2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)最新文献

筛选
英文 中文
Optimal contention-free multiplexing for wireless access 无线接入的最佳无争用多路复用
G. Dattatreya, AJ Kulkarni
{"title":"Optimal contention-free multiplexing for wireless access","authors":"G. Dattatreya, AJ Kulkarni","doi":"10.1109/COMSNETS.2011.5716410","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716410","url":null,"abstract":"The IEEE 802.11 (wi-fi) protocol was originally designed for devices with light load connecting to a wireless access point. With the success of 802.11, the density of Access Points has increased significantly. Now-a-days, each Access Point (AP) is associated with no more than a few mobile devices. New services like VOIP and streaming video have special service requirements. The popularity of these services has increased the load on the Access Points. Such features of these new applications require a more efficient Medium Access Control protocol (MAC). In this paper we develop an adaptive, distributed and contention free protocol that can meet the requirements of services that demand high data rates. The protocol statistically multiplexes opportunities for transmission for each node. The protocol is analyzed mathematically and optimized for performance. The simulation of wi-fi show that our approach is several times superior under heavy load conditions.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131696199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A formal approach to mobility modeling 移动性建模的正式方法
A. Dutta, B. Lyles, H. Schulzrinne
{"title":"A formal approach to mobility modeling","authors":"A. Dutta, B. Lyles, H. Schulzrinne","doi":"10.1109/COMSNETS.2011.5716488","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716488","url":null,"abstract":"In the absence of any formal mechanism to analyze the dynamics of handoff systems, it is difficult to predict or verify the systems performance of un-optimized handover or any specific handoff optimization technique. Without an existing mobility system model, it is difficult to design a new customized mobility protocol or design new optimization techniques for an existing mobility protocol in a systematic way. This paper introduces a model of the handover process that identifies the intrinsic operations of a handover event and allows to predict performance for both an un-optimized handover and for specific optimization methodologies under resource constraints. This model also allows to study the behavioral properties of the handoff system such as data dependency and deadlocks. The model-based approach provides the ability to determine the extent of parallelism and proactive operations that are possible among the handoff components.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A threat taxonomy for mHealth privacy 移动医疗隐私的威胁分类
D. Kotz
{"title":"A threat taxonomy for mHealth privacy","authors":"D. Kotz","doi":"10.1109/COMSNETS.2011.5716518","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716518","url":null,"abstract":"Networked mobile devices have great potential to enable individuals (and their physicians) to better monitor their health and to manage medical conditions. In this paper, we examine the privacy-related threats to these so-called mHealth technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies that could support privacy-sensitive mHealth systems. We conclude with a brief summary of research challenges.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124045147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 119
Planning rules for split ratio selection in building GPON-based access networks 基于gpn的接入网中分割比选择的规划规则
H. Alshaer, Mohamed Alyafei
{"title":"Planning rules for split ratio selection in building GPON-based access networks","authors":"H. Alshaer, Mohamed Alyafei","doi":"10.1109/COMSNETS.2011.5716427","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716427","url":null,"abstract":"A dimensioning process of Gigabit Passive Optical Network (GPON) involves the selection of a split ratio that determines the allocated bandwidth per subscriber sharing a single passive optical network (PON) link (Optical Line Terminal (OLT) port). The selection of a small split ratio can be costly, whereas the selection of a higher split ratio can reduce the bandwidth allocated per subscriber and subsequently subscribers may quickly experience less quality in provisioned services. This paper aims to introduce planning rules and a mathematical model which can enable network planners, from day one, to optimally dimensioning GPON access network resources (PON link capacity, OLT's ports, splitter's ports). The mathematical model considers four parameters for optimal dimensioning GPON access network: Number of subscribers and their type, busy hour, service penetration rate and bandwidth requirement. The planning rules and mathematical model have been integrated into a software utility which we have developed to evaluate the support of next-generation services in GPON access network.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"627 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129111549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
