mbps. These results are part of a new model that is still being created and will be used for predicting the video quality in networks based on IP.","PeriodicalId":302558,"journal":{"name":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127096966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of energy saving MAC protocols in WSN operating systems","authors":"M. Ojo, D. Adami, S. Giordano","doi":"10.1109/SPECTS.2016.7570509","DOIUrl":"https://doi.org/10.1109/SPECTS.2016.7570509","url":null,"abstract":"Sensing, computing and communication are the main features of a wireless sensor network (WSN) which serves a wide range of applications. Despite its versatility and simplicity, it brought up various challenges such as limited storage, power consumption from radio activities, just to mention a few. The distinguishing traits of sensor networks have a direct impact on their protocol design at each layer, especially at the Medium Access Control (MAC) layer since it manages transmission scheduling as well as duty cycling for energy conservation. To maximize energy efficiency of WSNs, a critical analysis of the radio duty cycle of the WSN operating systems were carried out with experimental evaluation. Moreover, we focus on the energy consumption by conducting experimental measurements on different platforms i.e. OpenMote-CC2538 on various operating systems. Results shows that IEEE 802.15.4e Time Synchronized Channel Hopping (TSCH) has great impact on the energy consumption with respect to other radio duty cycles.","PeriodicalId":302558,"journal":{"name":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132992735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cloud-based service for generating ns-3 network simulation programs","authors":"A. Conway","doi":"10.1109/SPECTS.2016.7570514","DOIUrl":"https://doi.org/10.1109/SPECTS.2016.7570514","url":null,"abstract":"A cloud-based web service is presented for users to machine-generate network simulation programs for the opensource ns-3 network simulator. The service takes as input a userprovided network system model and delivers as output an ns-3 'main' program. An accompanying user-based modeling tool provides a graphical user interface for constructing and editing models of four layer Internet systems in terms of backbone nodes and links, different types of wireless networks (LTE, Wifi infrastructure, Wifi adhoc, Wimax, or CSMA), end-to-end application traffic sources, mobility models, routing protocols, and trace sources. Methods are also developed to make the cloudbased program generation service secure in terms of not exposing network model information in the cloud during the entirety of the program generation process. A masking technique is presented for hiding network information such as node or link names, link end-point names, IP and MAC addresses, model option choices, parameter values, and application-layer traffic end-point names. A network model decomposition technique is presented for obscuring network topology information such as the mix and graphical interconnection of nodes, links, wireless networks, wireless network elements, and application-layer traffic flows. The ns-3 program generation service facilitates the production and editing of ns-3 programs for large or complex network systems. It can also assist new users or non-experts with generating ns-3 programs.","PeriodicalId":302558,"journal":{"name":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114164372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Walter Fuertes, Miguel Morales, Hernán Aules, T. Toulkeridis
{"title":"Software-based computing platform as an experimental topology assembled to detect and mitigate DDoS attacks using virtual environments","authors":"Walter Fuertes, Miguel Morales, Hernán Aules, T. Toulkeridis","doi":"10.1109/SPECTS.2016.7570512","DOIUrl":"https://doi.org/10.1109/SPECTS.2016.7570512","url":null,"abstract":"A software-based computing platform has been constructed as an experimental topology with the goal to detect and mitigate DDoS using a Virtual Network Environment. This research comprises the automatic management of three main approaches, being firstly the deployment of a virtual infrastructure for experimentation, secondly the configuration of the detection and mitigation of DDoS attacks and finally the analytical tools to corroborate with introduced countermeasures. In order to accomplish these purposes, we have designed and constructed an experimental topology based on virtual networks, which injects and mitigates DDoS attacks. Simultaneously, we designed and developed a software application to manage automatically the deployment of the experimental topology and the configuration of the detection and mitigation of DDoS attacks. To guarantee the reliability of the outcome, we configured a rule-based detection mechanism for Linux through the optimization of an algorithm that resolves anomalies in firewalls rules. The results demonstrate quantitatively the efficiency of this proposal.","PeriodicalId":302558,"journal":{"name":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. U. Kazi, Mohammad Etemad, Gabriel A. Wainer, G. Boudreau
