H. Kung, Chung-Ming Huang, Hao-Hsiang Ku, Yen-Ju Tung
{"title":"Load Sharing Topology Control Protocol for Harsh Environments in Wireless Sensor Networks","authors":"H. Kung, Chung-Ming Huang, Hao-Hsiang Ku, Yen-Ju Tung","doi":"10.1109/AINA.2008.70","DOIUrl":"https://doi.org/10.1109/AINA.2008.70","url":null,"abstract":"Energy conservation and network performance are the critical issues in wireless sensor networks (WSNs). This study designed and developed a novel communication efficient topology control protocol, which calls Load Sharing Topology Control Protocol (LS-TCP). LS-TCP is a well-designed protocol, including selecting suitable communication nodes, adjusting service loads of critical nodes, and adaptively sleeping management. LS-TCP is suitable for harsh environments without sensor identifications (ID) and locations. The proposed protocol principally divides the topology operation into topology formation phase and topology adjustment phases. In the topology formation phase, a enhance tree are set up. In the topology adjustment phase, enhance tree is adjusted with an optimal balance of critical nodes in backbone. Simulation results are performed using LS-TCP, which efficiently achieve much longer system life time in harsh environments.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125611653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Live Network Performance Challenge: FLASH-OFDM vs. HSDPA","authors":"Andres Arjona, Antti Ylä-Jääski, Jussi Kerttula","doi":"10.1109/AINA.2008.113","DOIUrl":"https://doi.org/10.1109/AINA.2008.113","url":null,"abstract":"HSDPA networks are intensively being deployed to provide mobile broadband connectivity to mobile devices. In addition to HSDPA, FLASH-OFDM is another wireless broadband option operating in a licensed spectrum. However, if operated at very low frequencies like the network in Finland,, it is particularly interesting for emerging markets, especially for rural areas which are lacking telecommunications infrastructure. In contrast to the HSDPA standards, the FLASH-OFDM systems are proprietary. The market dynamics are very different between standardized and proprietary systems, sometimes causing extra challenges for the deployment of proprietary systems. This paper provides quantitative measurements of the actual performance of two state-of-the-art live networks in Finland. The evaluation includes metrics such as throughput, delay, and VoIP quality considering network performance both on static and mobile scenarios. A commercial deployment evaluation is included in the analysis complementing the measurement data in order to provide a comprehensive view of the challenges.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127725240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Trust Management in Pervasive Computing","authors":"Tao Sun, M. Denko","doi":"10.1109/AINA.2008.147","DOIUrl":"https://doi.org/10.1109/AINA.2008.147","url":null,"abstract":"In pervasive computing, interactions are possible among users, devices and applications anytime and anywhere. Security and privacy are critical issues in this environment because pervasive computing environments' decentralized and distributed nature means that classical, centralized security management mechanisms are not directly applicable. Pervasive computing's similarity to human society makes trust an effective solution to handle security and privacy problems in pervasive computing environments In this paper we present a specific framework for implementing the distributed trust scheme based on our previous work. This work is inspired by a study on security and privacy requirements in a pervasive computing environment's actual applications. We have evaluated the performance using simulation experiments with performance metrics of throughput, packet loss ratio and message overhead. The results demonstrate the proposed approach's usefulness.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132812528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Efficient TCP: Reducing Contention-Induced Spurious Timeouts in QoS -Aware MANETs","authors":"C. Mbarushimana, A. Shahrabi","doi":"10.1109/AINA.2008.114","DOIUrl":"https://doi.org/10.1109/AINA.2008.114","url":null,"abstract":"The bandwidth is one of the most precious resources in mobile ad hoc networks (MANETs); their network protocols should therefore be able to achieve an increase in efficiency of bandwidth utilization. TCP, which implements flow control to regulate the network traffic, plays a significant role in determining the workload of the network. However, spurious TCP retransmissions can increase the link utilization and consequently limiting the amount of spare bandwidth available as extensively reported in the literature. This problem is exacerbated by the presence of high priority traffic and traffic differentiation introduced in IEEE 802.11e. In this paper, we focus on the optimization of TCP for resource efficiency, by limiting the number of contention-induced retransmissions. Using feedback from the MAC layer, the TCP layer can be notified of the medium contention state and adjusts its retransmission timer accordingly. Our simulation results demonstrate the effectiveness of our proposal in various scenarios. Our proposal achieves a gain of 15% in resource utilization and reduces power consumption by retransmitting fewer segments; it also improves TCP performance in terms of goodput and end-to-end delay.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133679424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Logics and Model Checking: A Recipe for Query Processing in Location-Aware Environments","authors":"C. Hoareau, I. Satoh","doi":"10.1109/AINA.2008.107","DOIUrl":"https://doi.org/10.1109/AINA.2008.107","url":null,"abstract":"We introduce a novel approach to handle location- dependent query processing in location-aware environments. We define a hybrid logic-based query language by building a semantic model that benefits from the well- founded model checking techniques. Our language is defined by four modal operators; it can express common location-dependent queries, and has the ability to deal with relative locations. A prototype implementation of the query engine is also presented and will be discussed.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133931926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Vapa, Annemari Auvinen, Yevgeniy Ivanchenko, Niko Kotilainen, J. Vuori