FREEZE: Rate adaptation in wireless LANs using channel contention estimates 冻结:无线局域网中使用信道竞争估计的速率适应
AJ Kulkarni, Shanthy Menezes, R. Prakash
{"title":"FREEZE: Rate adaptation in wireless LANs using channel contention estimates","authors":"AJ Kulkarni, Shanthy Menezes, R. Prakash","doi":"10.1109/COMSNETS.2011.5716436","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716436","url":null,"abstract":"IEEE 802.11 provides different data rates for a device to utilize based on the channel conditions. Rate adaptation is an important feature of wireless LANs and most of the work in this area use frame error rate as an indicator of signal to noise ratio (SNR). SNR is then used to base the choice of data rate used for transmission. In infrastructure based 802.11 LANs, frames can be lost due to collisions and hence increase the error rate, although the SNR might be high. Thus using frame error rate alone as a deciding factor for rate adaptation would not be a good choice. In this paper we use the 802.11 protocol features to estimate the contention in the system. The contention can be determined by measuring the freezes a node experiences while transmitting. We further show that our estimate is a good indicator of the contention in the channel. This estimate along with the frame error rate is then used in making rate adaptation decisions. Our simulations show 35 percent better performance in throughput as compared to other rate adaptation techniques such as ARF.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114809684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Capacity requirements for on-demand IPTV services 按需IPTV业务的容量需求
Pat Diminico, V. Gopalakrishnan, R. Jana, K. Ramakrishnan, Deborah F. Swayne, V. Vaishampayan
{"title":"Capacity requirements for on-demand IPTV services","authors":"Pat Diminico, V. Gopalakrishnan, R. Jana, K. Ramakrishnan, Deborah F. Swayne, V. Vaishampayan","doi":"10.1109/COMSNETS.2011.5716483","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716483","url":null,"abstract":"Service providers are evolving to provide more video content on-demand. Customers like to watch a variety of entertainment content of their choice and at their convenience. Serving this ever-increasing base of on-demand viewers requires careful provisioning by the providers to accommodate for both scale and interactivity. In this paper, we examine long-term usage patterns of hundreds of thousands of consumers of a nationwide IPTV service, and confirm that viewers are indeed migrating to what is called “time-shifted” viewing of television programming and movies using digital video recorders or on-demand viewing. We also examine the impact of such user's interactive control of their viewing experience using “stream control” functions (e.g., fast-forward, rewind, skip, replay, etc.) Through careful measurements on an IPTV server, we compute the load due to video streaming and handling these stream control events. We then extrapolate from these micro-benchmark measurements to predict the processing load imposed by users that would resort to using a “network-based” DVR capability if such a service were offered. We use both detailed trace-driven simulations and a simple operational-analysis based model to predict the capacity requirements of the server complex in a video-hub office to serve a large population of customers (e.g., a densely populated city like Mumbai). We provide insights on the number of requests serviced by the server, the average time to service these requests and the response time as perceived by the client.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126379783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agents TraceGray:一种基于移动代理的MANET入侵检测的应用层方案
Amar Taggu, Ani Taggu
{"title":"TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agents","authors":"Amar Taggu, Ani Taggu","doi":"10.1109/COMSNETS.2011.5716475","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716475","url":null,"abstract":"Many intrusion detection algorithms have been proposed to detect network attacks on Mobile Ad-Hoc Networks (MANET). Most of such proposals require extensive modifications to routing algorithms or lower layers which might not be always feasible in practice. This paper proposes a simple but non-trivial scheme TraceGray, that uses mobile agents (MA) to carry out intrusion detection in a MANET without modifying either the underlying routing algorithms or other layers like the datalink layer. TraceGray works only in the application layer and detects multiple gray holes in a DSR protocol based MANET, while traversing the network from a given source to a destination. Since mobile agents work in the application layer, our approach requires no changes to any existing routing protocols or lower layers and is essentially protocol independent. The ns-2 based implementation show successful detection of multiple gray holes in networks with moderate mobility.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131530624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Towards truly heterogeneous internets: Bridging infrastructure-based and infrastructure-less networks 迈向真正的异构互联网:桥接基于基础设施和无基础设施的网络