{"title":"Signaling overhead and feedback delay reduction in heterogeneous multicell cooperative networks","authors":"B. U. Kazi, Mohammad Etemad, Gabriel A. Wainer, G. Boudreau","doi":"10.1109/SPECTS.2016.7570507","DOIUrl":"https://doi.org/10.1109/SPECTS.2016.7570507","url":null,"abstract":"Heterogeneous networks (HetNets) and multicell cooperation are two key technologies in cellular networks that can improve network performance. The channel information of all the collaborating Base Stations (BSs) is one of the core factors to achieve better throughput performance gain in the coordinated multipoint (CoMP) communication. Here, we propose a novel method for handling Channel State Information (CSI) feedback in HetNet CoMP, named DCEC-HetNet: Direct CSI-feedback to Elected Coordination-station for Heterogeneous Networks. The DCEC-HetNet architecture aims to reduce the signaling overhead and feedback latency, and subsequently increase the throughput of the network. We use the Discrete Event System Specification (DEVS) formalism to model the cellular network. The simulation results demonstrate that the DCEC-HetNet architecture significantly decreases the number of CSI feedback packets being transmitted within the network, and reduces the feedback latency resulting in higher cell throughput.","PeriodicalId":302558,"journal":{"name":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124519540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Víctor Peláez, A. M. Campos, D. García, J. Entrialgo
{"title":"Autonomic scheduling of deadline-constrained bag of tasks in hybrid clouds","authors":"Víctor Peláez, A. M. Campos, D. García, J. Entrialgo","doi":"10.1109/SPECTS.2016.7570526","DOIUrl":"https://doi.org/10.1109/SPECTS.2016.7570526","url":null,"abstract":"The use of Hybrid Cloud technologies in large scale applications allows organizations to complement on-premises infrastructure with hired infrastructure from Public Cloud providers. The efficient use of the hired resources to provide the expected quality of service while dealing with the heterogeneity and uncertainty of Public Clouds is the main difficulty. A scheduler able to deal with deadline-constrained bag of tasks in Hybrid Clouds is presented in this work. The main contribution of this scheduler is that task runtime estimations are not necessary as inputs. The scheduler includes a runtime estimator based on sampled data to generate the estimation autonomously. A discrete event simulator was developed in order to validate the proposed scheduler in different scenarios. Results show that an estimator based on the Chebyshev's inequality obtains very good results in terms of deadlines met and cost.","PeriodicalId":302558,"journal":{"name":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123509699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Annalisa Socievole, F. Rango, Antonio C. Caputo, S. Marano
{"title":"Simulating node selfishness in opportunistic networks","authors":"Annalisa Socievole, F. Rango, Antonio C. Caputo, S. Marano","doi":"10.1109/SPECTS.2016.7570516","DOIUrl":"https://doi.org/10.1109/SPECTS.2016.7570516","url":null,"abstract":"In situations where Internet connectivity is not available, opportunistic networks exploit the encounters between mobile human-carried devices for exchanging information. When people encounter each other, their handheld devices can communicate wirelessly and in a cooperative way using the encounter opportunities for forwarding their messages. However, in the real world, most of the nodes exhibit selfish behaviors mostly to conserve the limited buffer and power resources. As such, for ensuring a fair delivery, node selfishness should be taken into account. In this paper, we study the impact of node selfishness on the system throughput and delay of opportunistic communications. Through extensive simulations, we evaluate the system performances by utilizing experimental human mobility traces with different communication patterns. Our results show that the message delivery ratio decreases and the end-to-end average latency increases as the percentage of selfish nodes increases for all the routing protocols considered. However, the social-based forwarding rules are able to better manage node selfishness.","PeriodicalId":302558,"journal":{"name":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115534351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Meaningful attack graph reconstruction through stochastic marking analysis","authors":"P. Fazio, M. Tropea, S. Marano, M. Voznák","doi":"10.1109/SPECTS.2016.7570519","DOIUrl":"https://doi.org/10.1109/SPECTS.2016.7570519","url":null,"abstract":"Nowadays, the defense against Denial of Service (DoS) attacks is receiving particular interest. Different techniques have been proposed and, in particular, the Packet Marking (PM) and TraceBack (TB) procedures demonstrated a good capacity of facing the different malicious attacks. While host-based DoS attacks are more easily traced and managed, network-based DoS attacks are a more challenging threat. The powerful point of IP TB approach is the possibility given to routers to mark and add some information on attack packets, on the basis of a fixed probability value. In this paper, we propose a possible approach for modeling the classical probabilistic PM algorithms as Markov chains, giving the possibility to obtain a closed form for the evaluation of the right number of received marked packets, in order to build a meaningful attack graph.","PeriodicalId":302558,"journal":{"name":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}