{"title":"Optimal Resource Discovery Paths of Gnutella2","authors":"M. Vapa, Annemari Auvinen, Yevgeniy Ivanchenko, Niko Kotilainen, J. Vuori","doi":"10.1109/AINA.2008.89","DOIUrl":"https://doi.org/10.1109/AINA.2008.89","url":null,"abstract":"This paper shows that the performance of peer-to-peer resource discovery algorithms is upper bounded by a k-Steiner minimum tree and proposes an algorithm locating near-optimal query paths for the peer-to-peer resource discovery problem. Global knowledge of the topology and the resources from the peer-to-peer network are required as an input to the algorithm. The algorithm provides an objective measure for defining how good local search algorithms are. The performance is evaluated in simulated peer-to-peer scenarios and in the measured Gnutella2 P2P network topology with four local search algorithms: breadth-first search, self-avoiding random walker, highest degree search and Dynamic Query Protocol.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130590204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Packet Type on Signal Strength in WLANs","authors":"Tanja Lang, Geoff Fellows, J. Louis","doi":"10.1109/AINA.2008.48","DOIUrl":"https://doi.org/10.1109/AINA.2008.48","url":null,"abstract":"In this paper we present our investigation on the impact that different packet types (data, management, control) have on the signal strength values observed by access points. Signal strength is often used as the major indicator for client location in WLAN location determination systems. It is vital for accurate prediction that the signal strength distribution and its variations is understood and modeled as closely as possible. We show that different packet types result in significantly different signal strength distributions and that a location determination system should therefore distinguish between the packet types and use the appropriate distribution for each packet type.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131011734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fairness of High-Speed TCP Stacks","authors":"D. Miras, Martin Bateman, S. Bhatti","doi":"10.1109/AINA.2008.143","DOIUrl":"https://doi.org/10.1109/AINA.2008.143","url":null,"abstract":"We present experimental results evaluating fairness of several proposals to change the TCP congestion control algorithm, in support of operation on high bandwidth-delay- product (BDP) network paths. We examine and compare the fairness of New Reno TCP BIC, cubic, hamilton-TCP, highspeed-TCP and Scalable-TCP. We focus on four different views of fairness: TCP-friendliness RTT-fairness, intra- and inter-protocol fairness.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131221763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STAMP: Towards A Scalable Topology Announcement and Management Protocol","authors":"W. Htira, O. Dugeon, M. Diaz","doi":"10.1109/AINA.2008.46","DOIUrl":"https://doi.org/10.1109/AINA.2008.46","url":null,"abstract":"This work addresses the problem of topology discovery and aggregation. For topology discovery, current solutions concentrate on using probe techniques like the MIBs in routers and gateways, the Internet control message protocol (ICMP), the traceroute program, the domain name system (DNS), etc. In contrast, this paper presents the simple topology announcement and management protocol (STAMP), a simple mechanism which infers the network topology by injecting suitable \"hello\" adjacency messages between direct connected devices. The discovered topology covers both the data link and the network layers. STAMP can be applied on large as well as on small topologies. In order to overcome scalability issues, we designed some mechanisms to hierarchically structure the discovered topology using aggregation to pull up management functions into the higher levels of the hierarchy. In the first version of STAMP we are interested in the design of a scalable call admission control management function, which has an increasingly important role for quality of service delivery in the new networking systems like IMS (IP multimedia subsystem). The paper presents the key points behind STAMP. It describes the protocol design as well as its behavior and hierarchy. Finally, some preliminary results presenting the application of STAMP in the scope of call admission control are shown in the end of the paper.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"86 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114010218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Quality and Rate Adaptation Scheme for Wireless Video Streaming","authors":"Sunhun Lee, K. Chung","doi":"10.1109/AINA.2008.93","DOIUrl":"https://doi.org/10.1109/AINA.2008.93","url":null,"abstract":"To provide efficient wireless video streaming service, the rate adaptation scheme should be applied at the low layer and the quality adaptation scheme should be considered at the high layer. To meet this requirement of wireless video streaming, we propose a new cross-layer design for video streaming over wireless networks. This design includes the rate adaptation scheme in the data link and physical layers and the quality adaptation scheme in the application layer. The rate adaptation scheme adjusts the data transmission rate based on the measured RSSI at the sender-side and informs the quality adaptation scheme about the rate limits. Then the quality adaptation scheme utilizes this rate limits to adjust the quality of the video stream. Through the performance evaluations, we prove that our cross-layer design improves the wireless link utilization and quality of video stream simultaneously.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124803760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}