R. N. B. Rais, Marc Mendonca, T. Turletti, K. Obraczka
{"title":"Towards truly heterogeneous internets: Bridging infrastructure-based and infrastructure-less networks","authors":"R. N. B. Rais, Marc Mendonca, T. Turletti, K. Obraczka","doi":"10.1109/COMSNETS.2011.5716489","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716489","url":null,"abstract":"There is no doubt that networks are becoming increasingly heterogeneous and future internetworks will likely interconnect different types of networks including wired, infrastructure-based wireless as well as infrastructure-less wireless networks, a.k.a., multi-hop mobile ad-hoc networks (or MANETs). Integrating MANETs to infrastructure-based networks (wired or wireless) allows network coverage to be extended to regions where infrastructure deployment is sparse or nonexistent as well as a way to cope with intermittent connectivity. However, to date there are no comprehensive solutions that integrate MANETs to infrastructure-based networks. In this paper, we introduce a message delivery framework, MeDeHa++ that is able to bridge together infrastructure-based and infrastructure-less networks. Through extensive simulations, we demonstrate the benefits of MeDeHa++, especially in terms of the extended coverage it provides as well as its ability to cope with arbitrarily long-lived connectivity disruptions. Another important contribution of this work is to deploy and evaluate our message delivery framework on a real network testbed as well as conduct experiments in “hybrid” scenarios running partly on simulation and partly on real nodes.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130453261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Message efficient leader finding algorithm for mobile ad hoc networks 移动自组织网络的消息高效领导者查找算法
Awadhesh Kumar Singh, Shantanu Sharma
{"title":"Message efficient leader finding algorithm for mobile ad hoc networks","authors":"Awadhesh Kumar Singh, Shantanu Sharma","doi":"10.1109/COMSNETS.2011.5716512","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716512","url":null,"abstract":"MANET is very hostile environment to design and implement computing algorithms. One of the major concerns in MANET's is to elect a coordinator in order to manage many mobile computing applications. In the contemporary literature, many protocols exist for leader election. However, most of them use message broadcast technique. The present article proposes a technique that avoids the broadcast of messages and uses multicast and unicast for leader election. The correctness proof and efficiency analysis of the proposed technique has also been included.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130710866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
CrowdLab: An architecture for volunteer mobile testbeds CrowdLab:志愿者移动测试平台的架构
Eduardo Cuervo, Peter Gilbert, Bi Wu, Landon P. Cox
{"title":"CrowdLab: An architecture for volunteer mobile testbeds","authors":"Eduardo Cuervo, Peter Gilbert, Bi Wu, Landon P. Cox","doi":"10.1109/COMSNETS.2011.5716419","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716419","url":null,"abstract":"Researchers investigating mobile and wireless systems can run experiments on many testbeds, but no existing option supports experimentation “in the wild“ without sacrificing features such as access to low-level wireless state and efficient scheduling of co-local guests. To fill this void, we present a new architecture for mobile testbeds called CrowdLab. CrowdLab allows researchers to run guest virtual machines on volunteer mobile nodes and ensures efficient use of testbed resources through a new dual-mode networking abstraction and a weakly-consistent, replicated state store called a site directory. We have implemented two CrowdLab prototypes, one for x86 laptops and one for ARM-based Nokia N810 Internet Tablets, and evaluated them using power measurements, micro-benchmarks, and trace-driven emulation. Our evaluation demonstrates that handheld users can contribute 2.5 hours per day to CrowdLab and still have over 12.5 hours of idle time remaining. In addition, emulated mobility-trace replays show that CrowdLab's fault-tolerance mechanisms allow experiments to run uninterrupted, even in the face of high churn rates.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130767193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信